International Conference on Advances in Computing, Communications and Informatics最新文献

筛选
英文 中文
An evaluation of hospital information systems integration approaches 医院信息系统集成方法评价
N. Sabooniha, D. Toohey, Kevin Lee
{"title":"An evaluation of hospital information systems integration approaches","authors":"N. Sabooniha, D. Toohey, Kevin Lee","doi":"10.1145/2345396.2345479","DOIUrl":"https://doi.org/10.1145/2345396.2345479","url":null,"abstract":"Healthcare organisations aim to provide high-quality, cost-effective healthcare delivery; to do this they must manage a large amounts of information. A fundamental concern in health management is the integration of health information across distributed, heterogeneous and disparate information systems. Various integration approaches have been attempted by healthcare organizations to solve the problems associated with this integration. However, the variety of approaches means that selecting the appropriate integration approach is problematic. This paper aims to analyse and evaluate current integration approaches in the healthcare domain. It attempts to clarify the issues surrounding the adoption of integration solutions in this domain for both healthcare decision-makers and system integrators.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128680114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Secret information display based authentication technique towards preventing phishing attacks 基于秘密信息显示的防止网络钓鱼攻击的认证技术
G. Varshney, A. Sardana, R. Joshi
{"title":"Secret information display based authentication technique towards preventing phishing attacks","authors":"G. Varshney, A. Sardana, R. Joshi","doi":"10.1145/2345396.2345494","DOIUrl":"https://doi.org/10.1145/2345396.2345494","url":null,"abstract":"Phishing is a fraudulent technique used by attackers known as phishers for obtaining credentials (username and passwords) of a specific or group of users on internet. Phishing came into focus in 1996, and from then it is emerging out as one of the biggest cybercrime attacks on internet. The solutions for handling phishing attacks include: detecting the activity and filtering it from normal activity (Phished Email and Website detection), preventing it by the use of excellent user interfaces and login authentication schemes and user training so that users can prevent themselves from being falling into it. Researchers have focused on all the three techniques for solving phishing attacks. However the previous techniques handle the problem of phishing to an extent but are incomplete, and complex to implement or use in actuality. The research work in this paper will be focused on the critical review of previous schemes proposed, with a novel scheme for preventing phishing attacks with the use of four characters secret information display during login authentication. The novelty of the scheme lies in its low complexity, better user understandability and real time implementation ability. This paper also describes the analyzed results of a real time experiment done to evaluate the scheme. Our results show great improvement with a total of only 13.5%, 1% and 3% user's phished in rigorous phishing attempts, of various kinds for a period of one month.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133735549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A framework for optimizing GCC for ARM architecture 一个为ARM架构优化GCC的框架
India prmahalingam, Shimmi Asokan
{"title":"A framework for optimizing GCC for ARM architecture","authors":"India prmahalingam, Shimmi Asokan","doi":"10.1145/2345396.2345452","DOIUrl":"https://doi.org/10.1145/2345396.2345452","url":null,"abstract":"Mobile application domain is developing on a daily basis. The performance, features and aesthetics of the applications play an important role in its increasing importance. Also, upcoming device models are looking for more energy-efficient performance as a step towards green computing. This is realized by ARM cores. But the performance and energy efficiency depend not only on the core, but the application also. Such efficiency can only be managed by efficient code from the compiler. This is primarily managed in its back-end, which comprises of the latter half of the compiler's control flow (intermediate code generator to code generator). If the code is optimized by the compiler, it will perform with lesser CPU cycle requirements, and save more energy. So, optimizing the code saves both time and power. In order to do so, compilers like GCC already provide a lot of options. But due to the generic structure of GCC, it performs very little ARM-specific optimizations. Here, we aim to improve the performance of the GCC optimizers for the ARM cores by better instruction selection (machine idioms and instruction combining), and choosing the order of optimizations appropriately, since in some cases, a set of optimizations may pave the way for improving some others. The end result is targeted to give about 30% increase in efficiency in most cases.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"68 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126972122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experiments on POS tagging and data driven dependency parsing for Telugu language 泰卢固语词性标注与数据驱动依存关系分析实验
M. H. Khanam, Palli Suryachandra, K. Madhumurthy
{"title":"Experiments on POS tagging and data driven dependency parsing for Telugu language","authors":"M. H. Khanam, Palli Suryachandra, K. Madhumurthy","doi":"10.1145/2345396.2345567","DOIUrl":"https://doi.org/10.1145/2345396.2345567","url":null,"abstract":"In this paper we present our experiments on Part-Of-Speech tagging and data driven dependency Parsing for Telugu language. We adopted three Part-Of-Speech taggers named as Brill tagger, Maximum Entropy tagger and Trigrams 'n' Tags tagger (TnT) to Telugu language and compares their performance. TnT tagger has showed better accuracy for Telugu. We used T'nT tagger for assigning the Part- Of-Speech tags and chunks for developing the annotated data for Dependency parsing. Telugu Language is morphologically rich free-word order language. We did experiments on two data-driven parsers Malt and MST for Telugu language and compare results of both the parsers. We describe the data and parser settings used in detail. We are also presented, which parser gives best results for different sentence types in Telugu.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116544304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient and secure key agreement scheme using physiological signals in body area networks 基于身体区域网络生理信号的高效安全密钥协议方案
R. Rajasekaran, V. Manjula, V. Kishore, T. M. Sridhar, C. Jayakumar
{"title":"An efficient and secure key agreement scheme using physiological signals in body area networks","authors":"R. Rajasekaran, V. Manjula, V. Kishore, T. M. Sridhar, C. Jayakumar","doi":"10.1145/2345396.2345579","DOIUrl":"https://doi.org/10.1145/2345396.2345579","url":null,"abstract":"Body Area Network (BAN) is a network of wireless medical sensors, deployed on a person, for enabling pervasive, individualized, and real time health management. Securing inter-sensor communications within BANs is essential for preserving not only the privacy of health data but also for ensuring safety of healthcare-delivery. The proposed technique presents a scheme for enabling secure inter sensor communication within BAN. The proposed method allows neighbouring nodes in a BAN to agree to a symmetric (shared) cryptographic key, in an authenticated manner, using physiological signals obtained from the subject. The proposed method generates the key from the physiological signals sensed by the sensors and converts it into frequency domain and generates features. The generated features are transformed into a cubic spline curve and the coefficients are concatenated to form the key. The key is then transmitted to the receiver by a new fuzzy vault cryptographic method, where the receiver decrypts (using cubic spline interpolation) and finds the key. This key agreement can provide security for the e-health applications.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121826047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Fractional Fourier transform: a survey 分数阶傅里叶变换:综述
B. T. Krishna
{"title":"Fractional Fourier transform: a survey","authors":"B. T. Krishna","doi":"10.1145/2345396.2345519","DOIUrl":"https://doi.org/10.1145/2345396.2345519","url":null,"abstract":"The Fractional Fourier transform (FRFT), which provides generalization of conventional Fourier Transform was introduced many years ago in mathematics literature by Namias. In this paper, definition, properties of fractional Fourier transform and its relationship with other transforms is discussed. Various definitions of discrete version of FRFT and their comparison is presented. FRFT falls under the category of Linear time frequency representations. Some of the applications of FRFT such as detection of signals in noise, image compression, reduction of side lobe levels using convolutional windows, and time-frequency analysis are illustrated with examples. It has been observed that FRFT can be used in more effective manner compared to Fourier transform with additional degrees of freedom.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122061543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Text extraction from videos using a hybrid approach 使用混合方法从视频中提取文本
A. Thilagavathy, K. Aarthi, A. Chilambuchelvan
{"title":"Text extraction from videos using a hybrid approach","authors":"A. Thilagavathy, K. Aarthi, A. Chilambuchelvan","doi":"10.1145/2345396.2345429","DOIUrl":"https://doi.org/10.1145/2345396.2345429","url":null,"abstract":"With rapid intensification of existing multimedia documents and mounting demand for information indexing and retrieval, much endeavor has been done on extracting the text from images and videos. Text extraction in video documents, as a momentous research division of content-based information retrieval and indexing, continues to be a topic of much interest to researchers. Text extracting is demanding owing to a range of setbacks like complex background, varying font size, different style, lower resolution and blurring, position, viewing angle and so on. In this paper we propose a hybrid method where the two most well-liked text extraction methods explicitly region based method and connected component (CC) based method comes together. The former method is used to obtain the text prevailing confidence where as the latter is used for text extraction and grouping. The video splitting and key frame detection is followed by the preprocessing to designate the text region indicator. The extracted features are scrutinized using artificial neural network as the classifier and lastly grouped into words/lines based on the bounding box distance. We evaluated the performance of the proposed approach on various videos and obtained considerable results when weighed against the existing methods.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125875047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimized trace transform based content based image retrieval algorithm 优化了基于轨迹变换的基于内容的图像检索算法
Rahul Bankapur, Meena S. Maralappanavar
{"title":"Optimized trace transform based content based image retrieval algorithm","authors":"Rahul Bankapur, Meena S. Maralappanavar","doi":"10.1145/2345396.2345509","DOIUrl":"https://doi.org/10.1145/2345396.2345509","url":null,"abstract":"The last decade has seen a rapid increase in the use of visual information leading to storage and accessibility problems. To improve human access, there must be effective and precise retrieval algorithm for the user to search, browse and interact with these collections in real time. In this paper we propose a trace transform based content based image retrieval algorithm (TTB-CBIR). The proposed algorithm applies trace transform which is robust to affine transform for feature extraction. Similarity measure is done using hamming distance. The TTB-CBIR algorithm is tested on corel database of images. The proposed algorithm shows optimum performance in terms of memory utilization and retrieval time.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124943712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An energy efficient audio compression scheme using wavelet with dynamic difference detection technique in wireless sensor network 基于小波动态差分检测技术的无线传感器网络音频压缩节能方案
Ipsita Dutta, Rajib Banerjee, T. Acharya, S. Bit
{"title":"An energy efficient audio compression scheme using wavelet with dynamic difference detection technique in wireless sensor network","authors":"Ipsita Dutta, Rajib Banerjee, T. Acharya, S. Bit","doi":"10.1145/2345396.2345456","DOIUrl":"https://doi.org/10.1145/2345396.2345456","url":null,"abstract":"The availability of low-cost hardware coupled with the advancement of VLSI (Very Large Scale Integration) technology has promoted the development of wireless multimedia sensor network (WMSN). However, the strict constraints in terms of processing power, storage, bandwidth etc. pose a great challenge to data processing in WMSN. Transmitting raw data is very costly while limited processing power prevents sophisticated multimedia processing. Exploring low-overhead data compression technique is a solution towards this problem. In this paper we propose an energy-saving audio data compression technique for WMSN combining wavelet lifting with a newly proposed difference detection technique. We consider the application domain where data are co-related. To exploit this co-relation we propose to run one wavelet round followed by a dynamic number of difference round and thereby, local communication overhead is saved compared to pure wavelet based scheme without sacrificing the target of sending data with less number of bits to the sink. Moreover, in addition to capturing spatial correlation by wavelet, this scheme captures temporal correlation by introducing the difference detection round.\u0000 Performance of the proposed scheme is evaluated through simulation where efficacy of the scheme is not only evaluated in terms of energy consumption but also by computing SNR. The scheme is compared with one of the existing schemes. The results confirm our scheme's supremacy over the competing scheme both in terms of energy saving and signal reconstruction quality (SNR).","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125083213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficient method for noise removal techniques and video object segmentation using color based fuzzy c means 基于彩色模糊c均值的高效去噪技术和视频目标分割方法
M. Hemalatha, R. Revathi
{"title":"Efficient method for noise removal techniques and video object segmentation using color based fuzzy c means","authors":"M. Hemalatha, R. Revathi","doi":"10.1145/2345396.2345584","DOIUrl":"https://doi.org/10.1145/2345396.2345584","url":null,"abstract":"Video transmission plays a very important role in traffic applications. Noise can be a big offence in affecting encoding efficiency because it can be present throughout an entire application. Noise has the technical definition for various anomalies and unnecessary variations that get built-in into a video signal. Noise reduction enables better video quality at lower bit rates by making the source look better and decrease the video complication prior to the any process. In this proposed method we adapted the spatial video denoising methods, where image noise are reduced and are is applied to each frame individually. Since there is a great deal of removing noise from video content, this paper has been devoted to noise detection and filtering methods that aims the removing unwanted noise without affecting the clarity of scenes which contains necessary information and rapid movement. The aim of this work is to produce precise segmentation of images using intensity information along with neighborhood relationships. Most of the results of color image segmentation are based on gray level image segmentation methods with different color representations were published. Image segmentation techniques such as histogram threshold, clustering in segmentation, region growing, edge detection, fuzzy methods, and neural networks can be extended to color images.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130418387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信