2014 International Conference on Computer Communication and Informatics最新文献

筛选
英文 中文
Performance evaluation of different intrusion detection system: An empirical approach 不同入侵检测系统的性能评估:一种经验方法
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921740
Bilal Maqbool Beigh, M. Peer
{"title":"Performance evaluation of different intrusion detection system: An empirical approach","authors":"Bilal Maqbool Beigh, M. Peer","doi":"10.1109/ICCCI.2014.6921740","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921740","url":null,"abstract":"Easy connectivity to a large number of networks is the main reason towards the development of security measures in the field of networking. People as well as organizations are very keen to share their resources online. But sharing the valuable information over the network may not be safe as it may be hacked by their rivals, to either destroy them or to make their own benefits from this data. The technique / system which protect our data from theft or intrusions, we call that as Intrusion Detection System. Though there are many intrusion detection systems available in the market, however users are not well familiar with the performance of different intrusion detection system or are confused with the results provided by companies. In this paper, we will make an attempt to provide a better view of performance of different intrusion detection techniques implemented under same conditions (DARPA 1999 Dataset) and with same parameters for implementation (i.e Data set will be used DARPA 1999 for experimentation). Lastly will provide some results which will be fruitful for user in accordance to the performance.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116372671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Facial feature extraction and textual description classification using SVM 基于支持向量机的人脸特征提取与文本描述分类
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921772
N. Bansode, P. Sinha
{"title":"Facial feature extraction and textual description classification using SVM","authors":"N. Bansode, P. Sinha","doi":"10.1109/ICCCI.2014.6921772","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921772","url":null,"abstract":"Facial feature detection and extraction plays a significant role in face recognition. In this paper, we proposed a new approach for face feature description using support vector machine classifier. Searching image from the image contents is a major challenge in computer vision and pattern recognition. The textual label is assigned to the face feature according to the semantic meaning of the feature. The concept of the textual image description gives advantages to the user to search the image with the help of the visual attributes of the image. The face features like eyes, nose, mouth are labeled with the visual attributes like small, normal and large.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121927392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of energy efficiency of spectrum sensing algorithm for Cognitive Radio networks 认知无线电网络频谱感知算法能量效率评价
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921791
Viswanathan Ramachandran, A. Cheeran
{"title":"Evaluation of energy efficiency of spectrum sensing algorithm for Cognitive Radio networks","authors":"Viswanathan Ramachandran, A. Cheeran","doi":"10.1109/ICCCI.2014.6921791","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921791","url":null,"abstract":"Cognitive Radio (CR) is a radio communications and networking technology that has attracted considerable interest from both academia and industrial sectors in recent times. As is well known, spectrum sensing forms the very backbone on which the operation of CR technology draws upon. Spectrum sensing can be defined as the task of collecting information regarding spectral resource utilization and presence of primary users (PU) in a given area; which can then be used to accommodate secondary users (SU) on a non interfering basis. Spectrum Sensing is one of the most power hungry tasks in a Cognitive Radio system. Due to the energy constraints of battery powered mobile terminals, energy efficiency emerges as a significant challenge in CR networks. However, there is a direct tradeoff between bandwidth efficiency and power efficiency according to Shannon's Channel Capacity Theorem. This paper describes an energy efficient two stage spectrum sensing algorithm that is based on joint energy detection and cyclostationary feature detection. The paper also evaluates the energy efficiency of the spectrum sensing algorithm for CR and it is shown through simulations that the scheme attempts to simultaneously achieve good power efficiency as well as bandwidth efficiency. It is also noted that the application of Compressed Sensing leads to further improvement in the energy efficiency of our algorithm.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131952370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Power optimization in mobile stations using heterogeneous small cells for green cellular networks 绿色蜂窝网络中使用异构小蜂窝的移动站功率优化
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921825
A. Aarthy, S. Brindha, M. Meenakshi
{"title":"Power optimization in mobile stations using heterogeneous small cells for green cellular networks","authors":"A. Aarthy, S. Brindha, M. Meenakshi","doi":"10.1109/ICCCI.2014.6921825","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921825","url":null,"abstract":"In modern networks, consumers are becoming more and more demanding in terms of the services they require. To explore future technologies in order to bring improvements in the entire network infrastructure has pushed the limits of energy efficiency which leads to Green Communication. At the same time, the demand for higher data rates and the ever-increasing number of wireless users led to rapid increase in power consumption. To overcome these issues, low-power nodes (LPNs), such as micro base stations (eNodeBS, or eNBS), pico eNBS, home eNBS (femtocells), relays and distributed antenna systems (DAS) or remote radio heads (RRHs) are introduced throughout the macro cell network which forms a heterogeneous topology to enhance coverage and system capacity. The multi-hop relay communication can be used to improvise the range of the existent cells and analyze the power saving as well as the performance metrics of the network. A heterogeneous network topology is proposed and compared based on battery utilizations with an existent network scenario and relay strategy.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"349 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122527769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Document layout analysis for Indian newspapers using contour based symbiotic approach 基于等高线共生方法的印度报纸版面分析
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921723
V. Singh, B. Kumar
{"title":"Document layout analysis for Indian newspapers using contour based symbiotic approach","authors":"V. Singh, B. Kumar","doi":"10.1109/ICCCI.2014.6921723","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921723","url":null,"abstract":"Document layout analysis is necessary process for automated document recognition systems. Document layout analysis identifies, categorizes and labels the semantics of text blocks for meaningful information retrieval from document images. Our primary target document includes various newspaper and magazine pages which are having complex layout without following any static rules. We propose an effective approach for document layout analysis where power of bottom up approach and top-down approach i.e. region growing and segmentation respectively, have been utilized simultaneously. In this methodology various image morphological operations, contour analysis, connected component analysis, projection analysis are employed for the realization. The proposed algorithm has been successfully implemented and applied over a large number of Indian script newspaper and magazine pages. The results have been evaluated by number of blocks detected and taking their correct ordering information into account.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131096850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An optimal algorithm for the flexible maneuverability in smart sensor networks (SSNs) 智能传感器网络柔性机动性的优化算法
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921763
S. Rajaraajeswari, R. Selvarani, P. Raj
{"title":"An optimal algorithm for the flexible maneuverability in smart sensor networks (SSNs)","authors":"S. Rajaraajeswari, R. Selvarani, P. Raj","doi":"10.1109/ICCCI.2014.6921763","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921763","url":null,"abstract":"Sensors and actuators are being extensively used these days across industry verticals for a variety of reasons. With a number of delectable advancements in network topologies and communication technologies, novel types of sensors networks are being formed according to the business requirements. Smart sensors are capable of crafting ad hoc networks for accomplishing specified tasks. The direct fallout of these improvisations is the possibility and sustainability of smarter environments. For examples, nowadays there are a lot of happenings around the concepts of smarter homes, offices, cities, governments, healthcare etc. Smarter services are being realized with the help of smarter sensors and their networks. However one of the impending challenges is the network path optimization. There are several methods and mechanisms in place for optimizing network path identification. However, with the emergence of smarter environments, the current approaches need to improve significantly. In this paper, we have taken up the tried, tested and trusted Dijkstra algorithm and come out with a much-improved algorithm for realizing the much-anticipated flexibility and maneuverability in network path identification and optimization. This newly crafted algorithm goes a long way in conceptualizing and concretizing a variety of newer applications while ensuring the principal non-functional requirements such as energy efficiency, extensibility, etc.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134154841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of student academic progression: A case study on Vignan University 学生学业进步预测:以维格南大学为例
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921731
K. V. Krishna Kishore, S. Venkatramaphanikumar, S. Alekhya
{"title":"Prediction of student academic progression: A case study on Vignan University","authors":"K. V. Krishna Kishore, S. Venkatramaphanikumar, S. Alekhya","doi":"10.1109/ICCCI.2014.6921731","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921731","url":null,"abstract":"To explore the academic progression of the students, higher educational institutions need better assessment and prediction tools. In this regard, Multilayer Perceptron (MLP) based prediction application is proposed to predict the Grade Point Average (GPA) of the Undergraduate students by the make use of student's Previous Academic History, Regularity, No. of Backlogs, Degree of Intelligence, Working Nature, Discipline, Social Activities and Grade. With this application it is possible to predict the student's data that who are at risk, and some proactive measures like extra classes & supporting material are offered to improve the academic progress of those students. To evaluate the performance of the proposed application, data has recorded from 134 third Year Computer Science Engineering Students of Vignan University and achieved 95.52% and 97.37% of prediction accuracy with RBF and MLP respectively.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"565 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134430738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A secure image steganography technique with moderately higher significant bit embedding 一种具有较高有效位嵌入的安全图像隐写技术
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921726
P. Gupta, Ratnakirti Roy, S. Changder
{"title":"A secure image steganography technique with moderately higher significant bit embedding","authors":"P. Gupta, Ratnakirti Roy, S. Changder","doi":"10.1109/ICCCI.2014.6921726","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921726","url":null,"abstract":"Steganography is a process to hide secret data into a cover media in an imperceptible manner. In the spatial domain of image steganography, the most common technique is Least Significant Bit Replacement (LSBR). However, LSBR is extremely sensitive to compression attacks involving truncation of LSBs. As a possible solution to the drawback of the traditional LSBR scheme, this paper proposes an image steganography technique that embeds secret data in the moderately higher significant bits such as 4th or 5th bit of a pixel. The proposed method uses a color image as a cover and according to pixel values; three groups of pixels are maintained. These groups are used for selecting the candidate pixels for 4th or 5th bit embedding. It also implements an optimal pixel adjustment process (OPAP) to minimize the visual distortion due to embedding. In addition to the OPAP, a method for randomly dispersing the secret data bits is also implemented making it harder for an adversary to detect hidden information. The experimental results for proposed method showed high values for Peak Signal to Noise Ratio (PSNR) signifying High stego-image fidelity.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123326826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A low power CMOS Voltage Controlled Oscillator in 65 nm technology 65纳米技术的低功耗CMOS压控振荡器
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921794
A. Sharma, Saurabh, S. Biswas
{"title":"A low power CMOS Voltage Controlled Oscillator in 65 nm technology","authors":"A. Sharma, Saurabh, S. Biswas","doi":"10.1109/ICCCI.2014.6921794","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921794","url":null,"abstract":"Wireless device portability and power efficiency are the two major challenges in modern device modeling. Voltage Controlled Oscillator (VCO) is one the most essential circuit used in wireless systems. A new three stage VCO design in 65nm technology is proposed in this paper and is compared with previous best Current starved VCO design on the basis of on-chip area utilization and power consumption. The measured tuning range of the proposed VCO design is 0.83 to 3.77 GHz and it is around 30-33% energy efficient than the previous best design. The new proposed VCO design uses 67.65 μm2 area which is 40.75% less than the chip area required for the fabrication of current starved VCO design.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123066828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Image fusion with Biorthogonal Wavelet Transform based on maximum selection and region energy 基于最大选择和区域能量的双正交小波图像融合
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921720
M. Haribabu, C. Bindu, K. Prasad
{"title":"Image fusion with Biorthogonal Wavelet Transform based on maximum selection and region energy","authors":"M. Haribabu, C. Bindu, K. Prasad","doi":"10.1109/ICCCI.2014.6921720","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921720","url":null,"abstract":"Image Fusion plays major research role in the fields of image processing. Image Fusion is a method of combining the relevant information from a set of images, into a single image, where in the resultant fused image will be more informative and complete than any of the input images. Specifically it serves best in medical diagnosis i.e. Computed Tomography (CT), Magnetic Resonance Image (MRI) scans provide different types of information, by fusion can get accurate information for better clinical diagnosis. The Biorthogonal Wavelet Transform (BWT) is one of the most widely used transform method for fusion. Here this paper discusses the Biorthogonal wavelet transform based image fusion with absolute maximum selection rule and energy based fusion rule. The proposed method analysed both qualitatively and quantitatively among various fusion methods.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126147171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信