International Conference on Advances in Computing, Communications and Informatics最新文献

筛选
英文 中文
A new multi-agent system for video objects segmentation and tracking based on spatio-temporal descriptor 基于时空描述符的多智能体视频目标分割与跟踪系统
M. Chakroun, A. Wali, A. Alimi
{"title":"A new multi-agent system for video objects segmentation and tracking based on spatio-temporal descriptor","authors":"M. Chakroun, A. Wali, A. Alimi","doi":"10.1145/2345396.2345591","DOIUrl":"https://doi.org/10.1145/2345396.2345591","url":null,"abstract":"The problem of segmentation and tracking is of great importance. It is an important task within the field of computer vision. The goal of this paper is to describe a novel video sequences segmentation and tracking system based on MAS \"multi-agent systems\" when we use spatio-temporal interest points detection on video frames by HOG3D descriptor to initialize agents. The used agents are supervisor and explorator agents, they communicate between them and they inspire in their behavior from Fast Marching Method.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132042530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The study of different similarity measure techniques in recognition of handwritten characters 手写体字符识别中不同相似度度量技术的研究
C. Naveena, Manjunath Aradhya, S. Niranjan
{"title":"The study of different similarity measure techniques in recognition of handwritten characters","authors":"C. Naveena, Manjunath Aradhya, S. Niranjan","doi":"10.1145/2345396.2345524","DOIUrl":"https://doi.org/10.1145/2345396.2345524","url":null,"abstract":"In this paper, we compare the affect of four different similarity measure techniques namely Euclidean distance, Modified squared euclidean distance, Correlation distance and Angle distance for an unconstrained handwritten character recognition. The strength of these similarity measures are estimated between feature vectors with respect to the recognition performance of the Gabor-PCA method. Gabor filter is used to extract spatially localized features of character image. The dimensions of such Gabor feature vector is prohibitively high & in order to compress Gabor features we used PCA method. The experiments were performed using the database containing 22,600 samples of Kannada and English. From the analysis the better recognition accuracy were achieved using angle distance measure.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130152780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy rights management in multiparty multilevel DRM system 多方多级DRM系统中的隐私权管理
D. Mishra, S. Mukhopadhyay
{"title":"Privacy rights management in multiparty multilevel DRM system","authors":"D. Mishra, S. Mukhopadhyay","doi":"10.1145/2345396.2345498","DOIUrl":"https://doi.org/10.1145/2345396.2345498","url":null,"abstract":"Traditional Digital Rights Management (DRM) systems are one level distributor system which involve single distributor. However, for a flexible and scalable content distribution mechanism, it is necessary to accommodate multiple distributors in DRM model so that different strategies can be implemented in diverse geographical areas. We develop a multiparty multilevel DRM model using facility location and design a prototype DRM system that provides transparent and flexible content distribution mechanism while maintaining the users' privacy along with accountability in the system.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Layered approach for intrusion detection using naïve Bayes classifier 分层入侵检测方法使用naïve贝叶斯分类器
Neelam Sharma, S. Mukherjee
{"title":"Layered approach for intrusion detection using naïve Bayes classifier","authors":"Neelam Sharma, S. Mukherjee","doi":"10.1145/2345396.2345500","DOIUrl":"https://doi.org/10.1145/2345396.2345500","url":null,"abstract":"Intrusion detection is the process of monitoring and analyzing the events occurring in a computer system in order to detect signs of security problems. In real world environment, the minority intrusion attacks namely R2L and U2R/Data attacks are more dangerous than the majority attacks like Probe and DoS. The present day standalone intrusion detection systems are not effective in detecting the minority attacks. Hence, it is essential to improve the detection performance for the minority intrusions, while maintaining a reasonable overall detection rate. In this paper we propose layered approach for improving the minority attack detection rate without hurting the prediction performance of the majority attacks. The proposed model used Naive Bayes classifier on reduced dataset for each attack class. In this system every layer is separately trained to detect a single type of attack category.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130773842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Palmprint identification based on wide principal lines 基于宽主线的掌纹识别
H. Kalluri, M. Prasad, A. Agarwal
{"title":"Palmprint identification based on wide principal lines","authors":"H. Kalluri, M. Prasad, A. Agarwal","doi":"10.1145/2345396.2345544","DOIUrl":"https://doi.org/10.1145/2345396.2345544","url":null,"abstract":"In this paper, a novel palmprint identification and verification algorithm is proposed based on wide principal lines. A set of wide principal line extractors are devised. Later these wide principal line extractors are used to extract the wide principal lines. Morphological operators and grouping functions are used to eliminate the noise. In matching stage, a matching algorithm, based on pixel-to-pixel comparison is devised to calculate the similarity between the palmprints. In identification stage, wavelets and principal component analysis (PCA) are used for dimensionality reduction. Then Locally Discriminating Projection (LDP) is used to get the indexed list and the user is identified based on matching algorithm. The experimental results for the verification and identification on PolyU Database and Sub2D database are provided by Hong Kong Polytechnic University show that the discrimination of wide principal lines is also strong. With a minimum number of verifications, user is identified on these databases.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131205565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Directional line edge binary pattern for texture image indexing and retrieval 用于纹理图像索引和检索的方向线边缘二进制模式
Sibendu Samanta, R. Maheshwari, M. Tripathy
{"title":"Directional line edge binary pattern for texture image indexing and retrieval","authors":"Sibendu Samanta, R. Maheshwari, M. Tripathy","doi":"10.1145/2345396.2345518","DOIUrl":"https://doi.org/10.1145/2345396.2345518","url":null,"abstract":"In this paper, a new method, directional line edge binary pattern (DLEBP) is proposed for image indexing and retrieval. This method is the extension of line edge binary pattern (LEBP). The directional line edges of neighbours for a particular center pixel are determined by eight directional windows. The 3x3 directional window is considered for this purpose. The retrieval results of the proposed method are tested on Brodatz image database. The performance of the proposed method is measured in terms of average retrieval rate (ARR). The results after being investigated show a significant improvement in terms of ARR as compared to Gabor transform (GT), dual-tree complex wavelet transform (DTCWT), dual-tree rotated complex wavelet transform (DT-RCWT), local ternary pattern (LTP), LEBP and local binary pattern (LBP).","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131253957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Load balancer for energy efficient clustering protocol in MANETs 面向manet节能集群协议的负载均衡器
R. Deepa, S. Swamynathan
{"title":"Load balancer for energy efficient clustering protocol in MANETs","authors":"R. Deepa, S. Swamynathan","doi":"10.1145/2345396.2345441","DOIUrl":"https://doi.org/10.1145/2345396.2345441","url":null,"abstract":"Energy efficiency is a significant area of research in mobile ad hoc networks. The mobile nodes are uncertain and may lead to failure of nodes. The uncertainty of mobile nodes is mainly due to their mobility, draining of battery power and energy consumption. One way of handling this uncertainty is to prevent nodes from failure through the Load Balancing Factor (LBF). This can be achieved by the clustering technique which increases throughput and reduces delay. In this paper, load balancing among clusters is proposed for the AHP-Entropy-TOPSIS based Clustering Protocol (AETCP) to handle uncertain mobile nodes. The AETCP is based on a multicriterion decision-making method which was proposed earlier. The AETCP is the integration of the Analytic Hierarchy Process, Entropy and Technique for Order Preference by Similarity to an Ideal Solution. The predefined energy threshold is applied to the mobile nodes to take part in cluster-head nodes' election using the AETCP. Simulations were carried out by applying the LBF and the predefined energy threshold to the AETCP, and better results achieved in terms of the average cluster size, reaffiliation rate, energy, load balancing factor, throughput and delay.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131678766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel AES-256 implementation on FPGA using co-processor based architecture 一种基于协处理器架构的新型AES-256在FPGA上的实现
S. Sau, R. Paul, T. Biswas, A. Chakrabarti
{"title":"A novel AES-256 implementation on FPGA using co-processor based architecture","authors":"S. Sau, R. Paul, T. Biswas, A. Chakrabarti","doi":"10.1145/2345396.2345499","DOIUrl":"https://doi.org/10.1145/2345396.2345499","url":null,"abstract":"Efficient hardware architecture for cryptographic algorithms are of utmost need for implementing secured data communication in embedded applications. The hardware implementation of the algorithms though provides less flexibility, but are faster and requires less resource as compared to the software implementation, and hence ideally suited for target specific embedded systems. Though, there exist quite a few research works that propose hardware design for implementing cryptographic algorithm on various hardware platforms like application specific integrated circuit (ASIC), field programmable gate array (FPGA) and micro-controllers, still there lies the need of better hardware design in terms of larger key values, higher throughput and less resource utilization.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133726955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Generating OLAP queries from natural language specification 根据自然语言规范生成OLAP查询
M. Naeem, Imran Sarwar Bajwa
{"title":"Generating OLAP queries from natural language specification","authors":"M. Naeem, Imran Sarwar Bajwa","doi":"10.1145/2345396.2345522","DOIUrl":"https://doi.org/10.1145/2345396.2345522","url":null,"abstract":"Automatic translation of natural language (NL) questions to Structured Query Language (SQL) queries is a challenging task. It is a common knowledge that writing Online Analytical Processing (OLAP) queries for data warehouses is difficult, particularly, for the novice users. In this paper, we present a natural language processing based approach to automatically generate OLAP queries those can be used to communicate with the a data warehouse. In the presented approach, user provides queries in English and our approach process English queries and generate OLAP queries. In our approach, we incorporate OMG's recent standard Semantic of Business Vocabulary and Business Rules (SBVR) to simplify the translation process of English to OLAP. SBVR is used in detailed semantic analysis of English queries. The presented approach is also implemented in Java as a prototype tool. To test the performance of the tool, an experimental study is also conducted. Results of the experimental study imply that our approach is capable in communicating with a data warehouse.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115241844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A self learning rough fuzzy neural network classifier for mining temporal patterns 一种用于挖掘时间模式的自学习粗糙模糊神经网络分类器
R. Sethukkarasi, U. Keerthika, A. Kannan
{"title":"A self learning rough fuzzy neural network classifier for mining temporal patterns","authors":"R. Sethukkarasi, U. Keerthika, A. Kannan","doi":"10.1145/2345396.2345415","DOIUrl":"https://doi.org/10.1145/2345396.2345415","url":null,"abstract":"This paper proposes a new approach that integrates neural networks with the fuzzy rough set to build a Rough Fuzzy Neural Network Classifier (RFNNC) in order to mine temporal patterns in clinical databases. The lower approximation hypothesis and fuzzy decision table with the fuzzy features are used to acquire the fuzzy decision classes for deciding on the attributes. By contemplating a subset of attributes, comprising of the temporal intervals, the lower approximations are devised in this work. Moreover the basic sets are attained from lower approximations are sorted into the decision classes. The discernibility of the decision classes is designed to delineate the temporal consistency degree between the objects of the sets, from which the reducts are acquired. Next, the attribute subset from the reducts is used for training the fuzzy neural network to infer fuzzy rules. The induced rules will result with temporal patterns for classification. The fuzzy neural network has completely used the competence of fuzzy rough set theory to condense huge quantity of superfluous data. The effectiveness of this method is compared with other classifiers such as fuzzy rule based classifier to evaluate the accuracy of the proposed fuzzy neural network classifier. Experiments have been performed on the diabetic dataset and the simulation results induced proves that the proposed fuzzy neural network classifier on medical diabetic dataset stays as a corroboration for predicting the severity of the disease and exactness in decision support system.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114441278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信