2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)最新文献

筛选
英文 中文
Sleepy lector: A novel approach for leakage reduction in DSM technology 睡眠收集器:在DSM技术中减少泄漏的一种新方法
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508201
Ajay Kumar Dadoria, K. Khare, R. Singh
{"title":"Sleepy lector: A novel approach for leakage reduction in DSM technology","authors":"Ajay Kumar Dadoria, K. Khare, R. Singh","doi":"10.1109/CONFLUENCE.2016.7508201","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508201","url":null,"abstract":"Leakage power consumption is a major contribution of total power dissipation in Deep Sub-Micron (DSM) technology for CMOS circuit design. In this paper we have proposed a Novel circuit technique known as “Sleepy LECTOR” which mitigates various type of leakage current in DSM regime. In proposed technique we insert p-type sleep transistor above pull up network, and n-type sleep transistor below pull down network, which rail of from Vdd to GND for reduction of leakage power. Another Leakage controlled transistor (LCTs) PMOS and NMOS inserted between pull up and pull down network, these transistors are always near cut OFF voltage which increases the path resistance from supply to ground reducing leakage power, it is self controlling transistor. Lector transistors produce the stacking effect and producing high resistance path from Vdd to ground. By using Sleep transistors we can turn off the circuit by rail from power supply (Vdd) during standby mode for reduction of leakage power. The proposed circuit technique reduces the Power with respect to basic NAND gate 37.69%, 83.93%, N AND gate with sleep 79.15%, 86.69%, NAND gate with Lector 36.79%, 12.05% respectively in 65nm and 45nm Process Technology.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120926977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Solutions for DDoS attacks on cloud 云环境下DDoS攻击解决方案
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508107
Akashdeep Bhardwaj, G. Subrahmanyam, V. Avasthi, Hanumat G. Sastry
{"title":"Solutions for DDoS attacks on cloud","authors":"Akashdeep Bhardwaj, G. Subrahmanyam, V. Avasthi, Hanumat G. Sastry","doi":"10.1109/CONFLUENCE.2016.7508107","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508107","url":null,"abstract":"The internet has become the key driver for virtually every organization's growth, brand awareness and operational efficiency. Unfortunately cyber terrorists and organized criminals know this fact too. Using a Distributed Denial of Service attack they can deny corporates and end users the access to internet, make web site going slow, and deny access to corporate network and data, unable to service legitimate users. It is not just these that are vulnerable, DDoS attacks are diversions.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"117-119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121232294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Perceptually transparent watermarking of audio signals 感知透明的音频信号水印
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508163
Anshul Atriek, A. Kaur
{"title":"Perceptually transparent watermarking of audio signals","authors":"Anshul Atriek, A. Kaur","doi":"10.1109/CONFLUENCE.2016.7508163","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508163","url":null,"abstract":"Digital watermarking captivates within remarkable promise as one of the silver bullets to fortify and insulate proprietary digital material in the times to come. It focuses on embedding watermark information into a digital host object in an inseparable bond to authenticate the latter. This paper proposes a high-capacity blind audio watermarking technique within perceptual constraints, i.e., the manipulations performed during the embedding process are imperceptible to unaided human senses. The suggested scheme uses high-frequency wavelet coefficients obtained during the quantization in Discrete Wavelet Transform (DWT) domain since redundant information can be accommodated with more ease in the high-frequency sub-band. Arnold Transformation is used for watermark permutation to ensure increased security and robustness of the scheme. From the experimental results, it follows that the illustrated scheme offers a healthy trade-off between payload, imperceptibility and robustness. The algorithm offers a fairly high Payload of 2755.6 bits per second while constantly maintaining the SNR, NCC and BER values well within the specified standards - even when been subjected to signal processing attacks.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"AES-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126498663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud-based CAPTCHA service 基于云的验证码服务
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508098
A. Shumilov, A. Philippovich
{"title":"Cloud-based CAPTCHA service","authors":"A. Shumilov, A. Philippovich","doi":"10.1109/CONFLUENCE.2016.7508098","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508098","url":null,"abstract":"The majority of modern CAPTCHAs are prone to hacking, sometimes difficult to pass for humans, and cannot be tuned to fit the design of the website. This paper proposes a new, more robust and configurable, cloud-based CAPTCHA service that uses animated hand gestures to represent the sequence of characters the user needs to type in order to pass the test.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132468078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Removing traffic congestion at traffic lights using GPS technology 利用GPS技术消除红绿灯处的交通堵塞
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508185
R. Tanwar, G. Sidhu, R. Majumdar, Abhishek Srivastava
{"title":"Removing traffic congestion at traffic lights using GPS technology","authors":"R. Tanwar, G. Sidhu, R. Majumdar, Abhishek Srivastava","doi":"10.1109/CONFLUENCE.2016.7508185","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508185","url":null,"abstract":"In present-day the most common issues that concerns everyone is traffic congestion on road at crossings where traffic light poles are placed. The objective is to flow and maintain traffic system automatically but unfortunately jamming queue exists while everything is fine from technology point of view because of predefined static time duration. This predefined time slots fail to capture real time scenarios in terms of traffic load and that leads to congestion. To avoid such type of problem, this work contributes the concept of dynamic traffic light slots as a best possible solution. Dynamic traffic light is a concept of controlling the time duration of RED and GREEN light according to traffic flow or by sensing flow of traffic on road in movement. This can be achieved by using Global Positioning System which will convey the details of traffic flow and by considering that, time slots are provided to traffic lights i.e. whole controlling and managing will work like Real Time System.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134409876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Feature selection in software defect prediction: A comparative study 软件缺陷预测中的特征选择:比较研究
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508200
Misha Kakkar, Sarika Jain
{"title":"Feature selection in software defect prediction: A comparative study","authors":"Misha Kakkar, Sarika Jain","doi":"10.1109/CONFLUENCE.2016.7508200","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508200","url":null,"abstract":"Software has become a vital part of human's life - hence building defect free software is a must. Various studies have been carried out to predict defects, probability of defect prone modules, and implementation of defect prediction for real life softwares. The focus of this paper is towards building a framework using attribute selection for defect prediction based on five classifiers IBk, KStar, LWL, Random Tree and Random Forest. Performance comparison is done on the basis of accuracy and ROC values. The result and analysis shows that the framework has reduced total number of attributes used for each dataset by 6 folds on average, also LWL performed better than other four classifiers when tested with 10 Cross Validation (10CV) and percentage split of 66%.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"37 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132865144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Exploration of application migration to cloud environment 探索应用程序迁移到云环境
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508097
Ahmed Kandil, H. El-Deeb
{"title":"Exploration of application migration to cloud environment","authors":"Ahmed Kandil, H. El-Deeb","doi":"10.1109/CONFLUENCE.2016.7508097","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508097","url":null,"abstract":"Cloud computing has strongly imposed itself on the area of research for both industry and academics requirements. Cloud providers are moving or planning to move their applications to the cloud environment attaining infrastructures and different cloud service organizations. This task includes a lot of details to be academic selected to tackle such a task raising up a lot of questions which needs to be addressed in a scientific and practical approach. Most researches concerning this issue stressing on the challenges of the migration process to the cloud. But few studies stresses on the life running of practical applications in the cloud environment monitoring some selected performance measures to be compared before and after migration .The objective of this process could assist in taking a critical decision regarding either to keep or modify the practical migrated application. The Objective of this research is to evaluate the performance measures of a real running transaction processing system (TPS) as a selected case study before and after migration to the cloud environment. Plotting and analysis of the conducted results over the Amazon EC2 cloud environment as public cloud and a selected specific private cloud indicates 52% compared to the performance measures before migration which strongly support the usage of cloud computing approach for practical case studies without concerning about any performance degradation. The lower overhead cost for migration to public cloud environments proves the robustness of the proposed approach for this research.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133354011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A conformal microstrip patch antenna on cylinder back-to-back E and U shape slot for triple band operation 圆柱背对背E型和U型槽的共形微带贴片天线,用于三波段操作
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508202
Brajlata Chauhan, A. Negi
{"title":"A conformal microstrip patch antenna on cylinder back-to-back E and U shape slot for triple band operation","authors":"Brajlata Chauhan, A. Negi","doi":"10.1109/CONFLUENCE.2016.7508202","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508202","url":null,"abstract":"The paper presents the design of a microstrip patch antenna having E and U shape slot which is back to back connected to each other mounted on the finite cylindrical surface that can operate on a triple band 2.057 GHz, 3.6102 GHz, and 6.2624 GHz. This conformal structure with truncated corner used for circular polarization. This antenna is simulated through CST microwave studio finite element package. All the simulated parameters like return loss, Directivity, Gain , Radiation pattern in 2D/3D for port one and port two are presented.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132958258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Canonization rules for detecting different URLs 用于检测不同url的规范化规则
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508093
Chanchal Kumari, Divya Joshi, Shailendra Narayan Singh
{"title":"Canonization rules for detecting different URLs","authors":"Chanchal Kumari, Divya Joshi, Shailendra Narayan Singh","doi":"10.1109/CONFLUENCE.2016.7508093","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508093","url":null,"abstract":"A Uniform Resource Locator (URL) represents the address of a web page in World Wide Web (WWW). A URL grants access to a single web page on the WWW. Here in this paper the main focus is on the URLs addressing the same web page/same content. A web Page can have two or more URLs with which the web page can be accessed. These duplicate URLs can be a serious threat to the entire pipeline of internet searcher administration for indexing and creeping. I am presenting a novel algorithm for detecting canonization rules for normalizing URLs to the original single URL. Here a pattern recognition approach has been used for analyzing textual data. This approach benefits search engines from information about duplicate URLs to optimize the performance of search engine in terms of reduced cost and improved quality.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127952091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on Shadow Detection and Removal in images and video sequences 图像和视频序列中阴影检测与去除的研究进展
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508175
Arti Tiwari, P. Singh, Sobia Amin
{"title":"A survey on Shadow Detection and Removal in images and video sequences","authors":"Arti Tiwari, P. Singh, Sobia Amin","doi":"10.1109/CONFLUENCE.2016.7508175","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508175","url":null,"abstract":"Shadow Detection and Removal is the process to enhance the performance, reliability and accuracy of the computer vision applications including image segmentation and object recognition, object tracking, surveillance etc. Detection and Removal of shadow from the images and videos can reduce the undesirable outcomes in the computer vision applications and algorithms. The prime objective of this survey paper is to analyze the performance of various currently used shadow detection techniques. In this paper we have discussed the techniques for detecting and removing shadow from the still images and video sequences. The scope of discussed shadow detection and removal techniques is limited to different scenarios: (i) Shadow detection for Indoor and Outdoor scenes, (ii) Shadow detection using fixed or moving camera, (iii) Shadow detection of umbra and penumbra shadows etc.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125591639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信