15th International Conference on Advanced Computing and Communications (ADCOM 2007)最新文献

筛选
英文 中文
A New Particle Swarm Optimization with Quadratic Crossover 一种新的二次交叉粒子群优化算法
M. Pant, R. Thangaraj
{"title":"A New Particle Swarm Optimization with Quadratic Crossover","authors":"M. Pant, R. Thangaraj","doi":"10.1109/ADCOM.2007.22","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.22","url":null,"abstract":"In this paper we have presented a new variant of diversity guided PSO algorithm named QIPSO for solving global optimization problems. The QIPSO algorithm makes use of a quadratic crossover operator to maintain the level of diversity in the swarm population, thereby maintaining a good balance between the exploration and exploitation phenomena and preventing premature convergence. We have compared it with Basic Particle Swarm Optimization (BPSO) and another diversity guided PSO called ARPSO. The numerical results show that QIPSO outperforms the other two algorithms in all the seventeen cases taken in this study.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132651864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An Efficient Approach for Pupil Detection in Iris Images 一种有效的虹膜图像瞳孔检测方法
S. Dey, D. Samanta
{"title":"An Efficient Approach for Pupil Detection in Iris Images","authors":"S. Dey, D. Samanta","doi":"10.1109/ADCOM.2007.37","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.37","url":null,"abstract":"Iris-based biometric system is gaining its importance in several applications. However, existing methods of detecting boundary between pupil and iris, which is the first task in any iris-based biometric identification methods are computationally expensive. Further, existing methods are not able to detect pupil boundary accurately and hence leading to errors in identification process. In this paper, we address these two problems and propose a technique to detect pupil boundary efficiently and accurately. We propose scaling and power transform followed by edge detection and circle finding. Scaling reduces the search space significantly and power transform is helpful for image thresholding. Experiments on CASIA iris database reveal that with the proposed approach, we able to detect pupil almost 100% accurately.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125408069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy Preserving Cooperative Clustering Service 保护隐私的协同集群服务
A.S. Das, K. Srinathan
{"title":"Privacy Preserving Cooperative Clustering Service","authors":"A.S. Das, K. Srinathan","doi":"10.1109/ADCOM.2007.105","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.105","url":null,"abstract":"In the field of access control, delegation is an important aspect that is considered as a part of the administration mechanism. Thus, a complete access control must provide a flexible administration model to manage delegation. Unfortunately, to our best knowledge, there is no complete model for describing all delegation requirements for role-based access control. Therefore, proposed models are often extended to consider new delegation characteristics, which is a complex task to manage and necessitate the redefinition of these models. In this paper we describe a new delegation approach for extended role-based access control models. We show that our approach is flexible and is sufficient to manage all delegation requirements.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123173855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Design and Implementation of RS (32, 28) Encoder and Decoder Using Cellular Automata 基于元胞自动机的RS(32,28)编解码器的设计与实现
J. Bhaumik, D. R. Chowdhury, I. Chakrabarti
{"title":"Design and Implementation of RS (32, 28) Encoder and Decoder Using Cellular Automata","authors":"J. Bhaumik, D. R. Chowdhury, I. Chakrabarti","doi":"10.1109/ADCOM.2007.63","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.63","url":null,"abstract":"RS (32, 28) code is popularly used for compact disk player. In this work, a modular architecture of RS (32, 28) encoder and decoder employing the regular structure of Cellular Automata (CA) has been proposed. The work also identifies a mistake in an existing related work and recti- fies it for locating double errors. The proposed CA based double error correcting codec can be easily extended to 3, 4, 5 byte error correcting codes. CA-based VLSI design is attractive because of its simplicity, regularity and higher throughput.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128764774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
LLRU: Late LRU Replacement Strategy for Power Efficient Embedded Cache LRU:低功耗嵌入式缓存的后期LRU替换策略
B. Raveendran, T. Sudarshan, P. D. Kumar, P. Tangudu, S. Gurunarayanan
{"title":"LLRU: Late LRU Replacement Strategy for Power Efficient Embedded Cache","authors":"B. Raveendran, T. Sudarshan, P. D. Kumar, P. Tangudu, S. Gurunarayanan","doi":"10.1109/ADCOM.2007.84","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.84","url":null,"abstract":"This paper proposes a new cache replacement scheme, late least recently used (LLRU). LLRU takes care of shared pages improves its accessibility and offers improved cache performance. LLRU modifies the existing least recently used (LRU) algorithm. This scheme, improves cache performance for applications, which has shared pages. We also propose square matrix and counter based hardware design for LLRU. We show that the proposed scheme will achieve considerable improvement in hit rate. The experimental results are obtained using Simplescalar2.0 cache simulator benchmark. The hardware performance of LLRU counter and square matrix implementation is measured by using Modelsim and Leonardo spectrum.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116160122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Memetic NSGA - a multi-objective genetic algorithm for classification of microarray data Memetic NSGA -一种用于微阵列数据分类的多目标遗传算法
Praveen Kumar, Sharath S, Rio D 'souza, K. C. Sekaran
{"title":"Memetic NSGA - a multi-objective genetic algorithm for classification of microarray data","authors":"Praveen Kumar, Sharath S, Rio D 'souza, K. C. Sekaran","doi":"10.1109/ADCOM.2007.90","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.90","url":null,"abstract":"In Gene Expression studies, the identification of gene subsets responsible for classifying available samples to two or more classes is an important task. One major difficulty in identifying these gene subsets is the availability of only a few samples compared to the number of genes in the samples. Here we treat this problem as a Multi-objective optimization problem of minimizing the gene subset size and minimizing the number of misclassified samples. We present a new elitist non-dominated sorting-based genetic algorithm (NSGA) called memetic- NSGA which uses the concept of memes. Memes are a group of genes which have a particular functionality at the phenotype level. We have chosen a 50 gene Leukemia dataset to evaluate our algorithm. A comparative study between Memetic-NSGA and another non-dominated sorting genetic algorithm, called NSGA-II, is presented. Memetic-NSGA is found to perform better in terms of execution time and gene-subset length identified.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126744538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Pattern Mining as Abduction from Snapshots to Spatio-temporal Patterns 从快照到时空模式的模式挖掘
S. Hazarika
{"title":"Pattern Mining as Abduction from Snapshots to Spatio-temporal Patterns","authors":"S. Hazarika","doi":"10.1109/ADCOM.2007.100","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.100","url":null,"abstract":"The paper describes an abductive framework for mining spatio-temporal patterns. The spatial representation language RCC-8, often referred to as Region Connection Calculus and its spatio-temporal extension, ST0, a fragment of Prepositional Spatio-temporal Logic is used as the knowledge representation formalism. Abductive reasoning may yield more than one possible answer and is accompanied by some preference criteria. Here, the abduction technique is circumscription which implements the heuristic that changes should only occur when forced to.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126857607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and Control of Bifurcation and Chaos in TCP-Like Internet Congestion Control Model 类tcp网络拥塞控制模型的分岔与混沌分析与控制
B. Rezaie, M. Motlagh, S. Khorsandi, Morteza Analoui
{"title":"Analysis and Control of Bifurcation and Chaos in TCP-Like Internet Congestion Control Model","authors":"B. Rezaie, M. Motlagh, S. Khorsandi, Morteza Analoui","doi":"10.1109/ADCOM.2007.43","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.43","url":null,"abstract":"Analysis and control of nonlinear dynamical models of Internet congestion control system has been an interested issue in recent years. In this paper the bifurcation behavior of the TCP-like model of Internet congestion control system including TCP and AQM is investigated. In particular, the effects of system parameters on nonlinear dynamical behavior and the condition for period-doubling bifurcation and chaos occurrence will be revealed. After that an adaptive controller will be proposed for controlling chaos in this system. This controller is based on model reference adaptive system (MRAS) method for a linearized system with delay. Simulation results demonstrate that the complex behavior of the system can be controlled by our method.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130901331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modified Smith Predictor Controller for Network Congestion Control 改进的Smith预测控制器用于网络拥塞控制
P. Baburaj, S. Majhi, C. Reddy
{"title":"Modified Smith Predictor Controller for Network Congestion Control","authors":"P. Baburaj, S. Majhi, C. Reddy","doi":"10.1109/ADCOM.2007.94","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.94","url":null,"abstract":"This paper presents a Modified Smith Predictor (MSP) controller to design a novel Active Queue Management (AQM) scheme. The controller decouples the setpoint response from the load response and shows a stable response for a Transmission Control Protocol(TCP) flow dynamics, which is highly oscillatory or unstable under practical conditions. The proposed control scheme enables to track the desired buffer level successfully and reject any load disturbances such as unresponsive traffic flows efficiently. The controller parameters are estimated by the use of standard forms of closed loop system response. Network simulator (ns-2) based simulation results show improved performances of the proposed controller compared to that of some popular schemes like Random Early Detection(RED), Proportional and Integral(PI), Linear Quadratic Regulator(LQR) etc.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"418 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131578631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CDAC-ACS Lecture Award 2007 Talk: Petaflop Computing CDAC-ACS讲座奖2007年演讲:千万亿次计算
V. Bhatkar
{"title":"CDAC-ACS Lecture Award 2007 Talk: Petaflop Computing","authors":"V. Bhatkar","doi":"10.1109/ADCOM.2007.53","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.53","url":null,"abstract":"Padmashree Dr Vijay Bhatkar pioneered India's massively parallel processing initiative and built the first of the country's supercomputers in the PARAM series at the Centre for Development of Advanced Computing that he set up. Dr. Vijay P. Bhaskar is Founder Executive Director of Centre for Development of Advanced Computing Organization (C-DAC).","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132675055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信