2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering最新文献

筛选
英文 中文
Separable reversible data hiding using Rc4 algorithm 基于Rc4算法的可分离可逆数据隐藏
V. Suresh, C. Saraswathy
{"title":"Separable reversible data hiding using Rc4 algorithm","authors":"V. Suresh, C. Saraswathy","doi":"10.1109/ICPRIME.2013.6496466","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496466","url":null,"abstract":"In this paper, the problem of transmitting redundant data over an insecure, bandwidth-constrained communications channel is discussed. A content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. Using data hiding key the receiver can extract additional data even the receiver has no information about the original image content. Using the decryption key the receiver can extract data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding key and the encryption key, the receiver can extract the additional data and the original imagewithout any loss.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114178609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Protein sequence motif patterns using adaptive Fuzzy C-Means granular computing model 基于自适应模糊c均值颗粒计算模型的蛋白质序列基序模式
M. Chitralegha, K. Thangavel
{"title":"Protein sequence motif patterns using adaptive Fuzzy C-Means granular computing model","authors":"M. Chitralegha, K. Thangavel","doi":"10.1109/ICPRIME.2013.6496454","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496454","url":null,"abstract":"Data Mining is the process to extract hidden predictive information from large databases. In Bioinformatics, data mining enables researchers to meet the challenge of mining large amount of biomolecular data to discover real knowledge. Major research efforts done in the area of bioinformatics involves sequence analysis, protein structure prediction and gene finding. Proteins are said to be prominent molecules in our cells. They involve virtually in all cell functions. The activities and functions of proteins can be determined by protein sequence motifs. These protein motifs are identified from the segments of protein sequences. All segments may not be important to produce good motif patterns. The generated sequence segments do not have classes or labels. Hence, unsupervised segment selection technique is adopted to select significant segments. Therefore Singular Value Decomposition (SVD) entropy method is adopted to select significant sequence segments. In this proposed work, weighted K-Means and Adaptive Fuzzy C-Means have been applied to the selected segments to generate granules, since large amount of segments cannot be grouped or clustered as such. Each granules generated by weighted K-Means algorithm are further clustered by using the K-Means algorithm and granules generated by Adaptive Fuzzy C-Means algorithm are clustered by using Weighted K-Means. The two proposed models are compared with K-Means granular computing model. The experimental results show that Adaptive Fuzzy C-Means with Weighted K-Means technique produces better results than K-Means and weighted K-Means granular computing methods.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114704963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mobile application testing — Challenges and solution approach through automation 移动应用测试-通过自动化的挑战和解决方案
B. Kirubakaran, V. Karthikeyani
{"title":"Mobile application testing — Challenges and solution approach through automation","authors":"B. Kirubakaran, V. Karthikeyani","doi":"10.1109/ICPRIME.2013.6496451","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496451","url":null,"abstract":"By the time this paper has been presented, the mobile app landscape will have changed. New OS versions will have been released. A bunch of new devices will have hit the market. And mobile application testing will have become that much more complex and challenging for all of us. There is no doubt that mobile applications need specific testing approaches. This paper wants to investigate new directions in research on the type of testing and skills required on mobile app testing by answering the following three research questions: (RQ1) How mobile applications testing are so different from traditional web applications, that require specialized testing skills and techniques?, (RQ2) What are the new challenges and future trends in mobile application testing, and (RQ3) How far automation effective in testing mobile application?. We answer those questions by analyzing the current trends in mobile application development and testing, and by proposing my view on the topic.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"18 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120837612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
A novel approach to select significant genes of leukemia cancer data using K-Means clustering 一种基于K-Means聚类的白血病数据显著性基因选择新方法
P. Palanisamy, Perumal, K. Thangavel, R. Manavalan
{"title":"A novel approach to select significant genes of leukemia cancer data using K-Means clustering","authors":"P. Palanisamy, Perumal, K. Thangavel, R. Manavalan","doi":"10.1109/ICPRIME.2013.6496455","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496455","url":null,"abstract":"DNA microarray technologies are leading to an explosion in available gene expression data which simultaneously monitor the expression pattern of thousands of genes. All the genes may not be biologically significant in diagnosing the disease. In this paper, a novel approach has been proposed to select significant genes of leukemia cancer using K-Means clustering algorithm. It is an unsupervised machine learning approach, which is being used to identify the unknown patterns from the huge amount of data. The proposed K-Means algorithm has been experimented to cluster the genes for K=5,10 and 15. The significant genes have been identified through the best accuracy obtained from the clusters generated. The accuracy of the clusters are determined again by using K-Means algorithm compared with ground truth values.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134212324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A survey of routing protocols for VANET in urban scenarios 城市场景中VANET路由协议综述
P. S. Nithya Darisini, N. Kumari
{"title":"A survey of routing protocols for VANET in urban scenarios","authors":"P. S. Nithya Darisini, N. Kumari","doi":"10.1109/ICPRIME.2013.6496522","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496522","url":null,"abstract":"Vehicular Ad hoc Network (VANET) is a subset of Mobile Ad hoc Networks (MANET), which forms wireless networks between vehicles. For better communication among these vehicles, an efficient routing protocol withstanding the dynamic topology of the vehicles plays a vital role. Routing in urban scenarios is highly challenging owing to irregularity in the distribution of vehicle nodes, their mobility pattern and obstacles in the propagation path. This paper focuses on the survey of various routing protocols proposed for VANETs in city environments.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127342110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
An efficient image retrieval using central tendency 一种基于集中趋势的图像检索方法
R. Malini, C. Vasanthanayaki
{"title":"An efficient image retrieval using central tendency","authors":"R. Malini, C. Vasanthanayaki","doi":"10.1109/ICPRIME.2013.6496448","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496448","url":null,"abstract":"This paper aims to improve the effectiveness of retrieving images on the basis of color content. The paper is organized as follows. Firstly, a mean based technique with reduced feature vector is proposed. Secondly, a new idea to extract the features of an image based on the measure of central tendency is proposed. The proposed mean based technique is compared with existing color averaging techniques for retrieval speed and memory requirement. Finally the proposed mean based technique is compared with the measures of central tendency for retrieval efficiency. The proposed CBIR techniques are tested on generic image database and indexed image database. Experimental results shows that proposed method based on the measures of central tendency gives better performance in terms of higher precision and recall values with less computational complexity.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129088234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating incremental dimensional algorithm with sequence data set 序列数据集的增量维数估计算法
S. Adaekalavan
{"title":"Estimating incremental dimensional algorithm with sequence data set","authors":"S. Adaekalavan","doi":"10.1109/ICPRIME.2013.6496461","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496461","url":null,"abstract":"Recently, there has been enormous growth in the amount of commercial and scientific data, such as protein sequences, retail transactions, and web-logs. In this paper, the scholar proposes a new approach for robust hierarchical clustering based on the distance function between each data object and the cluster centers. This method avoids the need to compute the distance of each data object to the cluster center. It saves running time. The experimental results showed that the best clusters were obtained using EIDA method, this suggests that this similarity measure would be applicable to sequence data sets.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116447869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Huffman and Lempel-Ziv based data compression algorithms for wireless sensor networks 基于Huffman和Lempel-Ziv的无线传感器网络数据压缩算法
S. Renugadevi, P. S. Nithya Darisini
{"title":"Huffman and Lempel-Ziv based data compression algorithms for wireless sensor networks","authors":"S. Renugadevi, P. S. Nithya Darisini","doi":"10.1109/ICPRIME.2013.6496521","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496521","url":null,"abstract":"In the recent years, wireless sensor networks have gained increasing attention from both the research community and actual users. As sensor nodes are generally battery powered devices, it is essential to minimize the energy consumption of the nodes so that the network lifetime can be extended. Most of the energy is consumed in the processing and transmission of data. Applying compression algorithms on the wireless sensor data prior to transmission is one of the efficient ways to save energy. In this paper we propose data compression algorithms based on Huffman and Lempel-Ziv techniques and compare the efficiency of different algorithms in a wireless sensor network scenario.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121903856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Optimal pattern search for database systems 数据库系统的最佳模式搜索
R. Vangipuram, P. V. Kumarz, V. Janaki
{"title":"Optimal pattern search for database systems","authors":"R. Vangipuram, P. V. Kumarz, V. Janaki","doi":"10.1109/ICPRIME.2013.6496720","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496720","url":null,"abstract":"Many time series database applications require processing and analyzing database sequences where the focus is on finding the patterns and trends in sequence data. In this paper, the approach carried out is based on the observation that finding sequential patterns in databases is somehow similar to searching for a phrase in the text. However instead of searching for sequence of letters usually from finite alphabet, we search for sequence of tuple with rich structure and infinite possibilities from both ends of the sequential database. We take the algorithm of Boyer moore used for text and generalize it to search for complex sequence patterns of interest in a given database by exploiting the logical interdependencies between the elements of a sequential pattern having constraints.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116995267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Instance and value (IVH) algorithm and dodging dependency for scheduling multiple instances in hybrid cloud computing 混合云计算中多实例调度的IVH (Instance and value)算法和回避依赖
B. Kumar, T. Ravichandran
{"title":"Instance and value (IVH) algorithm and dodging dependency for scheduling multiple instances in hybrid cloud computing","authors":"B. Kumar, T. Ravichandran","doi":"10.1109/ICPRIME.2013.6496511","DOIUrl":"https://doi.org/10.1109/ICPRIME.2013.6496511","url":null,"abstract":"Cloud computing is designed such a way to avoid over-provisioning when used with utility pricing. It also removes the need to over-provision in order to meet the demands of users. It involves multitenancy and multitasks, i.e., many customers can perform different tasks, accessing a single or multiple application instances. Sharing resources among a large pool of users assists in reducing infrastructure costs and peak load capacity. Due to the raise in convention of many applications currently, there is necessitating for high processing and storage capacity along with the consideration of cost and instance use. To provide proficient resources, Cloud computing is been pioneered. Many organizations have their own private cloud, but when there is need for extra resources they go for public cloud where they have been outlaid for their use. In such “pay-per-use”, workflow execution cost must be considered during scheduling based on users' QoS constraints. It is an algorithm that calculates an optimal value and instance for it. Using simulation, we have compared the performance of our proposed approach with the existing scheduling strategies for different type and size of workflows. The IVH algorithm comes to the decision of desiring which resource should be chartered from public providers.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129118496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信