2013 International Conference on Recent Trends in Information Technology (ICRTIT)最新文献

筛选
英文 中文
Efficient and secure routing protocol for wireless sensor networks 无线传感器网络的高效安全路由协议
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844274
G. Subramanian, R. Amutha
{"title":"Efficient and secure routing protocol for wireless sensor networks","authors":"G. Subramanian, R. Amutha","doi":"10.1109/ICRTIT.2013.6844274","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844274","url":null,"abstract":"Recent technology advances have made it conceivable to place wireless sensor networks in many applications. The wireless nodes of these networks will be comprised of a transducer (sensor or actuator), communications circuitry, and behavior logic. These nodes will be embedded in ceiling tiles, in factory equipment, in farmland, and on the battlefield, and will locate things, sense danger, and control the environment with minimal human effort. Crucial to the success of these ubiquitous networks is the availability of small, lightweight, low-cost nodes. Even more important, the nodes must consume ultra-low power to eliminate frequent battery replacement. In this paper we proposed an Efficient and Secure Routing Protocol (ESRP) for WSN. We used NS-2 to simulate our proposed protocol.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124933436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance evaluation of LDPC coded MIMO transceiver with equalization 带均衡的LDPC编码MIMO收发器性能评价
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844196
T. Deepa, R. Kumar
{"title":"Performance evaluation of LDPC coded MIMO transceiver with equalization","authors":"T. Deepa, R. Kumar","doi":"10.1109/ICRTIT.2013.6844196","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844196","url":null,"abstract":"A Multiple Input, Multiple Output (MIMO) system has multiple antennas and multiple radios. In MIMO systems, data will arrive at the receiver at different times through different paths to improve the quality of the data link. MIMO technology has attracted attention in radio communications, because it offers significant increases in data throughput and link range without additional bandwidth or increased transmit power. In the MIMO system, forward error correction coding is essential for high data rate communications. Recently, low-density parity-check (LDPC) codes have attracted much attention as good error correcting codes. In this paper, we propose a new LDPC coded MIMO system with equalization such as minimum mean square error (MMSE) and maximum likelihood detectors (MLD). Simulation result show that the coded MIMO system with MLD can achieve the good error rate performance comparing to coded MIMO system with MMSE.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121919095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards predictive maintenance and management in rail sector: A clustering approach 面向铁路部门的预测性维护和管理:一种集群方法
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844254
J. V. Antony, G. M. Nasira
{"title":"Towards predictive maintenance and management in rail sector: A clustering approach","authors":"J. V. Antony, G. M. Nasira","doi":"10.1109/ICRTIT.2013.6844254","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844254","url":null,"abstract":"It is accepted beyond doubt that the back bone of mass transportation in India is Railways and it is regarded as the lifeline of the nation. Indian Railways is using various information technology based systems to maintain and manage its infrastructural resources, leading to generation and accumulation of voluminous data. The data captured is expected to possess hidden meaning and trend which, if properly explored and modelled, can aid in implementing the new paradigm called Predictive Maintenance and Management. The thrust to usher in the new paradigm amply manifests in its Vision 2020 statement, too. The paper aims to showcase a methodology using Clustering, a Data Mining Technique that can bring in a maintenance plan built upon the predictive behaviour exhibited by failure data. The model outlined here has been tested on actual failure data pertaining to passenger carrying vehicles of trains.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123217506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multi-index technique for metadata management in private cloud storage 私有云存储中元数据管理的多索引技术
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844185
B. Prabavathy, M. Devi, C. Babu
{"title":"Multi-index technique for metadata management in private cloud storage","authors":"B. Prabavathy, M. Devi, C. Babu","doi":"10.1109/ICRTIT.2013.6844185","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844185","url":null,"abstract":"Cloud computing provides computing, storage and software resources as services to users on-demand over the Internet. Cloud computing has been increasingly gaining popularity due to the benefits such as its access capability from any location, sharing of data across multiple data centers, and the management of data storage by the service providers. Since security is still an unresolved issue in public cloud storage, business critical data can be preferably maintained in private cloud storage. It is normally built with the utilization of unused commodity machines. As storage space is limited in private cloud storage, it has to be efficiently utilized. Hence, a specialized technique known as deduplication is used to reduce the data footprint in the storage. This technique splits the file into several chunks. Chunks of different files are compared against each other to ensure only unique chunks are stored in the storage. Chunk index maintains the chunkID and the location of the actual chunk for reconstructing the file. Whenever a file is stored in the storage system, corresponding metadata is also placed along with it to facilitate the retrieval of that file. Metadata generally includes the properties of the file and the beginning location of physical block of the file. In deduplication enabled cloud storage system, since the file is stored in the form of a collection of chunks, chunk index also need to be maintained in addition to metadata. This improves the search time of a particular file. Thus, the efficiency of the chunk indexing mechanism will directly influence the file retrieval time. In order to achieve faster retrieval time, this paper proposes multi-index structure for metadata management.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"488 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131786741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Comparison of encoding techniques for transmission of image data obtained using compressed sensing in wireless sensor networks 无线传感器网络中压缩感知图像数据传输编码技术的比较
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844285
A. Loganathan, R. Hemalatha, S. Radha
{"title":"Comparison of encoding techniques for transmission of image data obtained using compressed sensing in wireless sensor networks","authors":"A. Loganathan, R. Hemalatha, S. Radha","doi":"10.1109/ICRTIT.2013.6844285","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844285","url":null,"abstract":"The Wireless Sensor Network (WSN) has limitations in bandwidth and computational resources as they have limited communication and storage capabilities. WSN consists of cameras, which have some local image processing and one or more central computers, where image data from multiple cameras is further processed and fused. Because of these limitations, the encoding techniques used for transmitting the image data should be efficient in order to make use of the available resources properly. A new sampling method is also introduced in the Image/video encoder of the WSN called Compressed Sensing (CS), which is the process of acquiring and reconstructing a signal that is supposed to be sparse or compressible, thus reducing the computational complexity. The image is divided into dense and sparse components by applying 2 levels of wavelet transform. The dense component uses the standard encoding procedure such as JPEG and the sparse measurements obtained from the sparse components are encoded by the techniques such as Exponential Golomb coding followed by Run-length encoding and arithmetic coding and the performances in terms of compression ratio and bits per pixel are compared. The recovery algorithm may be anyone supporting the compressed sensing technique such as OMP, POCS etc. In this work, the measurements (used in CS) and the predicted sparse components as the initial values, the projection onto convex set (POCS) recovery algorithm is used to get back the original sparse components of two levels and hence the original image by applying the inverse of transform to the dense and recovered sparse components.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131895658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An approach for evaluating the functional and non-functional change factors of web service using Finite State Machine 一种利用有限状态机评估web服务的功能性和非功能性变化因素的方法
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844281
M. Thirumaran, P. Dhavachelvan, D. Aishwarya
{"title":"An approach for evaluating the functional and non-functional change factors of web service using Finite State Machine","authors":"M. Thirumaran, P. Dhavachelvan, D. Aishwarya","doi":"10.1109/ICRTIT.2013.6844281","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844281","url":null,"abstract":"Today organizations in all industries particularly financial services, retail and communications are increasingly dependent upon IT and a highly available network to meet their business objectives. The necessity for change increases with the market demand and technology. Though there are many existing change management approaches to satisfy the normal changes, they fail to support the evaluation of dynamic changes within the business constraint based on both functional and nonfunctional behavior of the services undergone changes. Apart from this, there is no proper model that provides a legitimate manifest of the service quality parameters which are deviated from their threshold to the analyst. In order to provide a flexible environment for the Business Analyst to perform the emergency changes over the service business logic without the need of IT staff and also to evaluate changes made, we propose a Finite State Machine based evaluation methodology for web service change management. The key benefit of this approach is it primarily evaluates the functional change factors then concurrently it evaluates the non functional factors which are deviated from their threshold value. The set of quality centric change factors with their QoS measures are successfully evaluated through this approach within the expected reaction time.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131073994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Measuring language similarity using trigrams: Limitations of language identification 使用三元组测量语言相似度:语言识别的局限性
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844250
Nathaniel Oco, J. Ilao, R. Roxas, Leif Romeritch Syliongka
{"title":"Measuring language similarity using trigrams: Limitations of language identification","authors":"Nathaniel Oco, J. Ilao, R. Roxas, Leif Romeritch Syliongka","doi":"10.1109/ICRTIT.2013.6844250","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844250","url":null,"abstract":"Computational approaches in language identification often result in highnumber of false positivesand low recall rates, especially if the languages involved come from the same subfamily. In this paper, we aim to determine the cause of this problemby measuring language similarity through trigrams. Religious and literary texts were used as training data. Our experiments involving language identification show that the number of common trigrams for a given language pair is inversely proportional to precision and recall rates, whereas the average word length is directly proportional to the number of true positives. Future directions include improving language modeling and providing an approach to increase precision and recall.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134633741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design of Smart e-Tongue for the physically challenged people 残障人士智能电子舌的设计
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844221
M. Delliraj, S. Vijayakumar
{"title":"Design of Smart e-Tongue for the physically challenged people","authors":"M. Delliraj, S. Vijayakumar","doi":"10.1109/ICRTIT.2013.6844221","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844221","url":null,"abstract":"Tongue and Ear plays a major role for speaking and hearing by normal person. But it is impossible to speak and hear by deaf and dumb people. But they normally speak using their sign action with others. It is easily understood by their community, but they fell difficult when they communicate with normal people because normal person can't able to understand their sign symbol. To tackle this situation we design a system which converts their sign symbol to text as well as voice output and normal person's voice to corresponding sign symbol for two way communication. This system has flex sensor and IMU (Inertial Measurement Unit) to recognize their sign symbol, speech synthesis chip for voice output and speech recognizing module for converting voice to sign symbol. These are interfaced with microcontroller, which is programmed to obtain corresponding output.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133293387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance analysis on image acquisition techniques in edge detection 边缘检测中图像采集技术的性能分析
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844193
G. Bhuvaneswari, V. S. Bharathi
{"title":"Performance analysis on image acquisition techniques in edge detection","authors":"G. Bhuvaneswari, V. S. Bharathi","doi":"10.1109/ICRTIT.2013.6844193","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844193","url":null,"abstract":"Image Acquisition is the first stage of any vision systems that refers to the collection of data required to form an image. This paper consider three image acquisition methods such as Traditional Monocular vision, RTI (Reflectance Transformation Imaging) and Proposed shadow Stereopsis. These acquired images are then applied into edge detection process for comparison. Analysis are performed in terms of computation time and various performance measures such as Hamming distance, Peak Signal to Noise Ratio(PSNR) and Mean Square Error(MSE). Comparisons with the best available results are given in order to illustrate the best possible technique that can be used as powerful image acquisition method. This paper helps us for improving the perception of details, features and overall shape characteristics from images which are further useful in the study of ancient archeological stone writings.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133421217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting forensically relevant information from PE executables 从PE可执行文件中检测法医相关信息
2013 International Conference on Recent Trends in Information Technology (ICRTIT) Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844216
Shany Jophin, Meera Vijayan, S. Dija
{"title":"Detecting forensically relevant information from PE executables","authors":"Shany Jophin, Meera Vijayan, S. Dija","doi":"10.1109/ICRTIT.2013.6844216","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844216","url":null,"abstract":"Cyber forensics analysis is the procedure to find crucial evidence with respect to a crime from a digital media. Malware forensics and Network security plays a crucial role in the current scenario where malware attacks are a common problem. A malicious software which can be commonly termed as a malware would cause interruption to a computer operation and may collect necessary information or illegally access private systems. A malware may either take the form of a script, code, spyware and many other kinds of malicious programs. Reverse engineering principles are applied in this domain to analyze malware. It is the comprehensive process of breaking software to figure out how it works. This paper proposes an advanced and resource friendly malware forensics analysis procedure which uses the principles of static analysis to figure out the exact purpose of an executable file. Portable executable format can be explored with higher accuracy using the proposed method.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116095658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信