2018 International Conference on Information Technology (ICIT)最新文献

筛选
英文 中文
Implementation of Linear Discriminant Analysis for Odia Numeral Recognition 线性判别分析在数字识别中的应用
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00043
O. P. Jena, S. Pradhan, P. Biswal, Sradhanjali Nayak
{"title":"Implementation of Linear Discriminant Analysis for Odia Numeral Recognition","authors":"O. P. Jena, S. Pradhan, P. Biswal, Sradhanjali Nayak","doi":"10.1109/ICIT.2018.00043","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00043","url":null,"abstract":"In recent time the character recognition attract the attention of the researchers significantly as it has vast application in several fields. The process of converting input text images into machine understandable code or text is known as optical character recognition. In this paper we have devolved an efficient OCR for recognition of Odia Numerals using Linear Discriminant Analysis and compare the result with principal component analysis. Finally we conclude that LDA has a better recognition accuracy over PCA due to dimensionality reduction.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Intrusion Detection Approach Based On Analysis Of Cluster Heterogeneity 基于集群异质性分析的入侵检测方法
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00039
Pragma Kar, Sagarika Guin, Samiran Chattopadhyay, Gautam Mahapatra
{"title":"An Intrusion Detection Approach Based On Analysis Of Cluster Heterogeneity","authors":"Pragma Kar, Sagarika Guin, Samiran Chattopadhyay, Gautam Mahapatra","doi":"10.1109/ICIT.2018.00039","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00039","url":null,"abstract":"The security of prodigious proportion of variegated information available in computers, connected by a network, can be procured by the employment of suitable Intrusion Detection Systems (IDS). In this paper, a novel intrusion detection approach has been presented that relies on analysing the heterogeneity of clusters formed by reducing the dimensions of data points. The class dominance in each cluster devises the premise of initial classification, which is followed by the appraisal of cluster confidence and cluster spread. The final refined detection is ensured based on the criteria, formulated by these parameters. Experiment conducted on the widely documented KDD Cup '99 dataset infers the efficacy of the approach in terms of high accuracy and low false alarm rates. The robustness and effectiveness is also parametrized by the run time analysis of the system.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114596118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Path Planning Model for Anchor-Free Localization in Wireless Sensor Networks 一种改进的无线传感器网络无锚定位路径规划模型
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00050
T. K. Mishra, Sitanshu Kumar, A. Dass
{"title":"An Enhanced Path Planning Model for Anchor-Free Localization in Wireless Sensor Networks","authors":"T. K. Mishra, Sitanshu Kumar, A. Dass","doi":"10.1109/ICIT.2018.00050","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00050","url":null,"abstract":"In Wireless Sensor Network (WSN), localization stands as a major challenge which is intended to maximize with minimized traveling distance of the beacon node. Further, the important issue is to improve coverage and accuracy in calculation of the location. This paper mainly focuses on an enhanced path planning model using beacon node. The proposed model focuses to improve coverage of the network topology by moving in zig-zag fashion so that it will enhance the reachability of message in almost every corner of the deployed area. The proposed model is simulated extensively in a self simulator with different scenarios and compared with SCAN and anchor based model. The tested performance of the model is presented along with its analytical model. The simulation result shows that the proposed model outperforms by 1% to 2% than the existing model in terms of percentage of nodes settled and energy consumption.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122199205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Searching in a Sorted Linked List 在排序链表中搜索
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00034
Hemasree Koganti, Yijie Han
{"title":"Searching in a Sorted Linked List","authors":"Hemasree Koganti, Yijie Han","doi":"10.1109/ICIT.2018.00034","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00034","url":null,"abstract":"Let A be the array of n integers in {0, 1, …, n-1}. A tree is constructed in O(nloglogm/p+loglogm) time with p processors based on the trie with all the given integers. Additional nodes (O(nloglogm) of them) are added to the tree. After the tree is construct we can, for any given integer, find the predecessor and successor of this integer, insert or delete the integer in A in O(loglogm) time. This result demonstrates for the searching purpose we need not to sort the input numbers into a sorted array for this would need at least O(logn/loglogn) time while this algorithm for constructing the tree can run in O(loglogm) time with n processors.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127670831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic Task Scheduling with Load Balancing using Genetic Algorithm 基于遗传算法的负载均衡动态任务调度
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00029
Chouhan Kumar Rath, P. Biswal, Shashank Sekhar Suar
{"title":"Dynamic Task Scheduling with Load Balancing using Genetic Algorithm","authors":"Chouhan Kumar Rath, P. Biswal, Shashank Sekhar Suar","doi":"10.1109/ICIT.2018.00029","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00029","url":null,"abstract":"Parallel computing is better suitable for modeling, simulating complex problems. Simultaneous use of multiple tasks to compute a particular problem defines Parallel Computing. There are various techniques available to build a powerful parallel computing processor. An efficient task scheduling problem improves the performance of the multiprocessing system. So, distribution of tasks in a multiprocessing environment is the most critical issue today. This paper presents an approach to dynamic task scheduling with load balancing. Load distribution is a major issue for parallel processing now a days. In order to minimize the average make-span and solve the load balancing problem, the Genetic algorithm is used. New kind of fitness function is evaluated using standard deviation. The system is modeled by taking a standard task graph with communication cost and computation cost. Task graph consists of nodes (tasks) allocated to the processors with dependency. The experimental results depict the efficiency of the proposed method.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132077087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Service Placement in Fog Computing Environment 雾计算环境下的服务布局
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00062
H. K. Apat, B. Sahoo, P. Maiti
{"title":"Service Placement in Fog Computing Environment","authors":"H. K. Apat, B. Sahoo, P. Maiti","doi":"10.1109/ICIT.2018.00062","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00062","url":null,"abstract":"Due to the advent of Internet of Things(IoT) plethora of services has been emerged and to perpetuate all these services using cloud computing paradigm is really tiresome. A new promising service provider called as Fog computing came into the picture where the distance between Iot and edge device is small to provide the services efficiently to the end users. There are different considerable factors like service response time, and expected QoS must met without violating other resource constraints. In this paper we try to layout an architecture which is based on the combination of cloud and fog by introducing a middleware called as cloud fog control middleware, which manages the service request according to some constraints. By using this architecture we can maximize the advantages of next generation computer system, however the architecture require new strategies to manage the mapping of services to resources. Despite several Heuristic and Meta Heuristic techniques has been proposed by different authors to solve the service placement in fog computing with considering different parameters like quality of service(QoS), Latency, etc. In this paper we are trying to minimize the energy consumption in fog computing paradigm by formulating the service placement plan in order to utilize the resources efficiently by considering the Active and Idle state of machine. First we calculate the energy consumption by the application(number of tasks) requesting for a particular service. Undoubtedly the service placement problem is a combinatorial optimization problem. The optimal solution obtained distribute the load to some other fog node by appropriate placement of service which leads to reduce the over heat generated by a particular fog node. In this way we can achieve energy minimization in fog computing.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130118696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Machine Learning Approach for Predicting DDoS Traffic in Software Defined Networks 软件定义网络中预测DDoS流量的机器学习方法
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00049
Kshira Sagar Sahoo, Amaan Iqbal, P. Maiti, B. Sahoo
{"title":"A Machine Learning Approach for Predicting DDoS Traffic in Software Defined Networks","authors":"Kshira Sagar Sahoo, Amaan Iqbal, P. Maiti, B. Sahoo","doi":"10.1109/ICIT.2018.00049","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00049","url":null,"abstract":"Software Defined Networks (SDN) paradigm was introduced to overcome the limitations of the traditional network such as vendor dependencies, inconsistency policies, etc. It becomes a promising network architecture that provides the operators more control over the network infrastructure. The controller also called the operating system of the SDN has the centralized control over the network. Despite all its capabilities, the introduction of various architectural entities poses many security threats to SDN layers. Among many such security issues, Distributed Denial of Services (DDoS) is a rapidly growing attack that poses a tremendous threat to SDN. It targets to the availability of the network, by flooding the controller with spoofed packets. It causes the controller to become paralyzed, and thereby the entire network becomes destabilize. Therefore, it is essential to design a robust DDoS detection mechanism to prevent the control plane attack. In this regard, we have used seven Machine Learning techniques to accurately classify and predict different DDoS attacks like Smurf, UDP flood, and HTTP flood. Experimental results with proper analysis have been presented in this work.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124598161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
TCA: A Multi Constraint Real-Time Task Scheduling Algorithm for Heterogeneous Cloud Environment 面向异构云环境的多约束实时任务调度算法
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00036
Sampa Sahoo, S. Sahu, Tanmay Kumar Rath, B. Sahoo, A. K. Turuk
{"title":"TCA: A Multi Constraint Real-Time Task Scheduling Algorithm for Heterogeneous Cloud Environment","authors":"Sampa Sahoo, S. Sahu, Tanmay Kumar Rath, B. Sahoo, A. K. Turuk","doi":"10.1109/ICIT.2018.00036","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00036","url":null,"abstract":"Cloud computing is an emerging computing paradigm, where cloud resources are available according to the pay-per-use pricing model and can be scaled dynamically depending on the application needs. Noticeably, many real-time applications that demand both time and functional correctness are moving to cloud. So, it requires efficient use of cloud resources to support applications need. In this context, task scheduling is a well-known technique to achieve the performance improvement of applications running in clouds. Again, execution time and execution cost play a vital role in deciding an appropriate VM for execution of a real-time task. In this paper, we formulate the real-time task scheduling problem as a multi-constraint optimization problem with time and cost constraint. Further, proposed a solution through time and cost-efficient best fit (TCA: BF) and first fit (TCA: FF) scheduling algorithms. Extensive simulation is performed to validate the superiority of the proposed approach compared to some existing ones.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131467859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of an Intelligent Controller for 6 Degrees of Freedom Quad Rotor UAV 六自由度四旋翼无人机智能控制器设计
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00017
Mohan Debarchan Mohanty, M. Mohanty
{"title":"Design of an Intelligent Controller for 6 Degrees of Freedom Quad Rotor UAV","authors":"Mohan Debarchan Mohanty, M. Mohanty","doi":"10.1109/ICIT.2018.00017","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00017","url":null,"abstract":"Air Vehicles without human subject are as a rule, progressively utilized in the recent memory in both military and civil applications. A well-known developed stage of an UAV rotating wing is a Quad rotor. This paper proposes the design of one such Quad rotor based on PID control and Fuzzy Logic. The PID Control helps in automating the vehicle by controlling its different motions; throttle, roll, pitch and yaw respectively. The fuzzy logic here provides certain rules for actuating the four different controls. The fuzzy logic is used because it has the potential to deal effectively with high nonlinear systems and imprecise data. The use of a type of Controller makes the system modular and increases its adaptability. It presents the design and implementation of a 6 degrees of freedom control system for a quadrocopter. Further, the work can be focused upon the detailed study of each motion and the real world communication of the quad rotor with the environment.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127705592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting Software Reliability using Computational Intelligence Techniques: A Review 应用计算智能技术预测软件可靠性:综述
2018 International Conference on Information Technology (ICIT) Pub Date : 2018-12-01 DOI: 10.1109/ICIT.2018.00033
Vinod Kumar Kulamala, A. SarathChandraTeja, Abha Maru, Y. Singla, D. Mohapatra
{"title":"Predicting Software Reliability using Computational Intelligence Techniques: A Review","authors":"Vinod Kumar Kulamala, A. SarathChandraTeja, Abha Maru, Y. Singla, D. Mohapatra","doi":"10.1109/ICIT.2018.00033","DOIUrl":"https://doi.org/10.1109/ICIT.2018.00033","url":null,"abstract":"Software measurement is yet in an infant stage. There is hardly any efficient quantitative method to represent software reliability. The existing methods are not generic and have many limitations. Various techniques could be used to enhance software reliability. However, one has to not only balance time but also cater to budget constraints. Computational Intelligence (CI) techniques that have been explored for software reliability prediction have shown remarkable results. In this paper, the applications of CI techniques for software reliability prediction are surveyed and an evaluation based on some selected performance criteria is presented.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116282264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信