2015 IEEE International Advance Computing Conference (IACC)最新文献

筛选
英文 中文
Segmenting of object in postprocessing stage in underwater video sequences under dynamic condition 动态条件下水下视频序列后处理阶段的目标分割
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154681
R. Hemavathy, G. Rashmi, Pooja Ashok Varambally, G. Shobha
{"title":"Segmenting of object in postprocessing stage in underwater video sequences under dynamic condition","authors":"R. Hemavathy, G. Rashmi, Pooja Ashok Varambally, G. Shobha","doi":"10.1109/IADCC.2015.7154681","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154681","url":null,"abstract":"Information assimilation and dissemination is the major task and challenge in the new era of technology. There are many means of information storing. Underwater Videos and images reveal much information when they are analyzed. The proposed method uses Mixture of Gaussian as a basic model to segment the moving object under dynamic condition. The proposed method remove the motion of the underwater algae or plants which exists as background by checking the status of each foreground pixels in each frame and decides whether to be present as output or not in the post processing stage. Finally the output is compared with a validated ground truth.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129982379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An encryption, compression and key(ECK) management based data security framework for infrastructure as a service in Cloud 一个基于加密、压缩和密钥(ECK)管理的数据安全框架,用于云中的基础设施即服务
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154830
Sanket Salvi, H. A. Sanjay, K. Deepika, S. Rangavittala
{"title":"An encryption, compression and key(ECK) management based data security framework for infrastructure as a service in Cloud","authors":"Sanket Salvi, H. A. Sanjay, K. Deepika, S. Rangavittala","doi":"10.1109/IADCC.2015.7154830","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154830","url":null,"abstract":"Cloud Computing is the recent technology that is based on shared pool of resources and provides features like Ubiquitous access, multi-tenancy, flexibility, scalability and pay as you use, which makes it more resource efficient and cost effective. But Cloud-based systems open unfamiliar threats in authentication and authorization. Explicit authorization accordance must be defined at smallest level, especially in multi-tenant environments. The liaison between Cloud Service Provider & customer must also be clearly mentioned in relation like who holds administrative rights and indirect access to privileged customer information. Moreover the scenario of cloud in educational and research community is still developing and has some security concerns. This paper provides a brief review about Cloud Security concerns for adoption of cloud computing in data sensitive research and technology aided education. Also this paper proposes, ECK based framework for securing end-user data in Community Cloud. Implications and considerations for additional research are provided as well.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Secure 3GPP-WLAN authentication protocol based on EAP-AKA 基于EAP-AKA的安全3GPP-WLAN认证协议
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154857
Shruti S. Patkar, D. Ambawade
{"title":"Secure 3GPP-WLAN authentication protocol based on EAP-AKA","authors":"Shruti S. Patkar, D. Ambawade","doi":"10.1109/IADCC.2015.7154857","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154857","url":null,"abstract":"EAP-AKA is used as an authentication protocol during handoff across heterogeneous systems with different underlying technologies like the 3GPP-WLAN internetwork. However the protocol cannot be put to practical use due to its high authentication delay and vulnerabilities to several attacks like user identity disclosure, man in the middle attack and DoS attack. Moreover, the validity of Access Point of the WLAN network is often not checked, leaving the user vulnerable to several attacks even after heavy authentication procedure. For this purpose we propose a modified, secure EAP-SAKA protocol using Elliptic Curve Diffie Hellman for symmetric key generation by taking into consideration the validation of access point. Additionally, we make EAP-SAKA faster by decreasing the propagation delay of the signaling messages. The proposed protocol is supported using detailed security analysis and performance analysis. Also, security validation of EAP-SAKA is carried out using a widely accepted formal verification tool called AVISPA and is found to be safe.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128922368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Extended species for code parallelization through algorithmic classification 通过算法分类实现代码并行化的扩展物种
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154862
Bilal Mustafa, W. Ahmed
{"title":"Extended species for code parallelization through algorithmic classification","authors":"Bilal Mustafa, W. Ahmed","doi":"10.1109/IADCC.2015.7154862","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154862","url":null,"abstract":"Multicore systems along with GPUs enabled to increase the parallelism extensively. Few compilers are enhanced to emerging issues with respect to threading and synchronization. Proper classification of algorithms and programs will benefit largely to the community of programmers to get chances for efficient parallelization. In this work we analyzed the existing species for algorithm classification, where we discuss the classification of related work and compare the amount of problems which are difficult for classification. We have selected set of algorithms which resemble in structure for various problems but perform given specific tasks. These algorithms are tested using existing tools such as Bones compiler and A-Darwin, an automatic species extraction tool. The access patterns are produced for various algorithmic kernels by running against A-Darwin and analysis is done for various code segments. We have identified that all the algorithms cannot be classified using only existing patterns and created new set of access patterns.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131064978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advanced Control Distributed Processing Architecture (ACDPA) using SDN and Hadoop for identifying the flow characteristics and setting the quality of service(QoS) in the network ACDPA (Advanced Control Distributed Processing Architecture),采用SDN和Hadoop技术,用于识别网络中的流特征和设置QoS (quality of service)
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154814
Abhijeet Desai, K. S. Nagegowda
{"title":"Advanced Control Distributed Processing Architecture (ACDPA) using SDN and Hadoop for identifying the flow characteristics and setting the quality of service(QoS) in the network","authors":"Abhijeet Desai, K. S. Nagegowda","doi":"10.1109/IADCC.2015.7154814","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154814","url":null,"abstract":"Today the network is seemingly complex and vast and it is difficult to gauge its characteristics. Network administrators need information to check the network behavior for capacity planning, quality of service requirements and planning for the expansion of the network. Software defined networking (SDN) is an approach where we introduce abstraction to simplify the network into two layers, one used for controlling the traffic and other for forwarding the traffic. Hadoop is used for distributed processing. In this paper we combine the abstraction property of SDN and the processing power Hadoop to propose an architecture which we call as Advanced Control Distributed Processing Architecture (ACDPA), which is used to determine the flow characteristics and setting the priority of the flows i.e. essentially setting the quality of service(QoS). We provide experimental details with sample traffic to show how to setup this architecture. We also show the results of traffic classification and setting the priority of the hosts.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"348 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132948487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A quad-band hybrid fractal antenna for wireless applications 一种用于无线应用的四波段混合分形天线
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154803
Y. Kumar, Surinder Singh
{"title":"A quad-band hybrid fractal antenna for wireless applications","authors":"Y. Kumar, Surinder Singh","doi":"10.1109/IADCC.2015.7154803","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154803","url":null,"abstract":"Hybrid fractal multiband antenna is designed using Koch and meander geometry and its characteristics are investigated. The proposed antenna helps to achieve multiband behavior due to its multiple resonance characteristics. It has planar structure, compact size and suitable for wireless applications. IFS approach has been used to obtain the hybrid structure using MATLAB and scripting method of HFSS. Perturbation of basic structure is done to achieve quad-band behavior. Proposed antenna resonates at four different frequencies including Bluetooth (2.12-2.95 GHz), WLAN (4.82-5.95 GHz), 4.07 GHz and 7.3 GHz. It is a low cost antenna designed on easily available FR4 substrate. It exhibits nearly omnidirectional radiation pattern and VSWR ≤ 2 for all resonating frequencies.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132161545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Bio-metric credential system: Multimodal cancelable anonymous identity management 生物识别凭证系统:多模态可取消匿名身份管理
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154729
P. Suresh, K. Radhika
{"title":"Bio-metric credential system: Multimodal cancelable anonymous identity management","authors":"P. Suresh, K. Radhika","doi":"10.1109/IADCC.2015.7154729","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154729","url":null,"abstract":"Digital transactions have permeated almost every sphere of activity in today's world. This increase in digital transactions has introduced additional and stringent requirements with regard to security and privacy. People reveal lots of personal information by compromising their private credentials during digital interactions. It is imperative that in addition to security of on-line transactions, user credentials must also be safeguarded. This has necessitated the requirement for a rigorous and foolproof credential system with provision for anonymous and revocable identity management system. Biometric system based identity management systems offer advantage over conventional knowledge and possession based systems. Considerable research has been undertaken in the past to identify newer and reliable biometrics for more efficient and secure identity management. Fusion of multiple biometrics to achieve better results is also an area of active research. However, making biometric credential systems revocable and anonymous without sacrificing efficiency and efficacy of detection, still remains a challenge. This survey paper makes an attempt to give an insight into the approaches that have been made in the direction of multimodal biometric fusion and into the various options that have been explored to make biometric authentication systems revocable and anonymous.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132770778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy based dynamic load balancing scheme for efficient edge server selection in Cloud-oriented content delivery network using Voronoi diagram 基于Voronoi图的云内容分发网络边缘服务器选择模糊动态负载均衡方案
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154822
Sandip Roy, R. Bose, D. Sarddar
{"title":"Fuzzy based dynamic load balancing scheme for efficient edge server selection in Cloud-oriented content delivery network using Voronoi diagram","authors":"Sandip Roy, R. Bose, D. Sarddar","doi":"10.1109/IADCC.2015.7154822","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154822","url":null,"abstract":"Any given Euclidean space can be partitioned into non-overlapping regions using Voronoi diagram and the Delaunay triangulation connects sites using nearest-neighbor fashion. Realistically in this context, all the edge servers are scattered over the Earth surface and can be clustered using Voronoi diagram. Now nearest edge server selection by Delaunay triangulation over the Voronoi diagram is our prime target. Due to the large demand of Internet content coming from burst crowd, performance of the Cloud-oriented content delivery networks is drastically reduced. To improve the said performance degradation, nearest edge server selection is a primary goal of cloud service provider (like Akamai Technologies, Amazon CloudFront, Mirror Image Internet etc.). Empirically all the time load of the nearest edge server is not eligible for responding the user request. Therefore load balancing is also important criteria for selecting suitable edge server. In this paper, we have presented Fuzzy Based Least Response Time (FLRT) dynamic load balancing algorithm and which is effective for crisps input from different heterogeneous system. Thus, FLRT is a novel paradigm which can select nearest neighbor edge server from user's current location where response time and load of the edge server is lowest.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127427666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Parkinson disease detection using ensemble method in PASW benchmark PASW基准中的集成方法检测帕金森病
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154790
Md. Inzamam-Ul-Hossain, L. Mackinnon, Md. Rafiqul Islam
{"title":"Parkinson disease detection using ensemble method in PASW benchmark","authors":"Md. Inzamam-Ul-Hossain, L. Mackinnon, Md. Rafiqul Islam","doi":"10.1109/IADCC.2015.7154790","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154790","url":null,"abstract":"We present an ensemble method to classify Parkinson patients and healthy people. C&R Tree, Bayes Net and C5.0 are used to generate ensemble method. Using supervised learning technique, the proposed method generates rules to distinguish Parkinson patients from healthy people. The proposed method uses single classifier to generate rules which are used as input for the next used classifier and in this way final rules are generated to predict more accurate results than individual classifier used to generate ensemble method. This method shows lower number of misclassification instances than single classifiers used to build model. Ensemble method shows better results for training and testing accuracy than single classifier.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115233138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A reliable cross layer routing scheme (CL-RS) for wireless sensor networks to prolong network lifetime 一种可靠的无线传感器网络跨层路由方案(CL-RS),以延长网络寿命
2015 IEEE International Advance Computing Conference (IACC) Pub Date : 2015-06-12 DOI: 10.1109/IADCC.2015.7154865
S. Kusumamba, S. D. Dilip Kumar
{"title":"A reliable cross layer routing scheme (CL-RS) for wireless sensor networks to prolong network lifetime","authors":"S. Kusumamba, S. D. Dilip Kumar","doi":"10.1109/IADCC.2015.7154865","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154865","url":null,"abstract":"Design of conventional protocols for wireless sensor networks(WSN) are mainly based on energy management. The solutions for layered protocol of the WSN network are inefficient as sensors network mainly delivers real-time content thus, cross layer communication between layers of the protocol stack is highly required. In this paper, a reliable cross layer routing scheme (CL - RS) is proposed to balance energy to achieve prolonged lifetime through controlled utilization of limited energy. CL - RS considers 2 adjacent layers namely, MAC layer and network layer. Optimization issues are identified in these two layers and solutions are provided to reduce energy consumption thereby increasing network lifetime. To achieve higher energy efficiency MAC layer protocols compromise on packet latency. It is essential to attempt reduce the end-to-end delay and energy consumption using low duty cycle cross layer MAC (CL-MAC). The joint optimization design is formulated as a linear programming problem. The network is partitioned into four request zones to enable increase in network performance by using an appropriate duty cycle and routing scheme. We demonstrate by simulations that the strategy designed by combining (CL - RS) and (CL-MAC) algorithms at each layer significantly increases the network lifetime and a relation exists between the network lifetime maximization and the reliability constraint. We evaluate the performance of the proposed scheme under different scenarios using ns-2. Experimental results shows that proposed scheme outperforms the layered AODV in terms of packet loss ratio, end-to-end delay, control overhead and energy consumption.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"44 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115549312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信