{"title":"Separable reversible data hiding using Rc4 algorithm","authors":"V. Suresh, C. Saraswathy","doi":"10.1109/ICPRIME.2013.6496466","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496466","url":null,"abstract":"In this paper, the problem of transmitting redundant data over an insecure, bandwidth-constrained communications channel is discussed. A content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. Using data hiding key the receiver can extract additional data even the receiver has no information about the original image content. Using the decryption key the receiver can extract data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding key and the encryption key, the receiver can extract the additional data and the original imagewithout any loss.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114178609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protein sequence motif patterns using adaptive Fuzzy C-Means granular computing model","authors":"M. Chitralegha, K. Thangavel","doi":"10.1109/ICPRIME.2013.6496454","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496454","url":null,"abstract":"Data Mining is the process to extract hidden predictive information from large databases. In Bioinformatics, data mining enables researchers to meet the challenge of mining large amount of biomolecular data to discover real knowledge. Major research efforts done in the area of bioinformatics involves sequence analysis, protein structure prediction and gene finding. Proteins are said to be prominent molecules in our cells. They involve virtually in all cell functions. The activities and functions of proteins can be determined by protein sequence motifs. These protein motifs are identified from the segments of protein sequences. All segments may not be important to produce good motif patterns. The generated sequence segments do not have classes or labels. Hence, unsupervised segment selection technique is adopted to select significant segments. Therefore Singular Value Decomposition (SVD) entropy method is adopted to select significant sequence segments. In this proposed work, weighted K-Means and Adaptive Fuzzy C-Means have been applied to the selected segments to generate granules, since large amount of segments cannot be grouped or clustered as such. Each granules generated by weighted K-Means algorithm are further clustered by using the K-Means algorithm and granules generated by Adaptive Fuzzy C-Means algorithm are clustered by using Weighted K-Means. The two proposed models are compared with K-Means granular computing model. The experimental results show that Adaptive Fuzzy C-Means with Weighted K-Means technique produces better results than K-Means and weighted K-Means granular computing methods.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114704963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile application testing — Challenges and solution approach through automation","authors":"B. Kirubakaran, V. Karthikeyani","doi":"10.1109/ICPRIME.2013.6496451","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496451","url":null,"abstract":"By the time this paper has been presented, the mobile app landscape will have changed. New OS versions will have been released. A bunch of new devices will have hit the market. And mobile application testing will have become that much more complex and challenging for all of us. There is no doubt that mobile applications need specific testing approaches. This paper wants to investigate new directions in research on the type of testing and skills required on mobile app testing by answering the following three research questions: (RQ1) How mobile applications testing are so different from traditional web applications, that require specialized testing skills and techniques?, (RQ2) What are the new challenges and future trends in mobile application testing, and (RQ3) How far automation effective in testing mobile application?. We answer those questions by analyzing the current trends in mobile application development and testing, and by proposing my view on the topic.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"18 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120837612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Palanisamy, Perumal, K. Thangavel, R. Manavalan
{"title":"A novel approach to select significant genes of leukemia cancer data using K-Means clustering","authors":"P. Palanisamy, Perumal, K. Thangavel, R. Manavalan","doi":"10.1109/ICPRIME.2013.6496455","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496455","url":null,"abstract":"DNA microarray technologies are leading to an explosion in available gene expression data which simultaneously monitor the expression pattern of thousands of genes. All the genes may not be biologically significant in diagnosing the disease. In this paper, a novel approach has been proposed to select significant genes of leukemia cancer using K-Means clustering algorithm. It is an unsupervised machine learning approach, which is being used to identify the unknown patterns from the huge amount of data. The proposed K-Means algorithm has been experimented to cluster the genes for K=5,10 and 15. The significant genes have been identified through the best accuracy obtained from the clusters generated. The accuracy of the clusters are determined again by using K-Means algorithm compared with ground truth values.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134212324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of routing protocols for VANET in urban scenarios","authors":"P. S. Nithya Darisini, N. Kumari","doi":"10.1109/ICPRIME.2013.6496522","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496522","url":null,"abstract":"Vehicular Ad hoc Network (VANET) is a subset of Mobile Ad hoc Networks (MANET), which forms wireless networks between vehicles. For better communication among these vehicles, an efficient routing protocol withstanding the dynamic topology of the vehicles plays a vital role. Routing in urban scenarios is highly challenging owing to irregularity in the distribution of vehicle nodes, their mobility pattern and obstacles in the propagation path. This paper focuses on the survey of various routing protocols proposed for VANETs in city environments.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127342110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient image retrieval using central tendency","authors":"R. Malini, C. Vasanthanayaki","doi":"10.1109/ICPRIME.2013.6496448","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496448","url":null,"abstract":"This paper aims to improve the effectiveness of retrieving images on the basis of color content. The paper is organized as follows. Firstly, a mean based technique with reduced feature vector is proposed. Secondly, a new idea to extract the features of an image based on the measure of central tendency is proposed. The proposed mean based technique is compared with existing color averaging techniques for retrieval speed and memory requirement. Finally the proposed mean based technique is compared with the measures of central tendency for retrieval efficiency. The proposed CBIR techniques are tested on generic image database and indexed image database. Experimental results shows that proposed method based on the measures of central tendency gives better performance in terms of higher precision and recall values with less computational complexity.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129088234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimating incremental dimensional algorithm with sequence data set","authors":"S. Adaekalavan","doi":"10.1109/ICPRIME.2013.6496461","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496461","url":null,"abstract":"Recently, there has been enormous growth in the amount of commercial and scientific data, such as protein sequences, retail transactions, and web-logs. In this paper, the scholar proposes a new approach for robust hierarchical clustering based on the distance function between each data object and the cluster centers. This method avoids the need to compute the distance of each data object to the cluster center. It saves running time. The experimental results showed that the best clusters were obtained using EIDA method, this suggests that this similarity measure would be applicable to sequence data sets.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116447869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Huffman and Lempel-Ziv based data compression algorithms for wireless sensor networks","authors":"S. Renugadevi, P. S. Nithya Darisini","doi":"10.1109/ICPRIME.2013.6496521","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496521","url":null,"abstract":"In the recent years, wireless sensor networks have gained increasing attention from both the research community and actual users. As sensor nodes are generally battery powered devices, it is essential to minimize the energy consumption of the nodes so that the network lifetime can be extended. Most of the energy is consumed in the processing and transmission of data. Applying compression algorithms on the wireless sensor data prior to transmission is one of the efficient ways to save energy. In this paper we propose data compression algorithms based on Huffman and Lempel-Ziv techniques and compare the efficiency of different algorithms in a wireless sensor network scenario.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121903856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal pattern search for database systems","authors":"R. Vangipuram, P. V. Kumarz, V. Janaki","doi":"10.1109/ICPRIME.2013.6496720","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496720","url":null,"abstract":"Many time series database applications require processing and analyzing database sequences where the focus is on finding the patterns and trends in sequence data. In this paper, the approach carried out is based on the observation that finding sequential patterns in databases is somehow similar to searching for a phrase in the text. However instead of searching for sequence of letters usually from finite alphabet, we search for sequence of tuple with rich structure and infinite possibilities from both ends of the sequential database. We take the algorithm of Boyer moore used for text and generalize it to search for complex sequence patterns of interest in a given database by exploiting the logical interdependencies between the elements of a sequential pattern having constraints.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116995267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Instance and value (IVH) algorithm and dodging dependency for scheduling multiple instances in hybrid cloud computing","authors":"B. Kumar, T. Ravichandran","doi":"10.1109/ICPRIME.2013.6496511","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496511","url":null,"abstract":"Cloud computing is designed such a way to avoid over-provisioning when used with utility pricing. It also removes the need to over-provision in order to meet the demands of users. It involves multitenancy and multitasks, i.e., many customers can perform different tasks, accessing a single or multiple application instances. Sharing resources among a large pool of users assists in reducing infrastructure costs and peak load capacity. Due to the raise in convention of many applications currently, there is necessitating for high processing and storage capacity along with the consideration of cost and instance use. To provide proficient resources, Cloud computing is been pioneered. Many organizations have their own private cloud, but when there is need for extra resources they go for public cloud where they have been outlaid for their use. In such “pay-per-use”, workflow execution cost must be considered during scheduling based on users' QoS constraints. It is an algorithm that calculates an optimal value and instance for it. Using simulation, we have compared the performance of our proposed approach with the existing scheduling strategies for different type and size of workflows. The IVH algorithm comes to the decision of desiring which resource should be chartered from public providers.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129118496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}