2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)最新文献

筛选
英文 中文
Enhanced spread spectrum image watermarking with compression-encryption technique 利用压缩加密技术增强扩频图像水印
2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 2014-01-01 DOI: 10.1109/ISCO.2014.7103956
G. Bhargava, Abhishek Mathur
{"title":"Enhanced spread spectrum image watermarking with compression-encryption technique","authors":"G. Bhargava, Abhishek Mathur","doi":"10.1109/ISCO.2014.7103956","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103956","url":null,"abstract":"In this paper we work on the watermarking through which we can improve the security. In this technique the whole watermark image is embed in the original image. The embedding process can improve the security of the image. Security plays an important role during the transmission of message or data from sender to receiver. In this paper we use a combination of compression and encryption technique and then watermarking. In this first of all compression is performed, we use the JPEG2000 compression technique, JPEG2000 use the core compression algorithm Embedded Block Coding with Optimized Truncation (EBCOT), The EBCOT algorithm provide the superior compression performance and on that compressed image encryption is performed, we use the RC4 encryption technique, when encryption is completed then on that encrypted image watermarking is applied. In our proposed work we can divide the watermark image into blocks. In this we can calculate the kernel of the original image through which we can find the area where the watermark image is embed. Here we propose an efficient technique of spread spectrum watermarking which provides less attacks as compared to the other existing technique.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133538003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey 基于数据挖掘技术的网络入侵检测系统高效分类机制综述
2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 2013-11-13 DOI: 10.1109/ISCO.2014.7103959
Subaira A S, P. Scholar, Mrs Anitha P
{"title":"Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey","authors":"Subaira A S, P. Scholar, Mrs Anitha P","doi":"10.1109/ISCO.2014.7103959","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103959","url":null,"abstract":"In spite of growing information system widely, security has remained one hard-hitting area for computers as well as networks. In information protection, Intrusion Detection System (IDS) is used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining is an efficient artifice applied to intrusion detection to ascertain a new outline from the massive network data as well as it used to reduce the strain of the manual compilations of the normal and abnormal behavior patterns. This piece of writing reviews the present state of data mining techniques and compares various data mining techniques used to implement an intrusion detection system such as, Support Vector Machine, Genetic Algorithm, Neural network, Fuzzy Logic, Bayesian Classifier, K-Nearest Neighbor and decision tree Algorithms by highlighting a advantage and disadvantages of each of the techniques.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122726299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Power aware and topology aware ad-hoc on-demand multipath distance vector routing for MANET 面向MANET的功率感知和拓扑感知自组织按需多径距离矢量路由
2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2014.7103929
V. Lalitha, R. Rajesh
{"title":"Power aware and topology aware ad-hoc on-demand multipath distance vector routing for MANET","authors":"V. Lalitha, R. Rajesh","doi":"10.1109/ISCO.2014.7103929","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103929","url":null,"abstract":"Our earlier work [1] [2] shows interesting characteristics of transmission range/power of the MANET nodes on the performance of multipath MANET routing protocol. The objective of this work is to improve the performance of a MANET multi-path routing protocol without increasing or decreasing its default transmission range of the nodes. The proposed work is to control the routing process and only allow hops with maximum possible distances in a route based on the received signal strength at each node. We propose topology aware and power aware ad hoc on-demand multipath distance vector routing protocol based on the maximum transmission range. We call this model as AOMDV_RR Range Routing and implemented it under ns2 by improving the standard AOMDV protocol. We studied the proposed AOMDV_RR and the standard AOMDV under different network densities and measured the performance for suitable metrics. Measurable difference in performance was realized and the proposed AOMDV_RR performed better than normal AOMDV with respect to metrics network overhead, throughput and energy consumption.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114995034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reduction of energy consumption using SPM and optimal code layout in embedded systems 在嵌入式系统中使用SPM和优化代码布局来降低能耗
2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2014.7103961
S. Lavanya, B. Anuradha
{"title":"Reduction of energy consumption using SPM and optimal code layout in embedded systems","authors":"S. Lavanya, B. Anuradha","doi":"10.1109/ISCO.2014.7103961","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103961","url":null,"abstract":"In the multiprocessing embedded system the efficient use of the on-chip and off-chip memory code repositioning is done. For the purpose of improvement in the embedded system the SPM and cache is used for the code processing. The code layout is developed to place the code in memory for the preventing the cache conflicts and misses. Even though many researchers have illustrated the use of SPM and cache to improve the efficiency, combining these two was not done. In this study the comparison of energy consumption is done while code processing is done by three models namely 1) ILP model 2) Heuristic model 3) two stage meta-heuristic model. In the above two stage Meta heuristic model is the proposed model in which along with the SPM and Cache code layout is developed to place the code in it. The result reveals that compared to other two models the two stage meta-heuristic model yield more efficiency and consume less energy than other two models. As much as approximately 55% of additional energy can be saved by applying both code repositioning and SPM code selection techniques in this model.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"15 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116854128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of optimization of composite structures with respect to industrial applications 面向工业应用的复合材料结构优化研究
2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2014.7103913
M. V. A. Raju Bahubalendruni, B. B. Biswal
{"title":"Study of optimization of composite structures with respect to industrial applications","authors":"M. V. A. Raju Bahubalendruni, B. B. Biswal","doi":"10.1109/ISCO.2014.7103913","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103913","url":null,"abstract":"This paper analyses the existing methodology of employing optimization techniques for structuraloptimisation of laminated composites at part level (local optimization) and also the limitations of this part level structural optimisation approach in industrial applications. The deviations observed in optimisation problem definition due to implementation of part level optimized solution at the assembly level (global optimisation) are presented. Multi shell closed structure is considered to carry out the numerical experiments, due to the reason; most of the structures of aircraft wing, wind turbine blade and helicopter rotor blades exhibit this configuration. Part level optimization is carried out on a single plate element of a multi shell closed structure and the optimized plate element is replaced in the multi shell closed structure. The observations made after replacement of optimized plate element through performing the numerical experiments are presented and well discussed.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124587163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advisory committee 咨询委员会
2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/iccitechn.2014.7073057
Advisory Committee
{"title":"Advisory committee","authors":"Advisory Committee","doi":"10.1109/iccitechn.2014.7073057","DOIUrl":"https://doi.org/10.1109/iccitechn.2014.7073057","url":null,"abstract":"Dr.Akhtar Kalam, Victoria University, Melbourne, Australia Dr.Jordan Hristov, University of Chemical Technology and Metallurgy, Bulgaria Dr.Aladin Zayegh, Victoria University, Australia Dr.Subramaniam Ganesan, Oakland University, Rochester, USA Dr.Narottam Das, Curtin University, Australia Dr.Paulraj Murugesa Pandiyan, Universiti Malaysia Perlis. Dr.Kannan Murugesan, Kolej University Linton,Malaysia. Dr.S.Thangaprakash, Bandar Universiti Teknologi Legenda, Malaysia Dr.Chellappan Vijila, Institute of Materials Research and Engineering (IMRE), Singapore Dr.Valentina Emilia Balas, University of Arad, Romania Dr.Marimuthu Palaniswamy, University of Melbourne, Victoria, Australia Dr.Angappa Gunasekaran, Charlton College of Business United States Dr.Immanuel Edinbarough, University of Texas, USA Prof.Jayashri Ravishankar, University of New South Wales, Australia Prof.Kannan J.Krishanan, Victoria University, Australia","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130362971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of mechanical properties and experimental comparison of Mig and Friction stir welding processes for aa6082-t6 aluminium alloy aa6082-t6铝合金Mig焊和搅拌摩擦焊力学性能研究及试验比较
2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2014.7103922
K. Anganan, J. Murali, M. Krishnan, K. Marimuthu
{"title":"Study of mechanical properties and experimental comparison of Mig and Friction stir welding processes for aa6082-t6 aluminium alloy","authors":"K. Anganan, J. Murali, M. Krishnan, K. Marimuthu","doi":"10.1109/ISCO.2014.7103922","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103922","url":null,"abstract":"In this study, the mechanical properties of welded joints of AA-6082-T6 aluminium alloy obtained with friction stir welding (FSW) and conventional metal inert gas welding (MIG) were studied. FSW welds were carried out on a Friction stir welding machine. The performance of FSW and MIG welded joints were identified using tensile, metallographic and hardness tests. The joints obtained with FSW and MIG processes were also assessed for distortion that accompanied the welding processes. Taking into consideration the process conditions and requirements, FSW and MIG processes were also compared with each other to understand the advantages and disadvantages of the processes for welding applications of studied Al alloy. Better tensile strength was obtained with FSW welded joints. The width of the heat affected zone of FSW was narrower than MIG welded joints. The results show that FSW improves the mechanical properties of welded joints.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122269783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient fixed width multiplier for digital filter 一种用于数字滤波器的高效定宽乘法器
2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2014.7103926
S. Nithya, M. Nithya
{"title":"An efficient fixed width multiplier for digital filter","authors":"S. Nithya, M. Nithya","doi":"10.1109/ISCO.2014.7103926","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103926","url":null,"abstract":"We implement a high speed and low power FIR digital filter design using the fixed width booth multiplier. To reduce the truncation error in fixed width multiplier Adaptive Conditional Probability Estimator is used (ACPE). To achieve higher speed, the modified Booth encoding has been used and also to speed up the addition the carry look ahead adder is used as a carry propagate adder. The multiplier circuit is designed using VERILOG and synthesized using Xilinx ISE9.2i simulator. The area, power and delay of the designed filter is analysed using cadence tool.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A simple and efficient heuristic algorithm for maximum clique problem 求解最大团问题的一种简单高效的启发式算法
2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2014.7103958
K. Singh, L. Govinda
{"title":"A simple and efficient heuristic algorithm for maximum clique problem","authors":"K. Singh, L. Govinda","doi":"10.1109/ISCO.2014.7103958","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103958","url":null,"abstract":"A clique is a sub graph in which all pairs of vertices are mutually adjacent. A maximum clique is a maximum collection of objects which are mutually related in some specified criterion. This paper proposes an efficient heuristic approach for finding maximum clique using minimal independent set in a graph. At each recursive step, the algorithm finds minimal independent vertices for further expansion to get adjacent list, reason is that at the depth, the maximum clique most likely would include either of the vertices of minimal independent set. Further a pruning strategy is used to abort smaller size of clique to be explored.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132511526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Real time navigation strategies for webots using fuzzy controller 基于模糊控制器的网络机器人实时导航策略
2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2014.7103910
K. K. Pandey, P. K. Mohanty, D. Parhi
{"title":"Real time navigation strategies for webots using fuzzy controller","authors":"K. K. Pandey, P. K. Mohanty, D. Parhi","doi":"10.1109/ISCO.2014.7103910","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103910","url":null,"abstract":"Since last decade, designing of an autonomous mobile robot for complex systems involves the interaction between numerous heterogeneous components (software and hardware) and according to its application; they are heavily used in environments where human involvement is restricted, unmanageable, or hazardous. For researchers, the proper movement of robot inside working environment is the challenging tasks; accordingly, day by day research has been made on navigation system of mobile robot. As a result, we design mobile robot controller algorithms that helps mobile robot to navigate in environment according to given task and avoid obstacle. In order to avoid obstacles in efficient manner and to reach the goal position through complicated path (i.e. surrounded by various types of obstacles), we designed sensor integration based fuzzy logic controller that transform the direction of mobile robot according to obstacle position and create collision free path. To create a collision free path certain input parameter, output parameter, fuzzy membership functions and `If-Then rule' fuzzy interface system are executed in algorithm. All these information are combined together to map the environment. To attain the collision free path, obstacle avoidance is done through changing the steering angle at point to point with the help of sensor network. The controller covers the environment at which starting point, goal point and obstacle position is known. Priority is made to avoid the obstacle during goal seeking behavior by the robot. The efficiency of the recommended technique is confirmed by a succession of simulations. To check the simulation result for proposed controller, 3D Physics-based simulation software is used.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115137652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信