2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)最新文献

筛选
英文 中文
Enabled security based on elliptic curve cryptography with optimal resource allocation schema in cloud computing environment 基于椭圆曲线加密的云计算环境下最优资源分配模式的安全性实现
N. Nagalakshmi, S. Rajalakshmi
{"title":"Enabled security based on elliptic curve cryptography with optimal resource allocation schema in cloud computing environment","authors":"N. Nagalakshmi, S. Rajalakshmi","doi":"10.1109/NCCCIS.2015.7295903","DOIUrl":"https://doi.org/10.1109/NCCCIS.2015.7295903","url":null,"abstract":"Cloud computing is a new style of computing in which dynamically scalable and often virtualized resources are provided as service over internet. Resource procurement of cloud resources is an interesting and yet unexplored area in cloud computing, to automates the selection of resources for cloud vendor becomes a challenging issue in recent years. This problem is solve by using three novel mechanism for cloud vendor with resource procurement: cloud-dominant strategy incentive compatible (C-DSIC), cloud-Bayesian incentive compatible (C-BIC), and cloud optimal (C-OPT). In C-OPT modules, where the resource allocation is performed based host winner value, the major issue of the work is that authentication is performed for each cloud user. To solve security issue problem in the cloud resource procurement approach, in this work introduce a novel expectation maximization (EM) algorithm for cloud optimal modules resources. The proposed EM methods are used for finding maximum likelihood depends on unobserved latent cloud resource variables for virtual cost and quality of service constraints. To authenticate the cloud user data, cryptography method is introduced in this proposed work. The proposed cryptographic method follows the procedure of Elliptic curve cryptography for authenticating users and cloud vendors. Key values between the cloud user and cloud vendors are exchanged. Each and every key is verified by both cloud user and cloud vendor. If the key value anyone becomes wrong the resource Procurement is not allocated to cloud user, since these users becomes unauthenticated user, there are not allowed to performed resource Procurement process. A cloud broker with such a procurement module enables users to automate the choice of a cloud vendor. Our experiments indicate that the resource procurement cost decrease by calculation of the expectation maximization algorithm and more security than the existing COPT methods by using the elliptic curve cryptography with increase in number of cloud vendors irrespective of the mechanisms.","PeriodicalId":201980,"journal":{"name":"2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114415005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A combined segmentation approach for melanoma skin cancer diagnosis 一种用于黑色素瘤皮肤癌诊断的联合分割方法
S. Sujitha, M. L. Priya, J. Premaladha, K. S. Ravichandran
{"title":"A combined segmentation approach for melanoma skin cancer diagnosis","authors":"S. Sujitha, M. L. Priya, J. Premaladha, K. S. Ravichandran","doi":"10.1109/NCCCIS.2015.7295900","DOIUrl":"https://doi.org/10.1109/NCCCIS.2015.7295900","url":null,"abstract":"This paper illustrates the methodology for melanoma diagnosis, a deadly skin cancer using computer aided image processing techniques. Here, the combination of Median filtering and Karhunen-Loeve transform are used in preprocessing part and also a combination of Active contours and Watershed Transformation algorithms are used in Segmentation process. When this combined method is applied on skin lesion images, the problems like over smoothing and over segmentation were solved.","PeriodicalId":201980,"journal":{"name":"2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123312045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance of fuzzy based clustering algorithms for the segmentation of satellite images — A comparative study 基于模糊聚类算法的卫星图像分割性能比较研究
Ganesan P, K. Palanivel, B. Sathish, V. Kalist, K. Basha, Shaik
{"title":"Performance of fuzzy based clustering algorithms for the segmentation of satellite images — A comparative study","authors":"Ganesan P, K. Palanivel, B. Sathish, V. Kalist, K. Basha, Shaik","doi":"10.1109/NCCCIS.2015.7295906","DOIUrl":"https://doi.org/10.1109/NCCCIS.2015.7295906","url":null,"abstract":"Segmentation is the process of partitioning or classifying an image into some meaningful classes or clusters or segments. The segmentation process based on any one characteristics of the image such as texture, color or intensity. The images received from the satellite contains huge amount of information to process and analyze. It is possible to extract the or identify the object or regions of interest in the image from the segmentation results. The segmentation process is very useful to the subsequent image analysis. Many approaches have been proposed for the segmentation of satellite images, but fuzzy based approaches are most popular and widely used because they have a good performance in a large class of images. In this paper, the fuzzy based clustering approaches Fuzzy-C-Means (FCM) Clustering, Possibilistic C Means (PCM) and Possibilistic Fuzzy C Means (PFCM) are compared and the performance of these algorithms were tested with number of satellite images.","PeriodicalId":201980,"journal":{"name":"2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133415404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Optimization of dynamic resistance against malicious attacks & collusion through enhanced authentication schemes in application to smartcard 基于增强认证方案的智能卡动态抗恶意攻击与合谋优化
G. Rohith, M. Bhuvaneswari, S. Kannaki
{"title":"Optimization of dynamic resistance against malicious attacks & collusion through enhanced authentication schemes in application to smartcard","authors":"G. Rohith, M. Bhuvaneswari, S. Kannaki","doi":"10.1109/NCCCIS.2015.7295905","DOIUrl":"https://doi.org/10.1109/NCCCIS.2015.7295905","url":null,"abstract":"Smart card accelerates and harmonizes the usage in development of day to day activities. The message authentication during the transaction with valid digit codes prevails in systematic higher end secured level of authentication. However, several message authentication schemes have been experimented to protect messages but these authentication schemes have the limitations of high computational and communication overhead, lack of scalability, resilience to node compromise attacks and threshold problem. The enhanced resistance against collusion and malicious attacks on wireless sensor network is presented in this paper. Conventional methods experimented to mitigate the false data and observe the system behavior at the cost of decrease in efficiency. In this paper, a novel filtering system and interleaved hop-by-hop authentication system is developed that effectively localize the mitigation of injected false data. Design of filtering system is tested with well known bench mark of false data mitigation created by the user. Quantitative analysis is performed to enrich the efficiency of the designed system. Furthermore, this approach envisages for the identification of malicious attacks, false packet detection and removal effectively by this authentication scheme which delivers higher order of security.","PeriodicalId":201980,"journal":{"name":"2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127483092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of 2.4GHz patch antennae for WLAN applications 无线局域网2.4GHz贴片天线的设计
M. Karthick
{"title":"Design of 2.4GHz patch antennae for WLAN applications","authors":"M. Karthick","doi":"10.1109/NCCCIS.2015.7295902","DOIUrl":"https://doi.org/10.1109/NCCCIS.2015.7295902","url":null,"abstract":"In this letter, a simple microstrip patch antenna is designed for Wireless Local Area Network (WLAN) applications in IEEE 802.11b/g/n are presented. WLAN is most commonly used wireless distribution standard for short distance network communication. This paper describes a high-gain; single band microstrip antenna is printed on FR-4 substrate and has dimensions of 29.2 × 29.2 × 1.6mm3 with a ground plane. The proposed patch antenna design covers 2.4GHz frequency range with the return loss of -39.008dB. The simulation has been done through ADS 2014. And the designed antenna deliberates excellent performance and a great solution for WLAN applications.","PeriodicalId":201980,"journal":{"name":"2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133659334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Identification of prominent Leaders and analysis of their influence in online social networks 识别杰出领袖并分析他们在在线社交网络中的影响力
Amit Goyal, Francesco Bonchi, Reihaneh Rabbany Khorasgani, Lars Backstrom, Dan Huttenlocher
{"title":"Identification of prominent Leaders and analysis of their influence in online social networks","authors":"Amit Goyal, Francesco Bonchi, Reihaneh Rabbany Khorasgani, Lars Backstrom, Dan Huttenlocher","doi":"10.1109/NCCCIS.2015.7295904","DOIUrl":"https://doi.org/10.1109/NCCCIS.2015.7295904","url":null,"abstract":"Human life is diffused by Social networks(SNs): persons interrelate, influence and are influenced by their confrères. With the advent of WWW, the amount of information accessible on SNs is gigantic, allowing the eminent exploration of data. Social network analysis(SNA) has been achieving consideration from divergent areas like anthropology, biology, psychology, economics. The swift upsurge of the online SN sites and their publicly obtainable data attaining API's has crystallized the prosperity of SNA research. Tracing potent users and their influence is one of the trendiest topics of SNA. Contemporary exploration of associations among the members of a SN reveals that people influence indirect contacts through direct ones. Indispensable evidence about the influential users and the ability to predict them may be leveraged for several applications. This research work employs Pareto front function to mark the prominent leaders which is followed by an empirical analysis of the results of their unswerving influence.","PeriodicalId":201980,"journal":{"name":"2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Region growing segmentation of MRI — A metric topological approach MRI区域增长分割-一种度量拓扑方法
B. Gowri, G. Ilango
{"title":"Region growing segmentation of MRI — A metric topological approach","authors":"B. Gowri, G. Ilango","doi":"10.1109/NCCCIS.2015.7295907","DOIUrl":"https://doi.org/10.1109/NCCCIS.2015.7295907","url":null,"abstract":"Region growing technique has gained a significant importance in medical image segmentation for finer segmentation of tumor. Here, a novel region growing segmentation algorithm is proposed based on metric topological neighbourhoods. The quality of segmentation is measured using the new objective measure entropy along with the traditional validity measures accuracy, PSNR and MSE.","PeriodicalId":201980,"journal":{"name":"2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)","volume":"415 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131528700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信