Proceedings of the International Conference on Advances in Information Communication Technology & Computing最新文献

筛选
英文 中文
A Boolean Expression based Template Matching Technique for Optical Circuit Generation 基于布尔表达式的光电路模板匹配技术
R. R. Chowdhury, Chandan Bandyopadhyay, Pratik Dutta, H. Rahaman
{"title":"A Boolean Expression based Template Matching Technique for Optical Circuit Generation","authors":"R. R. Chowdhury, Chandan Bandyopadhyay, Pratik Dutta, H. Rahaman","doi":"10.1145/2979779.2979815","DOIUrl":"https://doi.org/10.1145/2979779.2979815","url":null,"abstract":"With the increased need of high speed computing paradigm, the optical circuits are gaining more importance. Immense investigations are under progress to build full-fledge optical circuits with minimum hardware. In this work, we are showing a template matching scheme that generates low cost optical circuits using Mach-Zehnder Interferometers (MZI) based optical devices. In this proposed design, initially we design four optimized templates using MZIs and later these templates perform exhaustive search in boolean logic expression to find its structural matches. If a match is found then it replaces the corresponding sub-circuit with its own template. Experimental results are provided and a comparative analysis is made with recently reported works. It has been found that the proposed scheme not only reduces the optical cost of a circuit but also brings down the total optical device utilization in the circuit.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129494551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Computer Vision Based Overlapped Flowers Detection 基于计算机视觉的重叠花朵检测
Deepti Koolwal, P. Jain, Ankit Agarwal
{"title":"Computer Vision Based Overlapped Flowers Detection","authors":"Deepti Koolwal, P. Jain, Ankit Agarwal","doi":"10.1145/2979779.2979857","DOIUrl":"https://doi.org/10.1145/2979779.2979857","url":null,"abstract":"Applications of enhanced photograph processing and human structure modeling procedures performed mammoth function in advancement of Video surveillance. Right here we are presenting a proposed video surveillance approach for overlapped flower yield detection. In this article a digicam is viewed standing dealing with a flower mattress for flower yield detection. Range of flower types are maintained together with yellow, purple and crimson petals in each state of affairs respectively for study consideration. For candidature of yieldable some valid parameters are considered such as flower dimension, quantity of petals etc. After color modeling, morphological operations entire utilizing dilation, erosion, opening and closing algorithms for removing of any spurious noise with-in a digicam acquainted images.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128609464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cluster based template generation for fast and secure fingerprint matching 基于聚类的模板生成,实现快速安全的指纹匹配
Debashis Das, S. Mukhopadhyay, G. P. Biswas
{"title":"Cluster based template generation for fast and secure fingerprint matching","authors":"Debashis Das, S. Mukhopadhyay, G. P. Biswas","doi":"10.1145/2979779.2979803","DOIUrl":"https://doi.org/10.1145/2979779.2979803","url":null,"abstract":"Most of the fingerprint recognition systems depend on pair-wise matching of the minutia feature vectors which consist of several spatial properties associated with the minutia points. Due to various non-linear deformations like translation and rotation, minutia based matching is quite a challenging issue. To deal with this problem, most of the techniques in the literature solely depend upon a reference point selection. In this paper, we propose a novel cluster based template generation and matching algorithm which is invariant to translation and rotation of the minutia points. The cardinality of minutia clusters are stored as fingerprint template instead of minutia feature vectors. The stored template reveals no information regarding the spatial pattern of the fingerprint which provides a strong security against information leakage. Finally, a robust match score estimation technique is introduced to increase the matching efficiency. Moreover, the proposed method produces a faster execution. We present the performance on FVC2004 database to show the effectiveness of our method along with a comparative study against some other existing matching algorithms which establishes the efficacy of the proposed method.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128966771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Three-way decision based Defect Prediction for Object Oriented Software 基于三向决策的面向对象软件缺陷预测
S. Maheshwari, Sonali Agarwal
{"title":"Three-way decision based Defect Prediction for Object Oriented Software","authors":"S. Maheshwari, Sonali Agarwal","doi":"10.1145/2979779.2979783","DOIUrl":"https://doi.org/10.1145/2979779.2979783","url":null,"abstract":"Early prediction of defective software module plays critical role in the software project development to reduce the overall development time, budgets and increases the customer satisfaction. The bug prediction based on two-way classification method classifies the software module as defective or non-defective. This method provides good accuracy measure but this metric is not sufficient in case if misclassification cost is concerned. Classifying the defective module as non-defective will lead to higher cost of entire software project at the end. In this study, three-way decision based classification method and Random Forest ensemble are used to predict the defect in Object Oriented Software to reduce the misclassification cost which will lead to avoid the cost overrun. The eclipse bug prediction dataset is used and experimental results show that the decision cost is reduced and accuracy is increased using our proposed method.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129066631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart Handoff Framework for Next Generation Heterogeneous Networks in Smart Cities 面向智慧城市下一代异构网络的智能切换框架
P. Dhand, S. Mittal
{"title":"Smart Handoff Framework for Next Generation Heterogeneous Networks in Smart Cities","authors":"P. Dhand, S. Mittal","doi":"10.1145/2979779.2979854","DOIUrl":"https://doi.org/10.1145/2979779.2979854","url":null,"abstract":"Over the last few decades, accessibility scenarios have undergone a drastic change. Today the way people access information and resources is quite different from the age when internet was not evolved. The evolution of the Internet has made remarkable, epoch-making changes and has become the backbone of smart city. The vision of smart city revolves around seamless connectivity. Constant connectivity can provide uninterrupted services to users such as e-governance, e-banking, e-marketing, e-shopping, e-payment and communication through social media. And to provide uninterrupted services to such applications to citizens is our prime concern. So this paper focuses on smart handoff framework for next generation heterogeneous networks in smart cities to provide all time connectivity to anyone, anyhow and anywhere. To achieve this, three strategies have been proposed for handoff initialization phase-Mobile controlled, user controlled and network controlled handoff initialization. Each strategy considers a different set of parameters. Results show that additional parameters with RSSI and adaptive threshold and hysteresis solve ping-pong and corner effect problems in smart city.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131062031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design & Comparison a Simple Edge-Fed Patch Antenna with Different Substrates Using IE3D 利用IE3D设计与比较不同基板的简单边缘馈电贴片天线
Reena Bhisnoi, M. Sabir, S. Bishnoi
{"title":"Design & Comparison a Simple Edge-Fed Patch Antenna with Different Substrates Using IE3D","authors":"Reena Bhisnoi, M. Sabir, S. Bishnoi","doi":"10.1145/2979779.2979889","DOIUrl":"https://doi.org/10.1145/2979779.2979889","url":null,"abstract":"This paper focuses on design of simple edge-fed patch-antenna and experimentally studied on IE3D, simulation by Zeland Software, for WLAN systems at frequency 2.483GHz. Patch Antennas widely used in a different useful application, because of their low profile and weight, conformability & easy realization. In this simple edge-fed patch antenna is also studied with various types of substrate of different dielectric constant keeping same thickness (0.16 cm).","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132929303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure DSR Routing Protocol Based on Homomorphic Digital Signature 基于同态数字签名的安全DSR路由协议
Mohammad Amir, D. M. Nagar, Vinay Baghela
{"title":"Secure DSR Routing Protocol Based on Homomorphic Digital Signature","authors":"Mohammad Amir, D. M. Nagar, Vinay Baghela","doi":"10.1145/2979779.2979863","DOIUrl":"https://doi.org/10.1145/2979779.2979863","url":null,"abstract":"Mobile Ad-Hoc Network is a wireless networking exemplar of mobile hosts which are connected by wireless links without usual routing infrastructure and link fixed routers. Dynamic Source Routing (DSR) is one of the extensively used routing protocol for packet transfer from source to destination. It relies on maintaining most recent information, for which, each adhoc node maintains hop count and sequence number field. They are vulnerable to security attacks due to their mutable nature. Analogously, routing updates are transmitted in clear text, which again poses a security hazard. In this paper, we will propose an improved version of DSR routing protocol using Homomorphic Encryption Scheme which prevents pollution attack and accomplishes in maintaining Integrity Security Standard by following minimum hop count path. HDSR routing scheme is evaluated by simulation and results show that improved throughput and ETE delay can be obtained.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134518149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Region Based Blind Image Watermarking Scheme in Wavelet Domain 小波域基于区域的图像盲水印方案
Swati, Singara Singh Kasana
{"title":"Region Based Blind Image Watermarking Scheme in Wavelet Domain","authors":"Swati, Singara Singh Kasana","doi":"10.1145/2979779.2979872","DOIUrl":"https://doi.org/10.1145/2979779.2979872","url":null,"abstract":"In this work, block based blind image watermarking scheme using Lifting Wavelet Transform (LWT) is proposed. In this scheme, cover image is partitioned into significant and insignificant regions using a threshold. Only significant regions are used to embed the watermark. Proposed scheme provides good visual quality marked images compared to existing watermarking schemes.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133858725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Enhanced Hybrid Approach for Reducing Downtime, Cost and Power Consumption of Live VM Migration 一种增强的混合方法,用于减少虚拟机迁移的停机时间、成本和功耗
Tania Jaswal, Kiranbir Kaur
{"title":"An Enhanced Hybrid Approach for Reducing Downtime, Cost and Power Consumption of Live VM Migration","authors":"Tania Jaswal, Kiranbir Kaur","doi":"10.1145/2979779.2979851","DOIUrl":"https://doi.org/10.1145/2979779.2979851","url":null,"abstract":"The computational work load has been diverted from humans to machines as it has reached to a limit that cannot be handled by humans. Same is the case with the machines. Nowadays cloud is used very commonly which makes the load on the cloud system increase day by day. The cloud uses data centers and with the increase in number of users the load on data centers is increasing. In that case, if the data center goes down then all the data stored on the VMs(Virtual Machine) of that data centre will be lost. In existing system distance based load consideration is absence where as proposed system is based upon it. This paper proposes a technique for offloading the data of a VM to multiple data centers. In the proposed technique, migration will be performed by the use of live VM migration which means that the migration does not required to switch off the devices which is the case in offline migration.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115078045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Affinity Propagation-driven Multiple Weighted Clustering in MANETs 基于亲和性传播驱动的多加权聚类
Kaustubh Nabar, G. Kadambi
{"title":"Affinity Propagation-driven Multiple Weighted Clustering in MANETs","authors":"Kaustubh Nabar, G. Kadambi","doi":"10.1145/2979779.2979791","DOIUrl":"https://doi.org/10.1145/2979779.2979791","url":null,"abstract":"This paper deals with a distributed clustering approach to tackle greedy clustering heuristics in MANETs. One of the most commonly used techniques to cluster nodes in a network is the Multiple Weighted Clustering (MWC) algorithm, which considers distinct heterogeneous performance metrics in a weighted form to select a Cluster-Head (CH). Since, clustering is a NP-hard problem, most of the MWC algorithms use greedy-clustering heuristics. The greedy approach intends to choose a strong, high priority node as a CH through frequent broadcast, by overlooking the topology evolution and the long term stability. The fundamental aim of this research is to address this gap and increase the efficiency of MWC technique in terms of stability, quality and cost of clustering. The MWC function used in this research considers node mobility factor, residual energy and connectivity. The Affinity Propagation (AP) method used in data mining is modified from a communication perspective and implemented to optimize the MWC function between nodes. The performance of the proposed approach is compared with the same MWC function with greedy approach using NS2. The simulation results show that the AP-driven MWC algorithm delivers better cluster stability and quality at a reduced clustering cost.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114629733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信