2013 International Conference on Current Trends in Engineering and Technology (ICCTET)最新文献

筛选
英文 中文
Image noise removal framework based on morphological component analysis 基于形态分量分析的图像去噪框架
S. Janardhana, J. Jaya, K. J. Sabareesaan, Jaina George
{"title":"Image noise removal framework based on morphological component analysis","authors":"S. Janardhana, J. Jaya, K. J. Sabareesaan, Jaina George","doi":"10.1109/ICCTET.2013.6675912","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675912","url":null,"abstract":"Now image denoising is an important process in image processing. The proposed method focuses on rain streak removal frame work based on morphological component analysis. Bilateral filter is used in the denoising stage. Then the filtered image partitioned into low frequency and high frequency component. The high frequency component undergone various processes such as patch extraction, dictionary learning and dictionary partitioning. The output of dictionary partitioning approach undergone morphological component analysis as an image decomposition process. As a result, the rain component can be successfully removed from the image while preserving most of the original image details.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126741140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling and manual design comparision of streeses in castellated beam using ansys 用ansys对城堡式梁的应力进行建模与手工设计比较
E. Rajalakshmi
{"title":"Modeling and manual design comparision of streeses in castellated beam using ansys","authors":"E. Rajalakshmi","doi":"10.1109/ICCTET.2013.6675951","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675951","url":null,"abstract":"The objective of this thesis is to investigate and evaluate the use of the finite element method for the analysis of castellated beams. The analysis is to be carried on the castellated beams and calculated the stresses values. By knowing stresses values we can calculate the deflection, load carrying capacity of the beam. The following procedure is used to meet this goal 1. A literature review is conducted to evaluate previous analytical procedures related to castellated beams. 2. A calibration model using a commercial finite element analysis package (ANSYS) is set up and analysis is done.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129183962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding the DDoS attacks in the network using distance based routing 利用基于距离的路由发现网络中的DDoS攻击
P. Sowkarthiga, N. Suguna
{"title":"Finding the DDoS attacks in the network using distance based routing","authors":"P. Sowkarthiga, N. Suguna","doi":"10.1109/ICCTET.2013.6675999","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675999","url":null,"abstract":"Distributed Denial of Service (DDoS) attack is a critical threat to the internet. Botnets are the engines behind them. Botmasters disables the detectors by mimicking the traffic patterns of the flash crowds. It is a critical challenge to those who defend against DDoS attacks. A discrimination algorithm is used to find the flow correlation coefficient to discriminate the attack flows from the flash crowds. We used a routing based algorithm to calculate the dynamic flow correlation coefficient and an IP trace back mechanism is used to find the attackers who mimic the traffic patterns of the flash crowds. We formulated the problem and presented the theoretical proof for the feasibility of the routing based method.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133734881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EMMT: Multiflow wireless multicasting transmission for IEEE 802.11 EMMT: IEEE 802.11的多流无线多播传输
S. Rameshkumar, A. Vijay
{"title":"EMMT: Multiflow wireless multicasting transmission for IEEE 802.11","authors":"S. Rameshkumar, A. Vijay","doi":"10.1109/ICCTET.2013.6675914","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675914","url":null,"abstract":"In Wireless multimedia services have a major applications of next generation wireless networks to the efficient utilization of network resources when a channel becomes saturated that time develop the number of concurrent multimedia flows to the network. How, In the flow scheduling and the channel aggregation policy are both the single-hop and multi-hop wireless networks with the motivation of the trade-off between the multiple flow transmission and limited channel resources. So to develop the number of performance and data flows are guaranteed increase in multimedia flows, it based on the dynamic states of wireless channels and the profiles of multimedia flows, we following that above two policies are fully utilize the performance gap to schedule concurrent flows for transmission in turn and aggregate multiple channels' residual capacities for useful flow transmissions. We then design a novel algorithm - efficient multi-flow multicast transmission (EMMT) - to apply the proposed policies to practical wireless multimedia multicast applications. So we can increase the data flows in multimedia in deferent path. Here we use ns2 simulations to evaluate the policies and the EMMT algorithm. This type of process is proved that the resource allocation of the new technology and also compared with Channel diversity transmission method. With the further development of quality of service schemes on relating user experience to QoS.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134155728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bettering the reliability through gossiping in Wireless Sensor Networks 无线传感器网络中利用八卦提高可靠性
P. Subramanian, E. Logashanmugam
{"title":"Bettering the reliability through gossiping in Wireless Sensor Networks","authors":"P. Subramanian, E. Logashanmugam","doi":"10.1109/ICCTET.2013.6675935","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675935","url":null,"abstract":"Wireless Sensor Network consists of several sensor nodes which continuously monitor or sensing its environmental or physical condition and agreeably sends the sensing information to the Base Station or Sink. WSNs are application-specific, where the design requirements of WSNs change according to the application. Hence, routing protocol requirements are changed from one application to another. As WSN is mainly used to send the critical messages, many protocols have been proposed to increase network lifetime. In our project we propose a new protocol called Reliable Location based Gossiping (RLGossiping) to address the problems of Gossiping and its extensions. RLGossiping consists of three phases: Initialization, Information Gathering and Routing. We show how our approach increases the network energy and as a result maximizes the network life time. Saving the nodes energy leads to an increase in the node life in the network.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129825686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fully selfish node detection, deletion and secure replica allocation over MANET 完全自私的节点检测,删除和安全副本分配在MANET
N. Muthumalathi, M. Raseen
{"title":"Fully selfish node detection, deletion and secure replica allocation over MANET","authors":"N. Muthumalathi, M. Raseen","doi":"10.1109/ICCTET.2013.6676000","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6676000","url":null,"abstract":"In a mobile ad hoc network, several replica allocation techniques have been proposed to minimize performance degradation. If the nodes in a MANET together have sufficient memory space to hold both all the replicas and the original data. Some nodes may act selfishly, selfish nodes decide only to cooperate partially, or not at all, with other node (that is., Non-cooperative actions of misbehavior are usually termed as selfishness, which is notably different from malicious behavior). Selfish node may not share its own memory space to store replica for the benefits of other nodes. To develop a selfish node detection algorithm that considers partial selfishness and novel replica allocation technique to properly cope with selfish replica allocation. Selfish replica allocation refers to a node's non-cooperative action, such that the node refuses to cooperate fully in sharing its memory space with other nodes. Secure Hill cipher algorithm is to provide the security in replica data. Selfish replica allocation techniques significantly reduce communication cost and Simulation result show fully selfish node detection time, fully selfish node deletion time.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130042504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Detecting misbehavior routing and attacks in disruption tolerant network using itrm 利用itrm检测容错网络中的错误路由和攻击
K. Devi, P. Damodharan
{"title":"Detecting misbehavior routing and attacks in disruption tolerant network using itrm","authors":"K. Devi, P. Damodharan","doi":"10.1109/ICCTET.2013.6675979","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675979","url":null,"abstract":"In DTN selfish node or malicious node may drop received packets such reduces the packet delivery ratio and system resources. Routing misbehavior can be caused by selfish node because it drops packets even it has a sufficient buffer space. One serious problem in this paper is routing misbehavior and black whole attack. The router act as an attacker and drops the packet continuously and will not forwards the packet to receiver node. The another problem in this paper is black whole attack, it is caused by the black whole node, it advertise itself as a perfect node to all the destination but it drops the packet received from other node. To address this problem we propose a distributed scheme to detect such routing misbehavior in DTN. In this scheme a node is required to keep a few signed contact record of its previous contacts based on the next contacted node. The contact node contains when this contact happens, what packet they send and what packets they received during the data exchange so it is easy to identify which node has drops received packet. We also propose tracer routing to provide the efficient routing strategy that is designed to control routing. In this scheme the initiator appends the signature to the query. when an intermediate node x receives the packet first it verifies the packet and discard the forged one using the initiators public key. Then x forwards the packet it received to the next hop. At the same time it sends the acknowledgement to the initiator. We also propose an encryption algorithm to detect attacker and provide the security during the data exchange.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124925321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Computer aided inspection system for food products using machine vision — A review 使用机器视觉的食品计算机辅助检测系统。综述
S. Janardhana, J. Jaya, K. J. Sabareesaan, Jaina George
{"title":"Computer aided inspection system for food products using machine vision — A review","authors":"S. Janardhana, J. Jaya, K. J. Sabareesaan, Jaina George","doi":"10.1109/ICCTET.2013.6675906","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675906","url":null,"abstract":"The aim of this review paper is to emphasis Computer Aided Inspection (CAI) system for the detection of defects in food products. As the food products are being consumed directly (processed / Unprocessed) by human beings, defects in food products cause serious health hazards which insists to develop an inspection system which facilitates for food products of high quality and safety standards. CAI system provides an alternative for an automated, non-destructive and cost effective technique to accomplish accurate, fast and objective quality determination. This CAI system is based on image Analysis and processing which can be adopted in food industry. The various stages of CAI system consists of preprocessing, enhancement, segmentation, feature extraction and classification. Considerable research as proven its potential for inspection and grading of fruits, meat, vegetables, grain, bakery products, confessionary products and processed food products. This paper reviews the recent development and advances of CAI in the food industry. The fundamental elements of the system and technology are examined.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122044496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A new supportive opportunistic routing scheme in Mobile Ad-hoc Networks 移动Ad-hoc网络中一种新的支持性机会路由方案
S. S. Kumar, V. Parthasarathy
{"title":"A new supportive opportunistic routing scheme in Mobile Ad-hoc Networks","authors":"S. S. Kumar, V. Parthasarathy","doi":"10.1109/ICCTET.2013.6675938","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675938","url":null,"abstract":"All the data transmission over the wireless medium in the wireless networks is by broadcasting in nature, which is different from the Internet. Because of the broadcast nature, many opportunities based on overhearing can be used to enhance the data transmission ability in wireless network. Ex-OR is the first practical data forwarding scheme which tries to promote the data transmission ability by utilizing the broadcast nature in wireless mesh networks and the opportunistic data forwarding becomes a well-known term given by Ex-OR to name this kind of new data forwarding scheme. The basic idea in ExOR has triggered a great deal of derivations. However, almost all these derivations are proposed for wireless mesh networks or require the positioning service to support opportunistic data forwarding in the Mobile Ad-hoc Networks (MANETs). In our system, we propose a series of solutions to implement opportunistic data forwarding in more general MANETs, which is called Supportive Opportunistic Routing Scheme in Mobile Ad-hoc Networks (SORS). We propose the small-scale retransmission to utilize the broadcast nature one step further than ExOR, and furthermore it helps us to enhance the efficiency and robustness of the opportunistic data forwarding in MANETs. We run computer simulations in Network Simulator 2 (ns-2), and the simulation results indicate that the proposed solutions work well to support opportunistic data forwarding in MANETs.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128294719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Non convex economic load dispatch problem by Efficient Biogeography Based Optimization algorithm 基于高效生物地理优化算法的非凸经济负荷调度问题
M. Vanitha, K. Thanushkodi
{"title":"Non convex economic load dispatch problem by Efficient Biogeography Based Optimization algorithm","authors":"M. Vanitha, K. Thanushkodi","doi":"10.1109/ICCTET.2013.6675926","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675926","url":null,"abstract":"In this paper a new Efficient Biogeography Based Optimization (EBBO) algorithm is discussed and it is applied to solve the non convex Economic Load Dispatch (ELD) problem for the minimization of fuel cost. This EBBO uses the concept of Particle Swarm Optimization (PSO), mutation of Differential Evolution (DE) and migration of Biogeography Based Optimization (BBO). The conventional PSO is improved by using the mutation operators of DE and migration of BBO. Thus, the EBBO method gives a global optimal solution to the ELD problem and it also improves the computational time in comparison to other optimization methods. The combined methodology is applied to test the performance of the test system consisting of 40 thermal units. Fuel cost function takes into account the valve-point loading effects. The simulation result shows that this method has the capability to generate the best solution with better convergence speed.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129596575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信