2017 International Conference on Intelligent Computing and Control (I2C2)最新文献

筛选
英文 中文
Comparative study on RSA algorithm of multi-keyword search scheme over encrypted cloud data 加密云数据上多关键字搜索方案的RSA算法比较研究
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-01 DOI: 10.1109/I2C2.2017.8321836
Y. Harshitha, S. Seema, P. Apoorva
{"title":"Comparative study on RSA algorithm of multi-keyword search scheme over encrypted cloud data","authors":"Y. Harshitha, S. Seema, P. Apoorva","doi":"10.1109/I2C2.2017.8321836","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321836","url":null,"abstract":"Cloud computing offers advantages in terms of scalability and availability as the ability to access resources anytime and anywhere over an external server can bring about issues concerning data privacy, however. To combat this, one might have the data go through an encryption process prior to a server upload. This approach however can tamper with the ability to work with the data on a plain text level. Hence, it is necessary to enable the cloud server to make use an encrypted search feature for efficient data accessibility. This paper intends to provide a comparative study of keyword search-based of multi-keyword ranked search implementations with the intention of comparing them in terms of efficiency. The performance of these implementations with respect to speed of searches made over encrypted data with the same is extended in the view of decryption. Results are showcased in graphs to enable the reader to get a comparative understand of these implementations at a glance.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115173405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Prototype survey analysis of different information retrieval classification and grouping approaches for categorical information 分类信息的不同信息检索分类分组方法的原型调查分析
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-01 DOI: 10.1109/I2C2.2017.8321825
K. Kamakshaiah, R. Seshadri
{"title":"Prototype survey analysis of different information retrieval classification and grouping approaches for categorical information","authors":"K. Kamakshaiah, R. Seshadri","doi":"10.1109/I2C2.2017.8321825","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321825","url":null,"abstract":"Present days, large amount information stored in information sources, which is formally increased based on Knowledge Discovery from information warehouses with different formats of information. To acquire required and useful information from information sources, some of the techniques, methods and some of developed tools to combine large or high dimensional information sets. This procedure gives demand to implement novel research field i.e. information retrieval. The main task behind information retrieval is to extract required information from large size of information and change them into meaningful for further use in information retrieval. Classification and Grouping's are the main information retrieval approaches to classify and combine categorical information in a large set of information into required group set of class labels. So in this document, we provide comprehensive analysis of different classification and grouping methods in information retrieval to efficient information retrieval, which includes neural networks, Bayesian networks and decision trees. We also provide survey on some of semi supervised and supervised outlier detection techniques for categorical information on unlabeled information sets under large of instances in information sets with required instances in real time synthetic information. We bring out the keys aspects of different outlier and information retrieval approaches to information exploration.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115527165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection and rectification of distorted fingerprints 扭曲指纹的检测与校正
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-01 DOI: 10.1109/I2C2.2017.8321809
K V Silpamol, Pillai Praveen Thulasidharan
{"title":"Detection and rectification of distorted fingerprints","authors":"K V Silpamol, Pillai Praveen Thulasidharan","doi":"10.1109/I2C2.2017.8321809","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321809","url":null,"abstract":"Elastic distortion of fingerprint is one amongst the foremost downside in fingerprint matching. Since current fingerprint matching systems cannot match seriously distorted fingerprints, malicious persons could deliberately distort their fingerprints to cover their identity. Existing distortion detection strategies need availableness of specialized hardware or fingerprint video, limiting their use in real applications. In this paper, investigate a study on fingerprint distortion and rectification algorithm and use a dictionary based orientation field estimation approach to recognize latent fingerprints that is captured using ancient fingerprint sensing techniques. In this wok to take advantage of stronger prior knowledge of fingerprints so as to further improve the performance. Promising results are obtained on 3 databases containing several distorted fingerprints, particularly NIST SD27 latent fingerprint database, FVC2004 DB1, and also the Tsinghua Distorted Fingerprint database.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122454436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Secured repertory of patient information in cloud 云端安全的患者信息存储库
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-01 DOI: 10.1109/I2C2.2017.8321885
N. Kumar, P. Harini, G. D. Kumar, G. Rathi
{"title":"Secured repertory of patient information in cloud","authors":"N. Kumar, P. Harini, G. D. Kumar, G. Rathi","doi":"10.1109/I2C2.2017.8321885","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321885","url":null,"abstract":"Healthcare information storage in cloud computing is emphasized on the storage of the unstructured data into the cloud using an effective database Mongo DB which is the flavor of NoSQL. As the health care data structure are unique and complex, it must be evaluated in such a way that information upload and access must be efficient and available at any time. Dual mode security for both authentication and retrieving of data from the database has been implemented. To make sure that patient information are stored and retrieved efficiently, security algorithms has been used.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122965429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Allocating resources in cloud using CloudAnalyst 使用CloudAnalyst在云中分配资源
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-01 DOI: 10.1109/I2C2.2017.8321912
M. Aruna, D. Bhanu, S. Karthik
{"title":"Allocating resources in cloud using CloudAnalyst","authors":"M. Aruna, D. Bhanu, S. Karthik","doi":"10.1109/I2C2.2017.8321912","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321912","url":null,"abstract":"Cloud Computing is a recent technology which is used to deliver the computing resources as a service over Internet inorder to facilitate the execution of tasks that involve in large-scale computation. A data center (DC) is a basis for the provision of cloud services which is composed of networked computers and storage that use to organize process, store and disseminate huge data. The cloud environment utilizes both computing and networking resources for the dynamic provisioning of resources, configuration and reconfiguration, and optimization of resources allocation. This helps to maximize the utilization of the data center and to minimize the cost for running user request in the cloud. In the proposed work, CloudAnalyst tool is used for creating Data Centers and userbase and inturn virtual machines (VM's) can be created for the data centers. In the proposed work, service broker's policies are analyzed for allocating resources efficiently.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122191403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of SPA decoder for CDMA applications CDMA应用的SPA解码器设计
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-01 DOI: 10.1109/I2C2.2017.8321793
A. Rajagopal, K. Karibasappa, K. S. Patel
{"title":"Design of SPA decoder for CDMA applications","authors":"A. Rajagopal, K. Karibasappa, K. S. Patel","doi":"10.1109/I2C2.2017.8321793","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321793","url":null,"abstract":"Low Density Parity Check (LDPC) codes are Shannon-Limit approaching codes. Shannon stated the theoretical bounds for digital data transmission in a given channel capacity with error correction coding. Spread Spectrum also called as CDMA (Code Division Multiple Access) is an efficient way of radio wave communication deployed in commercial broadcasts, ham radios, military communications, police radios, etc. CDMA is a means of signal transmission in which the signal frequency is spread over a very wide bandwidth. Spreading of data is achieved prior to transmission with the help of an independent code called ‘Pseudo Noise Code’ (PN sequences), which is subsequently used in the receiver end to de-spread the signal received in order to recover the signal data. PN sequences based on prime numbers like Legendre & Weil sequences are used in the present work. An impressive part of LDPC lies in its decoding algorithm. Sum-Product Algorithm (SPA) decoding offers the best error performance amongst all the types of decoding techniques of LDPC codes and thus applied here. This paper demonstrates an idea of introducing LDPC codes along with DS-Spread Spectrum technique using Legendre & Weil sequences. In the present work, the encoding and decoding algorithms are applied after spreading of the signal. SPA decoding technique is successfully employed and simulated results are plotted taking an example design to illustrate the concepts discussed above.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124674308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A survey on routing protocols and load balancing techniques in Wireless Mesh Networks 无线Mesh网络中的路由协议和负载均衡技术综述
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-01 DOI: 10.1109/I2C2.2017.8321891
K. Rathan, S. Roslin
{"title":"A survey on routing protocols and load balancing techniques in Wireless Mesh Networks","authors":"K. Rathan, S. Roslin","doi":"10.1109/I2C2.2017.8321891","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321891","url":null,"abstract":"Internet has become the most inevitable and inescapable part of daily living. The user community of internet has exponentially grown in the last decade and it is continuing to grow every. To cater the need of mobile users and to evade the expensive wired communication, the next generation users need an effective wireless design. Wireless Mesh Networks (WMN) is proving to be a cost-efficient and infrastructure independent network. However, there still exist a number of technical challenges in this area. To provide a better understanding, this article describes the architecture, applications and implementation in various geographical areas. It also provides a detailed study of the present routing protocols, metrics and the load balancing techniques.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130498387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Twitter sentiment analysis using multi-class SVM 基于多类SVM的推特情感分析
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-01 DOI: 10.1109/I2C2.2017.8321798
K. Lavanya, C. Deisy
{"title":"Twitter sentiment analysis using multi-class SVM","authors":"K. Lavanya, C. Deisy","doi":"10.1109/I2C2.2017.8321798","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321798","url":null,"abstract":"Sentiment Analysis or Opinion Mining is a field which is used to study the user's opinions towards a product or an organization or a person. Twitter, a micro-blogging service allows the user to share their opinions and aspects of life. Sentiment analysis on twitter is a big challenge because it has diverse topics. The classifier that is trained on a specific topic will not perform well on another topic. So, the topic adaptive training method is proposed to address this problem. In this method, non-text features are also extracted from tweets for training the algorithm. The algorithm classifies the tweets of different topics as positive, negative, neutral. The proposed method is evaluated across different topics and it outperforms in terms of recall, precision and F-score.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126790994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
HFSA-SORA: Hybrid firefly simulated annealing based spectrum opportunistic routing algorithm for Cognitive Radio Ad hoc Networks (CRAHN) 基于混合萤火虫模拟退火的认知无线电自组织网络(CRAHN)频谱机会路由算法
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-01 DOI: 10.1109/I2C2.2017.8321943
H. Abdullah, A. Kumar
{"title":"HFSA-SORA: Hybrid firefly simulated annealing based spectrum opportunistic routing algorithm for Cognitive Radio Ad hoc Networks (CRAHN)","authors":"H. Abdullah, A. Kumar","doi":"10.1109/I2C2.2017.8321943","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321943","url":null,"abstract":"Cognitive Radio (CR) is one of the well developed technologies extensively used for raising the spectrum performance for constructing opportunistic transmission links. Sustaining to the routing function on top of opportunistic links is a mandatory for transporting packets in a CR Ad hoc Network (CRAHN) holding the cooperative relay multi-radio systems. However, there is insufficient understanding of these highly dynamic opportunistic links, bandwidth, throughput, Link duration, Spectrum propagation and a reliable end-to-end transportation mechanism over the CRAHN. To elucidate these problems two Spectrum Map Opportunistic Routing (SMOR) algorithms such as SMOR-1 and SMOR-2 are proposed for regular and large-scale CRAHNs with wireless fading channels. However satisfying the network bandwidth, delivery ratio and the analysis to deal with transmission delay over such opportunistic links becomes important aspect. In order the solve the case and meet above stated limitations Hybrid Firefly Simulated Annealing based Spectrum Opportunistic Routing Algorithm(HFSA-SORA) is projected to the concerning of the spectrum map from local and global spectrum sensing information. A key beneficence of this HFSA-SORA is to the map the above mentioned metrics, and local Primary User (PU) interference observations in the direction of a packet forwarding delay over the opportunistic links. This permits the multipath formation undertaken over a large-scale CRAHNs to grasp the environmental and spectrum information for all the intermediate nodes, thereby degrading the computational overhead at the endpoint. From the theoretical derivations, propose HFSA-SORA for regular and large-scale CRAHNs with wireless fading channels, employing a cooperative networking scheme to enable multipath transmissions. Simulations substantiate that HFSA-SORA solutions enjoy significant breakage of end-to-end delay, reduction of network bandwidth, and minimum packet loss, attain a higher throughput and lesser communication overhead for CRAHNs.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"51 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120907127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
LVRT of an two-stage photo voltaic inverter with ZVT boost converter using adaptive DC link voltage control 采用自适应直流链路电压控制的ZVT升压变换器两级光伏逆变器的LVRT
2017 International Conference on Intelligent Computing and Control (I2C2) Pub Date : 2017-06-01 DOI: 10.1109/I2C2.2017.8321967
P. Apoorva, N. Amuthan
{"title":"LVRT of an two-stage photo voltaic inverter with ZVT boost converter using adaptive DC link voltage control","authors":"P. Apoorva, N. Amuthan","doi":"10.1109/I2C2.2017.8321967","DOIUrl":"https://doi.org/10.1109/I2C2.2017.8321967","url":null,"abstract":"This paper deals with a versatile dc-connect voltage direct strategy of two-stage photo voltaic inverter with ZVT boost converter amid low voltage ride-through (LVRT) operation period. The dc-interface voltage should measure for taking after change of framework voltage amid the LVRT operation to keep up the high proportion so that the high recurrence sounds infused into the lattice can be lessened fundamentally. In addition, when enduring the unbalanced network errors, the proposed control technique could to some degree constrict the twofold line-recurrence dc-connect voltage swell to keep the dc-interface voltage in the safe operational range by moving the twofold line frequency control swell to the front-end dc input source, which can be accomplished by purposefully fluctuating the dc input control or utilizing a bidirectional dc-dc converter relying upon the voltage drop proportion and the information control level.","PeriodicalId":288351,"journal":{"name":"2017 International Conference on Intelligent Computing and Control (I2C2)","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124270758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信