International Conference on Advances in Computing, Communications and Informatics最新文献

筛选
英文 中文
Efficient two dimensional clustering of microarray gene expression data by means of hybrid similarity measure 利用杂交相似度对微阵列基因表达数据进行有效的二维聚类
R. Priscilla, S. Swamynathan
{"title":"Efficient two dimensional clustering of microarray gene expression data by means of hybrid similarity measure","authors":"R. Priscilla, S. Swamynathan","doi":"10.1145/2345396.2345564","DOIUrl":"https://doi.org/10.1145/2345396.2345564","url":null,"abstract":"Microarrays are one of the most recent ameliorations in experimental molecular biology. Handling and analysis of microarray data is a most challenging task. The cluster analysis is one of the important high level analysis techniques, often exploited for microarray data analysis. As proteins usually related with different groups of proteins in order to handle diverse biological roles, the genes that create such proteins are thus expected to interact with more than one group of genes. This construes that in micro array gene expression data, a gene may make its presence in more than one cluster. The prior research has expressed the presence of genes in one or more clusters consistent with the nature of the gene and its attributes by the two dimensional clustering technique. The competence of the clustering analysis depends on the designing of an efficient (dis) similarity measure for grouping them. This research, has improved the prior cluster analysis research via an efficient hybrid distance based similarity measure. The proposed technique is implemented and its performance is evaluated with microarray gene expression data.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128610237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image retrieval using local and global properties of image regions with relevance feedback 利用图像区域的局部和全局属性与相关反馈进行图像检索
E. R. Vimina, K. Jacob
{"title":"Image retrieval using local and global properties of image regions with relevance feedback","authors":"E. R. Vimina, K. Jacob","doi":"10.1145/2345396.2345508","DOIUrl":"https://doi.org/10.1145/2345396.2345508","url":null,"abstract":"This paper proposes an image retrieval system using the local and global properties of image regions. Colour features are extracted using the histograms of HSV colour space, texture features using Gray level Co-occurrence matrix (GLCM) and shape features using Edge Histogram Descriptors (EHD). The object regions are roughly identified by segmenting the image into fixed partitions and finding the white pixel density in each partition using edge thresholding and morphological dilation. To improve the retrieval efficiency, global colour and shape features are also taken into account. Euclidean distance measure is used for computing the distance between the features of the query and target image. An automatic relevance feedback algorithm is also proposed for improving the retrieval accuracy. Preliminary experimental results show that the proposed method provides better retrieving result than retrieval using some of the existing methods.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134346374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Palmprint feature extraction approach using nonsubsampled contourlet transform and orthogonal moments 基于非下采样contourlet变换和正交矩的掌纹特征提取方法
M. Vijilious, S. Ganapathy, V. S. Bharathi
{"title":"Palmprint feature extraction approach using nonsubsampled contourlet transform and orthogonal moments","authors":"M. Vijilious, S. Ganapathy, V. S. Bharathi","doi":"10.1145/2345396.2345516","DOIUrl":"https://doi.org/10.1145/2345396.2345516","url":null,"abstract":"In recent usage of internet in financial and information transaction, authentication becomes necessity for authorized access. Palmprint recognition is a widely accepted biometric authentication among various biometrics methodologies. The enormous feature content and less acquisition cost make it more reliable and user friendly. Texture is one of the vital features in biometric recognition applications. Though many statistical methods are available to extract the texture, non-subsampled contourlet transform is employed in this work as a primary step to extract the directional frequency information content in the palmprint, followed by the statistical moment extraction. In addition to using the Zernike moments as texture descriptors, they are effectively used in reducing the dimensionality of contourlet coefficients. Since Zernike moments are inherently orthogonal and rotation invariant, they are more suitable for palmprint recognition.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133160682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A novel framework for enterprise web services change management 一个用于企业web服务变更管理的新框架
M. Thirumaran, D. Ponnurangam, G. Kiran, A. Divya
{"title":"A novel framework for enterprise web services change management","authors":"M. Thirumaran, D. Ponnurangam, G. Kiran, A. Divya","doi":"10.1145/2345396.2345401","DOIUrl":"https://doi.org/10.1145/2345396.2345401","url":null,"abstract":"Business logic might be constantly improved or changed in order to provide enhanced services or to reduce cost. As a result, the software applications employed must be continuously updated to comply with the changes in their functional features. Changes in business logic of the web service must be done very quickly within the given time constraint as the services consumed by the providers and clients must not be affected. The framework proposed in this paper responds these challenges in three fold: Firstly, it formats the request and discovers required service logic through rule manager. Secondly, extracted logics are built as a complete web service and FSM is constructed by the Business Logic model to state the logic flow. Thirdly, it ascertains the right way for evaluation by analyzing dependency between the service logics through FSM. This allows enterprises to carve up and assimilate the services dynamically without developer's intervention at any stage. Thus this can be used for any IT enterprises in modern service industry to reduce the threshold of development and operation of services.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133274296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive machine learning approach to prognose pulmonary disease from home 一种全面的机器学习方法来预测家庭肺部疾病
K. Karuppanan, A. S. Vairasundaram, M. Sigamani
{"title":"A comprehensive machine learning approach to prognose pulmonary disease from home","authors":"K. Karuppanan, A. S. Vairasundaram, M. Sigamani","doi":"10.1145/2345396.2345482","DOIUrl":"https://doi.org/10.1145/2345396.2345482","url":null,"abstract":"This paper proposes a machine learning based prognosis for rehabilitating the COPD patients to be monitored from home in real time. Wearable sensor Technology (WST) is utilized to collect the physiological status of the pulmonary patient from home dynamically and communicated to the healthcare centre. The proposed approach applies a comprehensive predictive model employing a time series forecasting using condensed polynomial neural network with swarm intelligence. Discrete particle swarm optimization (DPSO) filters out the relevant neurons and continuous particle swarm optimization (CPSO) reduces the computational overheads. The time series prediction is further strengthened by using multimodal genetic algorithm. Control measures such as sensitivity, specificity and reliability are applied meticulously to validate the predicted state of the patient.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132049976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Resolving rate anomaly in IEEE 802.11p multi-rate vehicle-to-infrastructure networks using TXOP differentiation 利用TXOP差分解决IEEE 802.11p多速率车对基础设施网络中的速率异常
R. Babu, A. Babu
{"title":"Resolving rate anomaly in IEEE 802.11p multi-rate vehicle-to-infrastructure networks using TXOP differentiation","authors":"R. Babu, A. Babu","doi":"10.1145/2345396.2345451","DOIUrl":"https://doi.org/10.1145/2345396.2345451","url":null,"abstract":"In this paper, we investigate the impact of Transmission Opportunity (TXOP) on the amount of successfully transferred data in IEEE 802.11p based multi-rate Vehicle-to-Infrastructure networks used for drive-thru Internet applications. We then analyze the rate anomaly problem that exists in such networks among vehicles with distinct data transmission rates. Essentially, the vehicle with the lowest data rate captures the channel for a long time compared to the high data rate peer, resulting in poor use of the wireless medium and reduced performance for all vehicles. This anomaly in the performance is a result of unfair channel time allocation for vehicles when they use distinct data rates. The aim of this paper is to resolve this rate anomaly problem by adjusting the TXOP of each vehicle proportional to its data rate. The analytical results are verified using extensive simulations.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":" 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132094604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High speed VLSI implementation of lifting based DWT 基于DWT提升的高速VLSI实现
U. Nageswaran, A. Chilambuchelvan
{"title":"High speed VLSI implementation of lifting based DWT","authors":"U. Nageswaran, A. Chilambuchelvan","doi":"10.1145/2345396.2345573","DOIUrl":"https://doi.org/10.1145/2345396.2345573","url":null,"abstract":"Efficient line based hardware architecture for the lifting based discrete wavelet of an image is proposed in this work. Lifting Scheme reduces the number of operations execution steps to almost one-half of those needed with a conventional convolution approach. Performance comparison of simulation results for lifting DWT using MATLAB and VHDL is done to verify the proper functionality of the developed module. The comparison of direct mapped and folded VLSI architectures for lifting schemes is presented in terms of speed and hardware requirements. The whole architecture is being optimized to achieve better speed up and higher hardware utilization by using a single clock for predict and update operation. The proposed architecture is implemented in Xilinx Spartan 3E FPGA. The data flow of the proposed architecture is regular, simple, control complexity and achieves 100% hardware utilization. The entire system runs at faster rate and reaches a speed performance suitable for real time stand-alone image/video applications.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133865114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing fingerprint images using a hybrid technique 使用混合技术保护指纹图像
R. Bansal, P. Sehgal, Punam Bedi
{"title":"Securing fingerprint images using a hybrid technique","authors":"R. Bansal, P. Sehgal, Punam Bedi","doi":"10.1145/2345396.2345488","DOIUrl":"https://doi.org/10.1145/2345396.2345488","url":null,"abstract":"This paper presents an efficient hybrid watermarking scheme for securing fingerprint images in the Discrete Cosine Transform (DCT) domain. The proposed method uses a NN-PSO (Neural Network-Particle Swarm Optimization) based hybrid approach to watermark host gray scale fingerprint images with their corresponding facial images in order to secure them. The algorithm divides the input image into blocks and uses a feed forward NN to determine the number of secret bits to be embedded in each block depending on the blocks' features. The output of the NN is then used as input by the PSO module to find the best DCT coefficients' locations in that block where the secret facial image data can be embedded, so that the distortion produced in the host image is minimum and the minutia predicting ability remains unaffected. The experimental results have been analyzed and compared with existing PSO based and NN based approaches. The proposed NN-PSO based hybrid approach has been found to exhibit better watermarked image quality and better robustness to possible attacks to the watermarked image. Moreover, as the proposed technique retains the feature set of the original fingerprint, the extracted facial image and the cover fingerprint image can be correctly verified at the receiver's end leading to a more secure and accurate biometric based personal authentication.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127699599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A fault tolerant approach for data aggregation in wireless sensor networks 无线传感器网络中数据聚合的容错方法
J. Pradhan, A. Sarje
{"title":"A fault tolerant approach for data aggregation in wireless sensor networks","authors":"J. Pradhan, A. Sarje","doi":"10.1145/2345396.2345459","DOIUrl":"https://doi.org/10.1145/2345396.2345459","url":null,"abstract":"Due to existing and emerging applications in various situations, wireless sensor networks (WSNs) have emerged as a premier research topic. Data aggregation is a basic operation in Wireless Sensor Network. For an application which is aggregative in nature such as environment monitoring system or health monitoring system, the tree based data aggregation is the most efficient technique, in terms of energy and data collection time. But, when one of nodes stops responding due to energy loss or hardware malfunction or external cause such as fire, flood etc, then the rest of the nodes under that node will not be able to send their data even if there is some other path. In this paper we have tried to fix this issue by using secondary parent.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127770227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Authenticated and persistent skip graph: a data structure for cloud based data-centric applications 经过身份验证和持久的跳过图:一种基于云的以数据为中心的应用程序的数据结构
T. P. Shabeera, P. Chandran, S. D. M. Kumar
{"title":"Authenticated and persistent skip graph: a data structure for cloud based data-centric applications","authors":"T. P. Shabeera, P. Chandran, S. D. M. Kumar","doi":"10.1145/2345396.2345423","DOIUrl":"https://doi.org/10.1145/2345396.2345423","url":null,"abstract":"Cloud computing has evolved as a popular computing environment. In data centric applications hosted on the cloud, data is accessed and updated in a purely distributed manner. The distributed data structures used for dynamic storage of the data for such applications require two fundamental qualities, authentication and persistence, which are not completely met by existing distributed data structures. Authentication is a crucial requirement for data structures used on the cloud, as users need to be convinced about the validity of the data they receive. Moreover the data structure has to be persistent, so that changes can be made to the data structure without losing old data, or old versions of the data structure, which may be required by different users in the distributed environment.\u0000 In this paper we present authenticated and persistent skip graph, an enhanced variant of the existing skip graph. It is based on an event based model, to correspond to the distributed data centric application requirements. Skip graphs are randomized data structures based on skip lists, proposed for use in distributed applications. But skip graphs are neither persistent nor authenticated. The fat node technique is adapted here for providing persistence, and a role based access control, with a cryptographic scheme is used to ensure valid data update and verify the validity of the retrieved data. Our data structure is proved to be efficient in terms of time and space complexities.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128653206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信