International Confernce on Innovation Information in Computing Technologies最新文献

筛选
英文 中文
Efficient feature extraction and classification of chromosomes 染色体的高效特征提取与分类
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396086
S. Saranya, V. Loganathan, P. Ramapraba
{"title":"Efficient feature extraction and classification of chromosomes","authors":"S. Saranya, V. Loganathan, P. Ramapraba","doi":"10.1109/ICIICT.2015.7396086","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396086","url":null,"abstract":"Karryogram is a preliminary procedure to detect the most characteristic signs of a disorder that may require for further investigation of medical applications mainly for cancerous. Diagnosis of karryogram is generally very complex, eroding and a time consuming operation. As of now it requires fussy attention to details and calls for meritoriously and trained personnel. Normally chromosomes are essential genomic information carriers which contains 23 pairs. This paper suggests a efficient classifier Support Vector Machine (SVM) for classifying chromosomes in comparison to the already existing methods such as support vector machine based medial axis and density profiles. The features are extracted based on GLCM (Gray level co-occurrence) feature extraction algorithm which is very well known for its high accuracy. First order features and GLCM features of chromosomes are extracted from the segmented image. As a prerequisite, image segmentation needs to be done by using Fuzzy-C Mean (FCM) procedure to obtain efficient features in coordination with SVM which is used to classify the chromosomes from the available pairs of 23 chromoseomes. Using this methodology increased the accuracy of classification results. Simulation results are carried out in MATLAB to support the analysis.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134624871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel idea to improve pedestrian safety in Black Spots using a hybrid VANET of vehicular and body sensors 利用车辆和车身传感器的混合VANET提高黑点行人安全的新想法
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396066
Dahlia Sam, Esther Evangelin, V. C. Raj
{"title":"A novel idea to improve pedestrian safety in Black Spots using a hybrid VANET of vehicular and body sensors","authors":"Dahlia Sam, Esther Evangelin, V. C. Raj","doi":"10.1109/ICIICT.2015.7396066","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396066","url":null,"abstract":"With the rapid expansion of motor vehicle use, road safety is becoming a serious issue in the past few decades. Road pedestrian injuries and death rate is rising sharply. The research on traffic accidents points out to a concentration of crashes in \"Black Spots\". Accident black spots may be caused due to sharp corners in straight road, steep slopes, a hidden junction, concealed warning signs or situations where the oncoming traffic is concealed. However, the research on road safety has not yet found a solution to the problem. The histories of traffic accident cases establish dependencies between the accident and the reaction time of the pedestrian and/or driver. This is mainly due to instant reactions caused by panic while facing a real time potentially dangerous scenario. We provide a solution by proposing a VANET based driver alert system. An alert given to the drivers ahead of time gives a better chance for the drivers to react in a way as to avoid accidents. The system is designed by including body sensors as part of the VANET. The signals received by the vehicular nodes in the VANET are given as input to the alert system. The driver is cautioned which in turn speeds up his reaction time. The system was simulated and it was seen that the chances of accident drastically reduces with the alert system.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116555053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An RFID based system for bus location tracking and display 基于RFID的公交位置跟踪和显示系统
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396080
V. Anu, D. Sarikha, G. Keerthy, J. Jabez
{"title":"An RFID based system for bus location tracking and display","authors":"V. Anu, D. Sarikha, G. Keerthy, J. Jabez","doi":"10.1109/ICIICT.2015.7396080","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396080","url":null,"abstract":"RFID is a technology similar to that of bar code scanning. An RFID system consists of tags, which use radio frequency signals to transmit its location information to a reader, which usually sends this information to a server that processes it according to the needs of the application. This paper presents a system that can track buses across a city by placing RFID tags in the buses and the readers in every alternative bus stop. The local server for the city recieves the location information, and alerts the forthcoming bus stops in the route of the bus, of the bus' number, route and expected time of arrival, which are then displayed at the stop. This system thus describes is a cost effective and easy to implement scheme for tracking buses in real time.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124787784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Cloud traceability hash based user behavior predication mechanism for shared public cloud 基于云可追溯性哈希的共享公共云用户行为预测机制
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396083
Y. M. Dhas, S. Uma
{"title":"Cloud traceability hash based user behavior predication mechanism for shared public cloud","authors":"Y. M. Dhas, S. Uma","doi":"10.1109/ICIICT.2015.7396083","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396083","url":null,"abstract":"Cloud storage facilitates to share the resources with large number of users with low marginal cost. The person who is uploading the file (split into unit unit-blocks) becomes the original user and all other existing users can access the files using their private key. The existing users can also perform modification actions and update using resigning key. The integrity of the unit-blocks can be verified by public audit mechanism. Due to security reasons, an user can be revoked form the cloud (like Google drive, iCloud, drop box etc...). The unit unit-blocks which were signed by the revoked user cannot be subjected to the auditing process as it is. It has to be again resigned by the existing user which involves more computational time and utilization of resources of existing users. So, we are automating the cloud to perform these resigning operations with the existing users' resigning keys. To make this user revocation efficient, traceability of the cloud is also necessary. Using traceability results, the data owner can able to find the most frequently accessed unit-block of the cloud and the inactive member of the group. It is up to the data owner to revocate the inactive member or not. Our proposed Hash Based User Behavior Prediction Mechanism utilizing the concept of proxy resignatures, provides efficient user revocation with traceability of unit-blocks in the cloud storage.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124188104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing cloud data using visual cryptography 使用可视化加密保护云数据
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396073
K. Brindha, N. Jeyanthi
{"title":"Securing cloud data using visual cryptography","authors":"K. Brindha, N. Jeyanthi","doi":"10.1109/ICIICT.2015.7396073","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396073","url":null,"abstract":"Cloud computing model allows the customers to access the secured information from the cloud server without the help of using the hardware or the software. For the effective usage of the data from the cloud provider, the data owner encrypts the data and then its ends to the cloud server. To secure the data in the cloud we have dealt through lots of security issues earlier. In this paper we have proposed the idea how the data could be made more secured using visual cryptographic techniques. This model not only increases the trust among the users to send their information with full reliability and also helps in the authorization of the users.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123356203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
FCM based CF: An efficient approach for consolidating big data applications 基于FCM的CF:整合大数据应用的有效方法
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396090
J. Vimali, Z. Taj
{"title":"FCM based CF: An efficient approach for consolidating big data applications","authors":"J. Vimali, Z. Taj","doi":"10.1109/ICIICT.2015.7396090","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396090","url":null,"abstract":"With regard to rapid development of Internet technology and the increasing volume of data and information, the need for systems that can guide users toward their desired items and services may be felt more than ever. As a result, service-relevant data become too big to be effectively processed by traditional approaches. A naive solution is to decrease the number of services that need to be processed in real time. Clustering are such techniques that can reduce the data size by a large factor by grouping similar services together. In this research work, we propose a novel approach called Fuzzy C-Means Clustering-based Collaborative Filtering approach (FCM based CF) to overcome the above mentioned issues. Our proposed mechanism consists of two stages: FCM clustering and collaborative filtering. Clustering is a preprocessing step to separate the big data into manageable parts. Collaborative Filtering is imposed on one of the clusters. The main goal of this research is with respect to users, consolidating and mining their implicit interests from usage reviews or records may be a complement to the explicit interests (ratings). By this means, recommendations can be generated even if there are only few ratings. Finally, our proposed algorithm consolidates the web services and suggests the better web services based on the user navigation.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127242847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance analysis of DWT based OFDM for WiMAX 基于DWT的OFDM在WiMAX中的性能分析
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396087
R. Ranjana, N. Hariprasad
{"title":"Performance analysis of DWT based OFDM for WiMAX","authors":"R. Ranjana, N. Hariprasad","doi":"10.1109/ICIICT.2015.7396087","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396087","url":null,"abstract":"In a limited allocation scenario of bandwidth, the accommodation of more number of users is very important for any service provider in today's communication technology. To achieve this, Orthogonal Frequency Division Multiplexing (OFDM) is preferred. The existing OFDM is based on Fast Fourier Transforms (FFT) and Inverse Fast Fourier Transforms (IFFT) which imposes some restriction over the data rate. In order to overcome the limitation, OFDM with Discrete Wavelet Transform (DWT) and Inverse Discrete Wavelet Transform (IDWT) is proposed. The combination of DWT-IDWT is improving the performance of the Worldwide Interoperability for Microwave Access (WiMAX) technology in terms of Bit Error Rate (BER). For this, the OFDM model is developed in Simulink and the performance analysis of DWT-IDWT is compared with the existing FFT-IFFT based OFDM with the various modulation schemes. The simulation results using DWT-IDWT in OFDM schemes shows better than FFT-IFFT based OFDM schemes for WiMAX.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127487367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Honey Bee behaviour inspired novel Attribute-based access control using enhanced Bell-Lapadula model in cloud computing 在云计算中使用增强的Bell-Lapadula模型的蜜蜂行为启发的新型基于属性的访问控制
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396064
B. Balamurugan, N. G. Shivitha, V. Monisha, V. Saranya
{"title":"A Honey Bee behaviour inspired novel Attribute-based access control using enhanced Bell-Lapadula model in cloud computing","authors":"B. Balamurugan, N. G. Shivitha, V. Monisha, V. Saranya","doi":"10.1109/ICIICT.2015.7396064","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396064","url":null,"abstract":"Cloud computing is one of the emerging technologies that is being used widely these days. It makes use of the computing resources such as hardware and software that is delivered over the internet and provides remote services with user's data, software and computation. There has been a growing trend to use the cloud for large-scale data storage. This has raised the important security issue of how to control and prevent unauthorized access to data stored in the cloud. There are various access control techniques in cloud environment such as IBAC, RBAC, ABAC, MAC, DAC. Among these techniques, Attribute-Based Access Control (ABAC) is gaining more importance. Here access is granted based on attributes. Our primary objective is to summarize all the access control techniques in cloud environment. Our main objective is to come up with a Novel Attribute-Based Access Control for cloud security using Enhanced Bell-Lapadula Model inspired from Honey Bee behaviour. The Honey Bee prevents the intruders from entering into their hives. This is similar to the access control mechanism in cloud environment. It identifies the bee that belongs to the same hive by the possession of the small barbs on the stings. Similarly, we are trying to restrict the users based on the possession of correct set of attributes by using ABAC technique.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126077612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Automation of garden tools monitored using mobile application 使用移动应用程序监控园林工具的自动化
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396084
S. Gowri, G. Divya
{"title":"Automation of garden tools monitored using mobile application","authors":"S. Gowri, G. Divya","doi":"10.1109/ICIICT.2015.7396084","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396084","url":null,"abstract":"In this automated world, the comfort over handling of any kind of device has become possibly the easiest factor everywhere, having the similar aspect of building comfort zone, a system is designed for the evolution of automation in gardening process. This paper proposes a novel gardening system with automates the working of garden tool in an efficient manner reducing the human effort and reduction of wastage in natural resources like water, and working with respect to the healthy growth maintenance of the plants and grass as well. The proposal was designed on the perspective of making the tool of the garden working automatically, by monitoring them through a Mobile Application, interconnected using Bluetooth for handling the communication between the mobile and the garden tools. The entire system was tested in its operation and was scrutinized on the whole for better performance than that of manual maintenance of garden.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129044198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Multiple replica based remote data possession checking scheme based on matrix representation of data 基于数据矩阵表示的多副本远程数据占有校验方案
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396071
B. Balamurugan, A. R. Mandadi, S. Mohan, Sherein Faahtheima
{"title":"Multiple replica based remote data possession checking scheme based on matrix representation of data","authors":"B. Balamurugan, A. R. Mandadi, S. Mohan, Sherein Faahtheima","doi":"10.1109/ICIICT.2015.7396071","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396071","url":null,"abstract":"Nowadays, Cloud computing became a prominent and fast developing technology in transforming and accessing the data at distant remote cloud servers. When users store their critical information on the cloud, the security concern on the scheme is that whether the integrity of file can be achieved. The Objective of the Remote data possession checking (RDPC) schemes is to check availability and integrity of the data without retrieving the original file or data. This paper proposes a multiple replica based RDPC scheme based on matrix representation of data and provides public verifiability through which a Third party auditor (TPA) can verify the possession of data at the servers, which increases the flexibility of the protocol. Unlike the other RDPC schemes, this scheme uses a stratified sampling technique which delivers better results than probabilistic proofs of possession. This also provides a proof checking scheme by which we can check the possession of the data without retrieving the original file.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"314 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129733389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信