{"title":"Combinatorial system design for high performance memory management","authors":"V. Kapadia, V. Thakar","doi":"10.1109/ICACT.2013.6710538","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710538","url":null,"abstract":"Memory management on which researchers are mainly focusing are the different techniques related to memory management i.e. garbage collection techniques, scheduling, real time system, user oriented design and many more. The major problem found out in memory management is processor and operating system delays. Here a new design of processor is discussed in the paper that will improve to the over all system performance.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131988997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multiple sink repositioning technique to improve the energy efficiency of wireless sensor networks","authors":"Prerana Shrivastava, S. Pokle","doi":"10.1109/ICACT.2013.6710517","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710517","url":null,"abstract":"An integral aspect for designing any efficient wireless sensor network is the conservation of energy and the optimization of the power consumption. Continuous and prolonged availability of power plays a vital role in keeping the sensors energized. The power required by the sensors is largely dependent on their batteries which may require regular recharging and periodic replacement. But practically it may not be viable to recharge or replace the batteries. Hence there is a need to design an energy efficient protocols which would result in significant amount of energy saving and help in elongating the lifetime of the network. In this paper we have proposed a sink positioning technique in which multiple mobile sinks are deployed across the entire wireless sensor network. Moreover in this technique there is no constraint on the location of the sinks. The sinks can be placed anywhere within the geographic area of the network. The main aim is to minimize the energy consumption and for this purpose we have divided the network lifetime into different circles and the optimal position of the various sinks is calculated at the beginning of each circle after which the sinks are moved to the new location. This movement of the sinks to a new optimal location results in significant amount of energy saving and also avoids the energy hole problem. The proposed sink positioning algorithm has been simulated in the NS-2.32 environment. The three performance metrics considered in order to evaluate the performance of the proposed technique are the packet delivery ratio, average energy consumption and the average number of packets dropped. The X graph for the packet delivery ratio, average energy consumption and the average number of packets dropped were plotted for static sink, multiple sink and multiple mobile sink approach and it was observed that multiple mobile sink positioning technique achieves significant amount of energy saving and also helps in the extension of the lifetime of the wireless sensor network in comparison to the static as well as multiple sink approach.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116141635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Antigenic epitope prediction of small envelope protein and designing a vaccine by using reverse vaccinology approach against SARS coronavirus Tor2 strain","authors":"Amit Kumar, A. Bhattacharya, Amita Kashyap","doi":"10.1109/ICACT.2013.6710500","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710500","url":null,"abstract":"Severe acute respiratory syndrome (SARS) is a serious form of pneumonia which results in acute respiratory distress and sometimes death. In this study, we applied the reverse vaccinology approach to determine the antigenic determinant sites present on the protein. The method incorporates the prediction of antigenic sites, solvent accessible region and secondary structure, B-cell epitope prediction, and the designing of antigenic determinant. The results of the study suggested that small envelope protein and orf8 protein could be potential candidates for vaccine designing. The high scoring antigenic peptides were designed and optimized. It is inferred that peptide of small envelope protein will make a very stable and effective vaccine targeting the E protein of the virus which is responsible for the spread of the virion. This study provides a strong and a potential optimized vaccine against SARS, which has high chances of success of immunization and higher probabilities of combating the dreadful disease.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122101022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Suspicious lesion detection in mammograms using undecimated wavelet transform and adaptive thresholding","authors":"A. Nayak, D. Ghosh, S. Ari","doi":"10.1109/ICACT.2013.6710546","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710546","url":null,"abstract":"Mammographic screening is the most effective procedure for the early detection of breast cancers. However, typical diagnostic signs such as masses are difficult to detect as mammograms are low-contrast noisy images. This paper proposes a systematic method for the detection of suspicious lesions in digital mammograms based on undecimated wavelet transform and adaptive thresholding techniques. Undecimated wavelet transform is used here to generate a multiresolution representation of the original mammogram. Adaptive global and local thresholding techniques are then applied to segment possible malignancies. The segmented regions are enhanced by using morphological filtering and seeded region growing. The proposed method is evaluated on 120 images of the Mammographic Image Analysis Society (MIAS) Mini Mammographic database, that include 89 images having in total 92 lesions. The experimental results show that the proposed method successfully detects 87 of the 92 lesions, performing with a sensitivity of 94.56 % at 0.8 false positives per image (FPI), which is better than earlier reported techniques. This shows the effectiveness of the proposed system in detecting breast cancer in early stages.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124559486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Noise suppression using non-linear PAR model for binary images","authors":"I. Suneetha, T. Venkateswarlu","doi":"10.1109/ICACT.2013.6710525","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710525","url":null,"abstract":"The fundamental steps in Digital Image processing are image acquisition, image enhancement, image analysis, image reconstruction, image restoration, image compression, image segmentation, image recognition, and visualization of image. Main sources of noise in digital image processing come under image acquisition, image store and image transmission due to malfunctioning cameras, faulty memory locations and noisy channels respectively. Hence it is necessary to suppress noise in noisy images to extract the necessary details. This paper proposes a method for noise suppression using a parameterized adaptive recursive model for binary images in spatial domain. The type of noise considered is salt and pepper noise. Performance of the proposed method can be measured via subjective results like input-output images and objective like peak signal to noise ratio.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"85 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132478754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sanjeev Kulkarnil, A. M. Sankpal, R. R. Mudholkar, Kiran Kumari
{"title":"Recommendation engine: Matching individual/group profiles for better shopping experience","authors":"Sanjeev Kulkarnil, A. M. Sankpal, R. R. Mudholkar, Kiran Kumari","doi":"10.1109/ICACT.2013.6710501","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710501","url":null,"abstract":"Research is a conceptual analysis of application of Sensors, Mobiles and Social Network for real world usage scenarios impacting our quality of life and lifestyle. This paper presents enhancing a person or group's shopping experience in store powered by integration of mobiles, sensors and social network. Matching profiles of individual or group for better shopping experience.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134461427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shree Garg, Ankush Kumar Singh, A. Sarje, S. K. Peddoju
{"title":"Behaviour analysis of machine learning algorithms for detecting P2P botnets","authors":"Shree Garg, Ankush Kumar Singh, A. Sarje, S. K. Peddoju","doi":"10.1109/ICACT.2013.6710523","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710523","url":null,"abstract":"Botnets have emerged as a powerful threat on the Internet as it is being used to carry out cybercrimes. In this paper, we have analysed some machine learning techniques to detect peer to peer (P2P) botnets. As the detection of P2P botnets is widely unexplored area, we have focused on it. We experimented with different machine learning (ML) algorithms to compare their ability to classify the botnet traffic from the normal traffic by selecting distinguishing features of the network traffic. Experiments are performed on the dataset containing the traces of various P2P botnets. Results and tradeoffs obtained of different ML algorithms on different metrics are presented at the end of the paper.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132090596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A distributed cloud-prevents attacks and preserves user privacy","authors":"C. U. Om Kumar, K. Tejaswi, P. Bhargavi","doi":"10.1109/ICACT.2013.6710509","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710509","url":null,"abstract":"In today's “era of Tera”, everything is possible in terms of storage and service. The long-held dream of computing as a utility has been achieved in the form of cloud computing. It has transformed the world where large part of IT industry is simplified by Platform as a Service, Software's are developed and rented more attractively in the form of Development as a Service, Software as a Service. It has shaped the IT industry with its Infrastructure as a Service. When all such services are provided to client on demand, security becomes a major concern. Since Cloud is a Data Centre there are conceivable chances of attacks on it. Cloud behaves like a group of interconnected systems since it is run on the backdrop through Distributed systems. Various attacks like DOS, DDOS, Malware Injection attack, Man-In-The-Middle attacks are possible. This paper discusses various Mining attacks that are possible on a Cloud and provides a solution by using a Secure Distributed approach. We use WEKA to predict the patterns in a single cloud and by using Cloud Data Distributor with a secure distributed approach we provide an effective solution that prevents such mining attacks on Cloud thus making the Cloud a secure platform for service and storage.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133752705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Re-ranking for personalization using concept hierarchy in DL environment","authors":"M. Potey, S. Pawar, P. K. Sinha","doi":"10.1109/ICACT.2013.6710489","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710489","url":null,"abstract":"In Digital Library (DL) system, users interact with the system to search for books or research papers. Users can search through metadata or search for information in the pages by querying using keywords. In both cases, a huge amount of results are returned; however, the relevant ones to the user are not often amongst the top few. Re-ranking of the search results based on the user's interest has received wide attention in information retrieval. This work presents extending conventional search engine to searching digital library data of user's interests. The proposed system improve information access by building knowledge about a user, acquired using the user's interaction with the system, in order to customize information access. User profiling is done using a hybrid approach by taking into consideration login details and click-through data. This system mapping framework automatically maps Dmoz Open Directory Project (ODP) topics to users' interests and takes advantage of manually edited data available in ODP, to categorize and personalize search results, according to user interests. Reranking of the results is done based on user interests. This makes it easy to find relevant DL pages faster than normal search engines. Performance has been evaluated for online DL systems. System's performance improves by 16.55% if the average per query is calculated and approximately 10% if per user average is calculated over baseline (Google CSE) after re-ranking.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129073324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Shukla, H. Prakash, R. Bhushan, S. Venkataraman, G. Varadan
{"title":"Sahastradhara: Biometric and EToken integrated secure email system","authors":"R. Shukla, H. Prakash, R. Bhushan, S. Venkataraman, G. Varadan","doi":"10.1109/ICACT.2013.6710516","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710516","url":null,"abstract":"E-mail Security has been a growing concern over the past few years. The average individual, who uses e-mail naively believes that their e-mail is private and secure. The electronic world is filled with snoopers who can access all types of data over the network. As the world goes digital, with more and more raw information about individuals available electronically, the need for security increases. Ubiquity and speed of email have made it increasingly effective. So providing reliance over this medium has become an inevitable requirement. The emails of today are secured by encrypting the content on an external medium and sending this as an attachment over the mail. The current trend increases the size of the mail and makes it inconvenient for the user. There are other systems that provide specific security and are strongly tied to the mail servers and browsers.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131450855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}