首页 > 最新文献

2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence最新文献

英文 中文
Review and comparison of face detection algorithms 人脸检测算法的回顾和比较
K. Dang, Shanu Sharma
With the tremendous increase in video and image database there is a great need of automatic understanding and examination of data by the intelligent systems as manually it is becoming out of reach. Narrowing it down to one specific domain, one of the most specific objects that can be traced in the images are people i.e. faces. Face detection is becoming a challenge by its increasing use in number of applications. It is the first step for face recognition, face analysis and detection of other features of face. In this paper, various face detection algorithms are discussed and analyzed like Viola-Jones, SMQT features & SNOW Classifier, Neural Network-Based Face Detection and Support Vector Machine-Based face detection. All these face detection methods are compared based on the precision and recall value calculated using a DetEval Software which deals with precised values of the bounding boxes around the faces to give accurate results.
随着视频和图像数据库的大量增加,智能系统对数据的自动理解和检查变得非常需要,因为人工操作变得越来越遥不可及。将其缩小到一个特定的领域,可以在图像中跟踪的最具体的对象之一是人,即面孔。人脸检测在越来越多的应用中成为一个挑战。它是人脸识别、人脸分析和人脸其他特征检测的第一步。本文讨论和分析了各种人脸检测算法,如Viola-Jones、SMQT特征和SNOW分类器、基于神经网络的人脸检测和基于支持向量机的人脸检测。采用DetEval软件对人脸周围边界框的精确值进行处理,并根据计算的查全率和查全率进行比较,得到准确的检测结果。
{"title":"Review and comparison of face detection algorithms","authors":"K. Dang, Shanu Sharma","doi":"10.1109/CONFLUENCE.2017.7943228","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943228","url":null,"abstract":"With the tremendous increase in video and image database there is a great need of automatic understanding and examination of data by the intelligent systems as manually it is becoming out of reach. Narrowing it down to one specific domain, one of the most specific objects that can be traced in the images are people i.e. faces. Face detection is becoming a challenge by its increasing use in number of applications. It is the first step for face recognition, face analysis and detection of other features of face. In this paper, various face detection algorithms are discussed and analyzed like Viola-Jones, SMQT features & SNOW Classifier, Neural Network-Based Face Detection and Support Vector Machine-Based face detection. All these face detection methods are compared based on the precision and recall value calculated using a DetEval Software which deals with precised values of the bounding boxes around the faces to give accurate results.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"10 1","pages":"629-633"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78949971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Online influence maximization using rapid continuous time independent cascade model 利用快速连续时间无关级联模型实现在线影响最大化
Annu Kumari, S. Singh
Do one really know the meaning of Online Influence (OI) Maximization? Do you know why do we need to calculate the influence of social networking sites? How to measure the influence of online maximization? How does it really works? If you have been pondering for the answers of the questions then this paper will assist you to identify and connect with influences of online maximization. Influence Maximization is the problem in which subset of seed nodes are found within the social networks which maximizes influence on other nodes in their ties and relationships. Influence maximization has been developed to find out how influence gets propagated through its network. The concept of Influence Maximization lies in the selection of minimal set of seed nodes which propagates maximum of its influenciality within a network. This paper firstly comprises of previous models used in appropriate selection of seed nodes i.e. Linearly Threshold Model (LT), Classic Cascade Independent s Model(IC), Extended Classic Independent Model(EIC). Then, I proposed a new Model Rapid Continuous Time (RCT) Independent Cascade Model that can be used in the Classic Independent Model(IC).
我们真的知道在线影响力最大化的含义吗?你知道为什么我们需要计算社交网站的影响吗?如何衡量在线最大化的影响?它到底是如何运作的?如果你一直在思考这些问题的答案,那么这篇论文将帮助你识别和连接在线最大化的影响。影响最大化是指在社交网络中发现的种子节点子集,其对其联系和关系中的其他节点的影响最大化。影响力最大化的发展是为了找出影响力如何通过其网络传播。影响最大化的概念在于选择最小的种子节点集,使其在网络中传播最大的影响力。本文首先梳理了前人用于种子节点合理选择的模型,即线性阈值模型(LT)、经典级联独立模型(IC)、扩展经典独立模型(EIC)。然后,我提出了一个新的模型快速连续时间(RCT)独立级联模型,可用于经典独立模型(IC)。
{"title":"Online influence maximization using rapid continuous time independent cascade model","authors":"Annu Kumari, S. Singh","doi":"10.1109/CONFLUENCE.2017.7943175","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943175","url":null,"abstract":"Do one really know the meaning of Online Influence (OI) Maximization? Do you know why do we need to calculate the influence of social networking sites? How to measure the influence of online maximization? How does it really works? If you have been pondering for the answers of the questions then this paper will assist you to identify and connect with influences of online maximization. Influence Maximization is the problem in which subset of seed nodes are found within the social networks which maximizes influence on other nodes in their ties and relationships. Influence maximization has been developed to find out how influence gets propagated through its network. The concept of Influence Maximization lies in the selection of minimal set of seed nodes which propagates maximum of its influenciality within a network. This paper firstly comprises of previous models used in appropriate selection of seed nodes i.e. Linearly Threshold Model (LT), Classic Cascade Independent s Model(IC), Extended Classic Independent Model(EIC). Then, I proposed a new Model Rapid Continuous Time (RCT) Independent Cascade Model that can be used in the Classic Independent Model(IC).","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"35 6 1","pages":"356-361"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77063718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient management of distributive cloud computing system for scientific applications 高效管理科学应用的分布式云计算系统
Anil Bamwal
This paper defines how a distributed cloud computing system is used to define different efficient scientific applications. Generally a distributed cloud computing system is formed from a number of different Infrastructure-as-a-Service (IaaS) clouds which are used in an integrated infrastructure. The production of distributed cloud is continuing since last four years with around 800,000 numbers of completed jobs with an average of about 500 simultaneous and parallel jobs which are executed for about 12 hours per day. Here the design and implementation of system is reviewed based on some custom components and a number of pre-existing components. In this paper the various operations of the system, plans for increasing the computing capacity and expansion to more number of sites is discussed.
本文定义了如何使用分布式云计算系统来定义不同的高效科学应用。通常,分布式云计算系统由许多不同的基础设施即服务(IaaS)云组成,这些云在集成基础设施中使用。分布式云的生产在过去的四年中持续进行,完成的作业数量约为80万,平均每天执行约500个并发和并行作业,执行时间约为12小时。在这里,基于一些自定义组件和一些预先存在的组件来审查系统的设计和实现。本文讨论了系统的各种操作,增加计算能力和扩展到更多站点的计划。
{"title":"Efficient management of distributive cloud computing system for scientific applications","authors":"Anil Bamwal","doi":"10.1109/CONFLUENCE.2017.7943160","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943160","url":null,"abstract":"This paper defines how a distributed cloud computing system is used to define different efficient scientific applications. Generally a distributed cloud computing system is formed from a number of different Infrastructure-as-a-Service (IaaS) clouds which are used in an integrated infrastructure. The production of distributed cloud is continuing since last four years with around 800,000 numbers of completed jobs with an average of about 500 simultaneous and parallel jobs which are executed for about 12 hours per day. Here the design and implementation of system is reviewed based on some custom components and a number of pre-existing components. In this paper the various operations of the system, plans for increasing the computing capacity and expansion to more number of sites is discussed.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"1 1","pages":"262-268"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75246469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual band compact antenna with series of hexagonal cut and coupling structure for isolation enhancement 双频紧凑型天线,采用一系列六角形切割和耦合结构,以增强隔离
Sanjay Chouhan, Manish Gupta, D. K. Panda
The paper presented a design of 2X1 antenna for dual band WLAN application with coupling element to improve the mutual coupling. Coupling structure is located between two patch antennas. The designed structure is consisting of a series of hexagonal cut to shrink the size of the patch antenna. A proposed coupling structure is used to improve the value isolation between two closely placed antenna elements. The 2×1 MIMO antennas for the frequency band 2.4 GHz and 5.2 GHz is presented and simulated with coupling and without coupling element. The proposed design uses a FR-4 material with the height 1.524 mm. The size of the single patch antenna is 16 X16 mm. Simulation result presented the improvement in isolation from without coupling elements to with coupling element. 15dB and 2 dB isolation improvement found with coupling element for frequency band 2.4 GHz and 5.2 GHz correspondingly.
提出了一种采用耦合元件的双频无线局域网2X1天线的设计方案,以提高天线的互耦性。耦合结构位于两个贴片天线之间。所设计的结构是由一系列六角形的切口组成,以缩小贴片天线的尺寸。提出了一种耦合结构,以提高两个紧密放置的天线单元之间的值隔离。提出了2.4 GHz和5.2 GHz频段的2×1 MIMO天线,并对其进行了耦合和无耦合元件的仿真。本设计采用FR-4材质,高度1.524 mm。单个贴片天线尺寸为16x16mm。仿真结果表明,从无耦合元件到有耦合元件,隔振性能有所提高。耦合元件在2.4 GHz和5.2 GHz频段的隔离度分别提高了15dB和2db。
{"title":"Dual band compact antenna with series of hexagonal cut and coupling structure for isolation enhancement","authors":"Sanjay Chouhan, Manish Gupta, D. K. Panda","doi":"10.1109/CONFLUENCE.2017.7943250","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943250","url":null,"abstract":"The paper presented a design of 2X1 antenna for dual band WLAN application with coupling element to improve the mutual coupling. Coupling structure is located between two patch antennas. The designed structure is consisting of a series of hexagonal cut to shrink the size of the patch antenna. A proposed coupling structure is used to improve the value isolation between two closely placed antenna elements. The 2×1 MIMO antennas for the frequency band 2.4 GHz and 5.2 GHz is presented and simulated with coupling and without coupling element. The proposed design uses a FR-4 material with the height 1.524 mm. The size of the single patch antenna is 16 X16 mm. Simulation result presented the improvement in isolation from without coupling elements to with coupling element. 15dB and 2 dB isolation improvement found with coupling element for frequency band 2.4 GHz and 5.2 GHz correspondingly.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"7 1","pages":"750-753"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76295533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Role of predictive modeling in cloud services pricing: A survey 预测建模在云服务定价中的作用:调查
Meetu Kandpal, Monica Gahlawat, Kalyani Patel
In the era of Big Data analytics predictive modeling plays an important role to predict the future demand and behavior by using historical data. As majority of the IT companies running behind cloud services, the cloud service providers like Amazon, Google cloud, Microsoft Azure etc may be interested to know the future demand of the computing resources so that they can derive new pricing schemes to gain more profit. The providers have different pricing schemes to charge for computing resourcese. g., Amazon provides three pricing schemes, namely, on-demand pricing, reserved pricing and auction pricing in the same way Microsoft has different schemes like Pay-As-You-Go Subscriptions, Prepaid Subscriptions. The paper presents survey of role of predictive modeling in cloud service pricing. The survey result clearly shows that predictions made by various author are closer to actual outcomes, which highlights the importance of predictive modeling to forecast future demand of cloud computing resources and deciding the price of resources.
在大数据分析时代,预测建模利用历史数据预测未来的需求和行为发挥着重要作用。由于大多数IT公司都在运行云服务,像亚马逊,谷歌云,微软Azure等云服务提供商可能有兴趣了解未来计算资源的需求,以便他们可以制定新的定价方案,以获得更多的利润。供应商对计算资源有不同的定价方案。例如,亚马逊提供了三种定价方案,即按需定价,保留定价和拍卖定价,就像微软有不同的方案,如按需付费订阅,预付订阅。本文综述了预测建模在云服务定价中的作用。调查结果清楚地表明,各作者的预测更接近实际结果,这凸显了预测建模对预测未来云计算资源需求和决定资源价格的重要性。
{"title":"Role of predictive modeling in cloud services pricing: A survey","authors":"Meetu Kandpal, Monica Gahlawat, Kalyani Patel","doi":"10.1109/CONFLUENCE.2017.7943158","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943158","url":null,"abstract":"In the era of Big Data analytics predictive modeling plays an important role to predict the future demand and behavior by using historical data. As majority of the IT companies running behind cloud services, the cloud service providers like Amazon, Google cloud, Microsoft Azure etc may be interested to know the future demand of the computing resources so that they can derive new pricing schemes to gain more profit. The providers have different pricing schemes to charge for computing resourcese. g., Amazon provides three pricing schemes, namely, on-demand pricing, reserved pricing and auction pricing in the same way Microsoft has different schemes like Pay-As-You-Go Subscriptions, Prepaid Subscriptions. The paper presents survey of role of predictive modeling in cloud service pricing. The survey result clearly shows that predictions made by various author are closer to actual outcomes, which highlights the importance of predictive modeling to forecast future demand of cloud computing resources and deciding the price of resources.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"267 1","pages":"249-254"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79810869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Distributed and highly-scalable WAN network attack sensing and sophisticated analysing framework based on Honeypot technology 基于蜜罐技术的分布式、高扩展性广域网攻击感知与复杂分析框架
Daniel Fraunholz, Marc Zimmermann, S. D. Antón, Jörg Schneider, H. Dieter Schotten
Recently, the increase of interconnectivity has led to a rising amount of IoT enabled devices in botnets. Such botnets are currently used for large scale DDoS attacks. To keep track with these malicious activities, Honeypots have proven to be a vital tool. We developed and set up a distributed and highly-scalable WAN Honeypot with an attached backend infrastructure for sophisticated processing of the gathered data. For the processed data to be understandable we designed a graphical frontend that displays all relevant information that has been obtained from the data. We group attacks originating in a short period of time in one source as sessions. This enriches the data and enables a more in-depth analysis. We produced common statistics like usernames, passwords, username/password combinations, password lengths, originating country and more. From the information gathered, we were able to identify common dictionaries used for brute-force login attacks and other more sophisticated statistics like login attempts per session and attack efficiency.
最近,互联性的增加导致僵尸网络中支持物联网的设备数量不断增加。这种僵尸网络目前被用于大规模的DDoS攻击。为了跟踪这些恶意活动,蜜罐已被证明是一个至关重要的工具。我们开发并建立了一个分布式和高度可扩展的WAN蜜罐,并附带了一个后端基础设施,用于对收集的数据进行复杂的处理。为了使处理后的数据易于理解,我们设计了一个图形化的前端,显示从数据中获得的所有相关信息。我们将短时间内在一个源中发起的攻击分组为会话。这丰富了数据,可以进行更深入的分析。我们生成了常见的统计数据,如用户名、密码、用户名/密码组合、密码长度、原始国家等。从收集到的信息中,我们能够识别用于暴力登录攻击的常用字典和其他更复杂的统计数据,如每个会话的登录尝试次数和攻击效率。
{"title":"Distributed and highly-scalable WAN network attack sensing and sophisticated analysing framework based on Honeypot technology","authors":"Daniel Fraunholz, Marc Zimmermann, S. D. Antón, Jörg Schneider, H. Dieter Schotten","doi":"10.1109/CONFLUENCE.2017.7943186","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943186","url":null,"abstract":"Recently, the increase of interconnectivity has led to a rising amount of IoT enabled devices in botnets. Such botnets are currently used for large scale DDoS attacks. To keep track with these malicious activities, Honeypots have proven to be a vital tool. We developed and set up a distributed and highly-scalable WAN Honeypot with an attached backend infrastructure for sophisticated processing of the gathered data. For the processed data to be understandable we designed a graphical frontend that displays all relevant information that has been obtained from the data. We group attacks originating in a short period of time in one source as sessions. This enriches the data and enables a more in-depth analysis. We produced common statistics like usernames, passwords, username/password combinations, password lengths, originating country and more. From the information gathered, we were able to identify common dictionaries used for brute-force login attacks and other more sophisticated statistics like login attempts per session and attack efficiency.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"27 1","pages":"416-421"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83303294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Performance improvement of communication based high speed train control system with packet drops during handover under worst case scenario 基于通信的高速列车控制系统在最坏情况下切换时丢包的性能改进
Rajesh Mishra, Bhupendra Singh, Shobhna Tiwari
Safe operation of rail vehicles is a matter of concern. Communication based train control (CBTC) network is a data communication based automated control network that ensures safety of rail vehicles. In this network status and control command are transmitted using WLAN technology. It has been observed that WLAN is less successful for high speed as because of its design constrains packet drops cannot be avoided. In present work, analysis of random packet drops in CBTC systems during handover process is evaluated. Unlike the existing work that only consider packet drop formulation under specific condition, we analyze system behavior under worst case scenario by varying one parameter over the range and analyze its impact on the packet drop and other related parameters of CBTC system. Simulation results are presented and compared against existing results under specific conditions.
轨道车辆的安全运行是一个值得关注的问题。基于通信的列车控制网络(CBTC)是一种基于数据通信的自动化控制网络,旨在保证轨道车辆的安全。在该网络中,状态和控制命令通过无线局域网技术传输。据观察,WLAN在高速上不太成功,因为它的设计限制无法避免丢包。本文对CBTC系统切换过程中的随机丢包问题进行了分析。与现有工作只考虑特定条件下的丢包形式不同,我们通过在一个范围内改变一个参数来分析最坏情况下的系统行为,并分析其对CBTC系统丢包和其他相关参数的影响。给出了仿真结果,并在特定条件下与现有结果进行了比较。
{"title":"Performance improvement of communication based high speed train control system with packet drops during handover under worst case scenario","authors":"Rajesh Mishra, Bhupendra Singh, Shobhna Tiwari","doi":"10.1109/CONFLUENCE.2017.7943185","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943185","url":null,"abstract":"Safe operation of rail vehicles is a matter of concern. Communication based train control (CBTC) network is a data communication based automated control network that ensures safety of rail vehicles. In this network status and control command are transmitted using WLAN technology. It has been observed that WLAN is less successful for high speed as because of its design constrains packet drops cannot be avoided. In present work, analysis of random packet drops in CBTC systems during handover process is evaluated. Unlike the existing work that only consider packet drop formulation under specific condition, we analyze system behavior under worst case scenario by varying one parameter over the range and analyze its impact on the packet drop and other related parameters of CBTC system. Simulation results are presented and compared against existing results under specific conditions.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"47 1","pages":"412-415"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73496775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparative analysis of joint encryption and watermarking algorithms for security of biomedical images 生物医学图像安全联合加密与水印算法的比较分析
Siddhant Bansal, Garima Mehta
The security of multimedia content such as images while transmission is a cause of concern in current times. Traditional watermarking techniques help in identification of source as well as maintaining patient metadata for biomedical images. Similarly, traditional image encryption techniques allow privacy of patients. There is a need for a two-layer security approach with joint watermarking and encryption, to improve over contemporary methods. This paper presents comparative analysis of various joint encryption and watermarking algorithms of biomedical images to fin d the best pair of algorithms based on previous research. Comparative results also indicate that joint encryption and watermarking algorithms are suitable for security of biomedical images.
多媒体内容(如图像)在传输过程中的安全性是当前人们关注的一个问题。传统的水印技术有助于生物医学图像的源识别和患者元数据的维护。同样,传统的图像加密技术允许患者的隐私。需要一种联合水印和加密的两层安全方法来改进现有的方法。本文对生物医学图像的各种联合加密和水印算法进行了比较分析,在前人研究的基础上找到最佳的算法对。对比结果还表明,联合加密和水印算法适用于生物医学图像的安全。
{"title":"Comparative analysis of joint encryption and watermarking algorithms for security of biomedical images","authors":"Siddhant Bansal, Garima Mehta","doi":"10.1109/CONFLUENCE.2017.7943224","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943224","url":null,"abstract":"The security of multimedia content such as images while transmission is a cause of concern in current times. Traditional watermarking techniques help in identification of source as well as maintaining patient metadata for biomedical images. Similarly, traditional image encryption techniques allow privacy of patients. There is a need for a two-layer security approach with joint watermarking and encryption, to improve over contemporary methods. This paper presents comparative analysis of various joint encryption and watermarking algorithms of biomedical images to fin d the best pair of algorithms based on previous research. Comparative results also indicate that joint encryption and watermarking algorithms are suitable for security of biomedical images.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"615 1","pages":"609-612"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77362456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A study on prediction of breast cancer recurrence using data mining techniques 基于数据挖掘技术的乳腺癌复发预测研究
Uma Ojha, Savita Goel
Breast cancer is the most common cancer in women and thus the early stage detection in breast cancer can provide potential advantage in the treatment of this disease. Early treatment not only helps to cure cancer but also helps in its prevention of its recurrence. Data mining algorithms can provide great assistance in prediction of earl y stage breast cancer that always has been a challenging research problem. The main objective of this research is to find how precisely can these data mining algorithms predict the probability of recurrence of the disease among the patients on the basis of important stated parameters. The research highlights the performance of different clustering and classification algorithms on the dataset. Experiments show that classification algorithms are better predictors than clustering algorithms. The result indicates that the decision tree (C5.0) and SVM is the best predictor with 81% accuracy on the holdout sample and fuzzy c-means came with the lowest accuracy of37% among the algorithms used in this paper.
乳腺癌是妇女中最常见的癌症,因此早期发现乳腺癌可以为治疗这种疾病提供潜在的优势。早期治疗不仅有助于治愈癌症,而且有助于预防癌症复发。数据挖掘算法可以为早期乳腺癌的预测提供很大的帮助,这一直是一个具有挑战性的研究问题。本研究的主要目的是发现这些数据挖掘算法在重要的既定参数的基础上预测患者疾病复发的概率有多精确。该研究重点研究了不同聚类和分类算法在数据集上的性能。实验表明,分类算法比聚类算法具有更好的预测效果。结果表明,在本文使用的算法中,决策树(C5.0)和支持向量机是最好的预测器,对滞留样本的预测精度为81%,模糊c-means的预测精度最低,为37%。
{"title":"A study on prediction of breast cancer recurrence using data mining techniques","authors":"Uma Ojha, Savita Goel","doi":"10.1109/CONFLUENCE.2017.7943207","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943207","url":null,"abstract":"Breast cancer is the most common cancer in women and thus the early stage detection in breast cancer can provide potential advantage in the treatment of this disease. Early treatment not only helps to cure cancer but also helps in its prevention of its recurrence. Data mining algorithms can provide great assistance in prediction of earl y stage breast cancer that always has been a challenging research problem. The main objective of this research is to find how precisely can these data mining algorithms predict the probability of recurrence of the disease among the patients on the basis of important stated parameters. The research highlights the performance of different clustering and classification algorithms on the dataset. Experiments show that classification algorithms are better predictors than clustering algorithms. The result indicates that the decision tree (C5.0) and SVM is the best predictor with 81% accuracy on the holdout sample and fuzzy c-means came with the lowest accuracy of37% among the algorithms used in this paper.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"61 1","pages":"527-530"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88489020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Lexicalizing linked data for a human friendly web 为人类友好的网络词汇化链接数据
Rivindu Perera, P. Nand, Wen-Hsin Yang, Kohichi Toshioka
The consumption of Linked Data has dramatically increased with the increasing momentum towards semantic web. Linked data is essentially a very simplistic format for representation of knowledge in that all the knowledge is represented as triples which can be linked using one or more components from the triple. To date, most of the efforts has been towards either creating linked data by mining the web or making it available for users as a source of knowledgebase for knowledge engineering applications. In recent times there has been a growing need for these applications to interact with users in a natural language which required the transformation of the linked data knowledge into a natural language. The aim of the RealText project described in this paper, is to build a scalable framework to transform Linked Data into natural language by generating lexicalization patterns for triples. A lexicalization pattern is a syntactical pattern that will transform a given triple into a syntactically correct natural language sentence. Using DBpedia as the Linked Data resource, we have generated 283 accurate lexicalization patterns for a sample set of 25 ontology classes. We performed human evaluation on a test sub-sample with an inter-rater agreement of 0.86 and 0.80 for readability and accuracy respectively. This results showed that the lexicalization patterns generated language that are accurate, readable and emanates qualities of a human produced language.
随着语义网的发展,关联数据的消耗量急剧增加。链接数据本质上是一种非常简单的知识表示格式,因为所有的知识都表示为三元组,可以使用三元组中的一个或多个组件进行链接。到目前为止,大多数的努力都是通过挖掘网络来创建链接数据,或者将其作为知识工程应用程序的知识库来源提供给用户。近年来,这些应用程序越来越需要以自然语言与用户交互,这需要将关联数据知识转换为自然语言。本文中描述的RealText项目的目标是构建一个可扩展的框架,通过生成三元组的词法化模式将关联数据转换为自然语言。词汇化模式是一种语法模式,它将给定的三元组转换为语法正确的自然语言句子。使用DBpedia作为关联数据资源,我们已经为25个本体类的样本集生成了283个准确的词汇化模式。我们对测试子样本进行了人工评估,其可读性和准确性的评分一致性分别为0.86和0.80。结果表明,词汇化模式生成的语言是准确的、可读的,并散发出人类产生的语言的品质。
{"title":"Lexicalizing linked data for a human friendly web","authors":"Rivindu Perera, P. Nand, Wen-Hsin Yang, Kohichi Toshioka","doi":"10.1109/CONFLUENCE.2017.7943119","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943119","url":null,"abstract":"The consumption of Linked Data has dramatically increased with the increasing momentum towards semantic web. Linked data is essentially a very simplistic format for representation of knowledge in that all the knowledge is represented as triples which can be linked using one or more components from the triple. To date, most of the efforts has been towards either creating linked data by mining the web or making it available for users as a source of knowledgebase for knowledge engineering applications. In recent times there has been a growing need for these applications to interact with users in a natural language which required the transformation of the linked data knowledge into a natural language. The aim of the RealText project described in this paper, is to build a scalable framework to transform Linked Data into natural language by generating lexicalization patterns for triples. A lexicalization pattern is a syntactical pattern that will transform a given triple into a syntactically correct natural language sentence. Using DBpedia as the Linked Data resource, we have generated 283 accurate lexicalization patterns for a sample set of 25 ontology classes. We performed human evaluation on a test sub-sample with an inter-rater agreement of 0.86 and 0.80 for readability and accuracy respectively. This results showed that the lexicalization patterns generated language that are accurate, readable and emanates qualities of a human produced language.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"29 1","pages":"30-35"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91540813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1