2011 International Conference on Computational Intelligence and Communication Networks最新文献

筛选
英文 中文
Iterative Procedures in Generating Fractal Carpets 生成分形地毯的迭代程序
M. Chandra, Sanjay M. Shah
{"title":"Iterative Procedures in Generating Fractal Carpets","authors":"M. Chandra, Sanjay M. Shah","doi":"10.1109/CICN.2011.103","DOIUrl":"https://doi.org/10.1109/CICN.2011.103","url":null,"abstract":"Fractals in nature are always a result of some growth process. Sierpinski carpet is one of the very beautiful fractals from the historic gallery of classical fractals. Carpet designing is not only a fascinating activity in computer graphics, but it has real applications in carpet industry as well. One may find illusionary delighted carpets designed here, which are useful in real designing of carpets. Each next category leads to a more generalized form of the fractal carpet. This paper includes an analysis of superior iterations as a formalism used to describe generation of carpets, which in time has become a general method of creating fractal objects. In this paper, inspired by superior iterates and recent paper Categorizations of Fractal Plants, we have generated Fractal carpets using superior iterations.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127511109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Steganographic Authentication over Web Applications Web应用程序上隐写身份验证的实现
S. Khan, O. Tejaswi, Sahil Saini
{"title":"Implementation of Steganographic Authentication over Web Applications","authors":"S. Khan, O. Tejaswi, Sahil Saini","doi":"10.1109/CICN.2011.91","DOIUrl":"https://doi.org/10.1109/CICN.2011.91","url":null,"abstract":"This paper provides a scheme where the security algorithms of steganography would provide a very high level of security when applied over the web authentication. The usage of image processing algorithms would provide a very high security as compared to the existing methodologies. Application of steganography would also be substitute to the biometric and RFID tokens. The authors provide a procedure through which several web attacks can be controlled as brute-force attack, dictionary attack, and password guessing which would make the web applications immune from various hackers.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126619169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Recurrence Quantification Analytical Approach to Detect DDoS Attacks 一种检测DDoS攻击的递归量化分析方法
N. Jeyanthi, J. Vinithra, S. Sneha, R. Thandeeswaran, N. Iyengar
{"title":"A Recurrence Quantification Analytical Approach to Detect DDoS Attacks","authors":"N. Jeyanthi, J. Vinithra, S. Sneha, R. Thandeeswaran, N. Iyengar","doi":"10.1109/CICN.2011.12","DOIUrl":"https://doi.org/10.1109/CICN.2011.12","url":null,"abstract":"Distributed Denial of Service (DDoS) is a type of attack in the application layer initiated from the various hosts to a single web server. The aim of this attack is to consume all the resources of the targeted system by exploiting the vulnerability. We proposed a mathematical model called Recurrence Quantification Analysis (RQA) for detecting the DDoS attacks by computing entropy and determinism of selected packet attributes. To detect the anomalies and check the performance we considered the live traffic traces from the network and various RQA parameters like entropy, laminarity and determinism were used to determine the uncertainty or randomness in the dataset.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114796382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fuzzy-Logic Applications in Cost Analysis of Transformer's Main Material Weight 模糊逻辑在变压器主材重量成本分析中的应用
H. Malik, R. Jarial
{"title":"Fuzzy-Logic Applications in Cost Analysis of Transformer's Main Material Weight","authors":"H. Malik, R. Jarial","doi":"10.1109/CICN.2011.81","DOIUrl":"https://doi.org/10.1109/CICN.2011.81","url":null,"abstract":"Transformer is one of the costliest apparatus in an electrical power supply network which play vital role in an electrical power system. It is expected that all transformers installed in a substation must function optimally under normal as well transient conditions. Their satisfactory performance of transformers can be ensured by making use of latest trends in condition based monitoring. This helps not only in providing interruption free electricity supply but also help in enhancing attain prolonged residual life and hence capital management of the utilities. Forecasting transformer costs by its manufacturer and industrial companies has always been an area of interest especially in modern era of technology advancements when newer and newer material are pouring into market for the use by manufacturers. The major amount of transformer costs are related to its raw materials, So, the cost estimation process of transformers are based on amount of used raw material. This paper presents a new method to estimate the weight of main materials for transformers by use of fuzzy logic technique. The required estimating data have been obtained from Transformer Company.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122094754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Estimation of Reliability and Scalability in Ad-Hoc Multicast Routing Protocol for Sender Network 发送网络Ad-Hoc组播路由协议可靠性和可扩展性评估
Vishal Nagar, Y. Singh, D. Dhubkarya
{"title":"Estimation of Reliability and Scalability in Ad-Hoc Multicast Routing Protocol for Sender Network","authors":"Vishal Nagar, Y. Singh, D. Dhubkarya","doi":"10.1109/CICN.2011.74","DOIUrl":"https://doi.org/10.1109/CICN.2011.74","url":null,"abstract":"Mobile ad hoc network (MANETs) is a collection of nodes that exchange data over wireless paths. The nodes in this network are free to move at any time, therefore network topology changes in unpredictable way. Since there is no fixed infrastructure support in MANETs, each node functions as a host and a router. Designing a reliable and scalable routing protocol for MANETs is a challenging task due to mobility and the continuous change in the topology. In this paper the reliability and scalability of Network Sender Multicast Routing Protocol (NSMRP) is studied by finding the effect of increasing the number of groups under different mobility scenarios on the data packet delivery ratio and the control packet overhead. The simulation results show that when the number of groups increases the data packet delivery ratio improves while the control packet overhead continues to decrease.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123050325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Adaptive Resonance Theory of Neural Network Method in the String Recognition 神经网络自适应共振理论在字符串识别中的应用分析
A. Gupta, Y. Singh
{"title":"Analysis of Adaptive Resonance Theory of Neural Network Method in the String Recognition","authors":"A. Gupta, Y. Singh","doi":"10.1109/CICN.2011.32","DOIUrl":"https://doi.org/10.1109/CICN.2011.32","url":null,"abstract":"This paper aims that analysing neural network method in pattern recognition. A neural network is a processing device, whose design was inspired by the design and functioning of human brain and their components. The proposed solutions focus on applying Adaptive Resonance Theory model for pattern recognition. The primary function of which is to retrieve in a pattern stored in memory, when an incomplete or noisy version of that pattern is presented. An associative memory is a storehouse of associated patterns that are encoded in some form. In auto-association, an input pattern is associated with itself and the states of input and output units coincide. When the storehouse is incited with a given distorted or partial pattern, the associated pattern pair stored in its perfect form is recalled. Pattern recognition techniques are associated a symbolic identity with the image of the pattern. This problem of replication of patterns by machines (computers) involves the machine printed patterns. There is no idle memory containing data and programmed, but each neuron is programmed and continuously active.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development of Swarm Based Hybrid Algorithm for Identification of Natural Terrain Features 基于群的自然地形特征识别混合算法研究
S. Goel, Arpita Sharma, Akarsh Goel
{"title":"Development of Swarm Based Hybrid Algorithm for Identification of Natural Terrain Features","authors":"S. Goel, Arpita Sharma, Akarsh Goel","doi":"10.1109/CICN.2011.61","DOIUrl":"https://doi.org/10.1109/CICN.2011.61","url":null,"abstract":"Swarm Intelligence techniques facilitate the configuration and collimation of the remarkable ability of a group members to reason and learn in an environment of uncertainty and imprecision from their peers by sharing information. This paper introduces a novel hybrid approach PSO-BBO that is tailored to perform classification. Biogeography-based optimization (BBO) is a recently developed heuristic algorithm, which proves to be a strong entrant in this area with the encouraging and consistent performance. But, as BBO lacks inbuilt property of clustering, it is hybridized with Particle Swarm Optimization (PSO), which is considered as a good clustering technique. We have successfully applied this hybrid algorithm for classifying diversified land cover areas in a multispectral remote sensing satellite image. The results illustrate that the proposed approach is very efficient and highly accurate land cover features can be extracted by using this method. Also, this technique can easily be extended for other global optimization problems.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122945151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
GPS Locator: An Application for Location Tracking and Sharing Using GPS for Java Enabled Handhelds GPS定位器:一个使用GPS跟踪和共享Java手持设备的应用程序
Ankur Chandra, Shashank Jain, M. Qadeer
{"title":"GPS Locator: An Application for Location Tracking and Sharing Using GPS for Java Enabled Handhelds","authors":"Ankur Chandra, Shashank Jain, M. Qadeer","doi":"10.1109/CICN.2011.85","DOIUrl":"https://doi.org/10.1109/CICN.2011.85","url":null,"abstract":"The use of mobile devices has become a part of our daily routine. Recently, mobile devices like mobile phones or portable digital displays (PDAs) are equipped with global positioning system (GPS) receptors that allow us to get the device's geographic position in real time. Location Based Services (LBS) are regarded as a key feature of many future mobile applications. GPS serves well for most outdoor applications, however, its dependence on satellites makes it ineffective for indoor environments. This document gives a detail on our ongoing project work in the field of Location Based Services for JAVA enabled mobile devices, equipped with GPS receptor. We present a novel technique to send GPS coordinates to other mobiles through Short Message Service (SMS) based on Global Positioning System (GPS) technology. This application also enables the users to get their current location coordinates (latitude, longitude and altitude) and they can also view their locations on the Google maps. Further, this application also enables the user to share his location with their friends through a web server using internet connectivity in their hand helds. GPS is a satellite-based navigation system made up of a network of 24 satellites placed into orbit by the United States (US) Department of Defense (DoD). GPS was originally intended for military applications, but in the 1980s, the government made the system available for civilian use. GPS can show you your exact position on the Earth in any weather conditions, anywhere in the world, 24 hours a day. There are no subscription fees or setup charges to use GPS [6].","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129074403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Fast Motion Estimation Using Modified New Block Matching Algorithm: MTSSDS for Efficient Video Compression in Mobile Domain 基于改进的新块匹配算法的快速运动估计:MTSSDS在移动领域的高效视频压缩
A. Pandit, S. Verma, G. Tomar, Dheeraj Kannoujia
{"title":"Fast Motion Estimation Using Modified New Block Matching Algorithm: MTSSDS for Efficient Video Compression in Mobile Domain","authors":"A. Pandit, S. Verma, G. Tomar, Dheeraj Kannoujia","doi":"10.1109/CICN.2011.77","DOIUrl":"https://doi.org/10.1109/CICN.2011.77","url":null,"abstract":"Recent Day Communication between ends is facilitated by the development in the area of wired and wireless networks. The end to end devices like mobiles, handheld and palm size PC's have limited capability for computation, display capacity and bandwidth. This augment, for ways for communicating large data files like video, in highly compressed and acceptable quality over the limited available bandwidth. Block matching algorithms is a vital step for achieving the efficient and acceptable compression. The block matching algorithm defines the total computation cost and effective bit budget. Recently fast search algorithm for video coding using Orthogonal Logarithmic Search Algorithm (OSA) has been proposed This paper presents a novel method named as Modified Three steps and Diamond search Block matching Algorithm (MTSSDS) for the block based motion estimation It has been found that from the original Three step Search (3SS/TSS ) and Diamond Search (DS) method, the PSNR value has increased and the computations and thus computation time (faster) has been reduced significantely. The experimental results based on the number of video sequences were presented to demonstrate the advantages of proposed motion estimation technique.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127565682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Analysis of Phase Error Cancellation of PAL-D Television System Using Labview 基于Labview的PAL-D电视系统相位误差消除性能分析
Charmy Patel, G. R. Kulkarni
{"title":"Performance Analysis of Phase Error Cancellation of PAL-D Television System Using Labview","authors":"Charmy Patel, G. R. Kulkarni","doi":"10.1109/CICN.2011.128","DOIUrl":"https://doi.org/10.1109/CICN.2011.128","url":null,"abstract":"Television has been a part of our day to day life. So, sometimes we think how this system really works! In between Transmission and Reception, Information Signal passes through plenty of complex process and stages. We have Implemented, the process made on Chrominance signal (|C|) with the help of simulator, Lab VIEW 9, made by National Instruments in 1986. The Selection of appropriate camera is depending upon the three primary color of object. There are mainly three characteristic of chrominance signal. Hue, Saturation & Luminance. Amplitude of chrominance signal defines Saturation level and Phase angle of the signal determines Hue. So Chrominance circle, with magnitude level contains all colours of the world. Model describes the magnitude level and phase angle for the particular colour. Two colour difference signals are modulated in Quadrature Amplitude Modulation (QAM) manner. So by using this model you can show that how the QAM waves are looks like for particular colour. As well as the model describes how PAL-D System, used in the Asian country, works and how it is superior then the NTSC system used in American Country. Thus the concept of, Colour Television Transmission is designed in an oversimplified way.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117035982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信