2013 15th International Conference on Advanced Computing Technologies (ICACT)最新文献

筛选
英文 中文
Combinatorial system design for high performance memory management 高性能存储器管理组合系统设计
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710538
V. Kapadia, V. Thakar
{"title":"Combinatorial system design for high performance memory management","authors":"V. Kapadia, V. Thakar","doi":"10.1109/ICACT.2013.6710538","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710538","url":null,"abstract":"Memory management on which researchers are mainly focusing are the different techniques related to memory management i.e. garbage collection techniques, scheduling, real time system, user oriented design and many more. The major problem found out in memory management is processor and operating system delays. Here a new design of processor is discussed in the paper that will improve to the over all system performance.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131988997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multiple sink repositioning technique to improve the energy efficiency of wireless sensor networks 一种提高无线传感器网络能量效率的多sink重定位技术
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710517
Prerana Shrivastava, S. Pokle
{"title":"A multiple sink repositioning technique to improve the energy efficiency of wireless sensor networks","authors":"Prerana Shrivastava, S. Pokle","doi":"10.1109/ICACT.2013.6710517","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710517","url":null,"abstract":"An integral aspect for designing any efficient wireless sensor network is the conservation of energy and the optimization of the power consumption. Continuous and prolonged availability of power plays a vital role in keeping the sensors energized. The power required by the sensors is largely dependent on their batteries which may require regular recharging and periodic replacement. But practically it may not be viable to recharge or replace the batteries. Hence there is a need to design an energy efficient protocols which would result in significant amount of energy saving and help in elongating the lifetime of the network. In this paper we have proposed a sink positioning technique in which multiple mobile sinks are deployed across the entire wireless sensor network. Moreover in this technique there is no constraint on the location of the sinks. The sinks can be placed anywhere within the geographic area of the network. The main aim is to minimize the energy consumption and for this purpose we have divided the network lifetime into different circles and the optimal position of the various sinks is calculated at the beginning of each circle after which the sinks are moved to the new location. This movement of the sinks to a new optimal location results in significant amount of energy saving and also avoids the energy hole problem. The proposed sink positioning algorithm has been simulated in the NS-2.32 environment. The three performance metrics considered in order to evaluate the performance of the proposed technique are the packet delivery ratio, average energy consumption and the average number of packets dropped. The X graph for the packet delivery ratio, average energy consumption and the average number of packets dropped were plotted for static sink, multiple sink and multiple mobile sink approach and it was observed that multiple mobile sink positioning technique achieves significant amount of energy saving and also helps in the extension of the lifetime of the wireless sensor network in comparison to the static as well as multiple sink approach.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116141635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Antigenic epitope prediction of small envelope protein and designing a vaccine by using reverse vaccinology approach against SARS coronavirus Tor2 strain 应用反向疫苗学方法预测SARS冠状病毒Tor2株小包膜蛋白抗原表位及疫苗设计
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710500
Amit Kumar, A. Bhattacharya, Amita Kashyap
{"title":"Antigenic epitope prediction of small envelope protein and designing a vaccine by using reverse vaccinology approach against SARS coronavirus Tor2 strain","authors":"Amit Kumar, A. Bhattacharya, Amita Kashyap","doi":"10.1109/ICACT.2013.6710500","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710500","url":null,"abstract":"Severe acute respiratory syndrome (SARS) is a serious form of pneumonia which results in acute respiratory distress and sometimes death. In this study, we applied the reverse vaccinology approach to determine the antigenic determinant sites present on the protein. The method incorporates the prediction of antigenic sites, solvent accessible region and secondary structure, B-cell epitope prediction, and the designing of antigenic determinant. The results of the study suggested that small envelope protein and orf8 protein could be potential candidates for vaccine designing. The high scoring antigenic peptides were designed and optimized. It is inferred that peptide of small envelope protein will make a very stable and effective vaccine targeting the E protein of the virus which is responsible for the spread of the virion. This study provides a strong and a potential optimized vaccine against SARS, which has high chances of success of immunization and higher probabilities of combating the dreadful disease.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122101022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Suspicious lesion detection in mammograms using undecimated wavelet transform and adaptive thresholding 用非消差小波变换和自适应阈值法检测乳房x线照片中的可疑病变
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710546
A. Nayak, D. Ghosh, S. Ari
{"title":"Suspicious lesion detection in mammograms using undecimated wavelet transform and adaptive thresholding","authors":"A. Nayak, D. Ghosh, S. Ari","doi":"10.1109/ICACT.2013.6710546","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710546","url":null,"abstract":"Mammographic screening is the most effective procedure for the early detection of breast cancers. However, typical diagnostic signs such as masses are difficult to detect as mammograms are low-contrast noisy images. This paper proposes a systematic method for the detection of suspicious lesions in digital mammograms based on undecimated wavelet transform and adaptive thresholding techniques. Undecimated wavelet transform is used here to generate a multiresolution representation of the original mammogram. Adaptive global and local thresholding techniques are then applied to segment possible malignancies. The segmented regions are enhanced by using morphological filtering and seeded region growing. The proposed method is evaluated on 120 images of the Mammographic Image Analysis Society (MIAS) Mini Mammographic database, that include 89 images having in total 92 lesions. The experimental results show that the proposed method successfully detects 87 of the 92 lesions, performing with a sensitivity of 94.56 % at 0.8 false positives per image (FPI), which is better than earlier reported techniques. This shows the effectiveness of the proposed system in detecting breast cancer in early stages.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124559486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Noise suppression using non-linear PAR model for binary images 基于非线性PAR模型的二值图像噪声抑制
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710525
I. Suneetha, T. Venkateswarlu
{"title":"Noise suppression using non-linear PAR model for binary images","authors":"I. Suneetha, T. Venkateswarlu","doi":"10.1109/ICACT.2013.6710525","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710525","url":null,"abstract":"The fundamental steps in Digital Image processing are image acquisition, image enhancement, image analysis, image reconstruction, image restoration, image compression, image segmentation, image recognition, and visualization of image. Main sources of noise in digital image processing come under image acquisition, image store and image transmission due to malfunctioning cameras, faulty memory locations and noisy channels respectively. Hence it is necessary to suppress noise in noisy images to extract the necessary details. This paper proposes a method for noise suppression using a parameterized adaptive recursive model for binary images in spatial domain. The type of noise considered is salt and pepper noise. Performance of the proposed method can be measured via subjective results like input-output images and objective like peak signal to noise ratio.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"85 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132478754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recommendation engine: Matching individual/group profiles for better shopping experience 推荐引擎:匹配个人/团体资料,以获得更好的购物体验
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710501
Sanjeev Kulkarnil, A. M. Sankpal, R. R. Mudholkar, Kiran Kumari
{"title":"Recommendation engine: Matching individual/group profiles for better shopping experience","authors":"Sanjeev Kulkarnil, A. M. Sankpal, R. R. Mudholkar, Kiran Kumari","doi":"10.1109/ICACT.2013.6710501","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710501","url":null,"abstract":"Research is a conceptual analysis of application of Sensors, Mobiles and Social Network for real world usage scenarios impacting our quality of life and lifestyle. This paper presents enhancing a person or group's shopping experience in store powered by integration of mobiles, sensors and social network. Matching profiles of individual or group for better shopping experience.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134461427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Behaviour analysis of machine learning algorithms for detecting P2P botnets 检测P2P僵尸网络的机器学习算法行为分析
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710523
Shree Garg, Ankush Kumar Singh, A. Sarje, S. K. Peddoju
{"title":"Behaviour analysis of machine learning algorithms for detecting P2P botnets","authors":"Shree Garg, Ankush Kumar Singh, A. Sarje, S. K. Peddoju","doi":"10.1109/ICACT.2013.6710523","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710523","url":null,"abstract":"Botnets have emerged as a powerful threat on the Internet as it is being used to carry out cybercrimes. In this paper, we have analysed some machine learning techniques to detect peer to peer (P2P) botnets. As the detection of P2P botnets is widely unexplored area, we have focused on it. We experimented with different machine learning (ML) algorithms to compare their ability to classify the botnet traffic from the normal traffic by selecting distinguishing features of the network traffic. Experiments are performed on the dataset containing the traces of various P2P botnets. Results and tradeoffs obtained of different ML algorithms on different metrics are presented at the end of the paper.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132090596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A distributed cloud-prevents attacks and preserves user privacy 分布式云可以防止攻击并保护用户隐私
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710509
C. U. Om Kumar, K. Tejaswi, P. Bhargavi
{"title":"A distributed cloud-prevents attacks and preserves user privacy","authors":"C. U. Om Kumar, K. Tejaswi, P. Bhargavi","doi":"10.1109/ICACT.2013.6710509","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710509","url":null,"abstract":"In today's “era of Tera”, everything is possible in terms of storage and service. The long-held dream of computing as a utility has been achieved in the form of cloud computing. It has transformed the world where large part of IT industry is simplified by Platform as a Service, Software's are developed and rented more attractively in the form of Development as a Service, Software as a Service. It has shaped the IT industry with its Infrastructure as a Service. When all such services are provided to client on demand, security becomes a major concern. Since Cloud is a Data Centre there are conceivable chances of attacks on it. Cloud behaves like a group of interconnected systems since it is run on the backdrop through Distributed systems. Various attacks like DOS, DDOS, Malware Injection attack, Man-In-The-Middle attacks are possible. This paper discusses various Mining attacks that are possible on a Cloud and provides a solution by using a Secure Distributed approach. We use WEKA to predict the patterns in a single cloud and by using Cloud Data Distributor with a secure distributed approach we provide an effective solution that prevents such mining attacks on Cloud thus making the Cloud a secure platform for service and storage.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133752705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Re-ranking for personalization using concept hierarchy in DL environment 在深度学习环境中使用概念层次结构进行个性化重新排序
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710489
M. Potey, S. Pawar, P. K. Sinha
{"title":"Re-ranking for personalization using concept hierarchy in DL environment","authors":"M. Potey, S. Pawar, P. K. Sinha","doi":"10.1109/ICACT.2013.6710489","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710489","url":null,"abstract":"In Digital Library (DL) system, users interact with the system to search for books or research papers. Users can search through metadata or search for information in the pages by querying using keywords. In both cases, a huge amount of results are returned; however, the relevant ones to the user are not often amongst the top few. Re-ranking of the search results based on the user's interest has received wide attention in information retrieval. This work presents extending conventional search engine to searching digital library data of user's interests. The proposed system improve information access by building knowledge about a user, acquired using the user's interaction with the system, in order to customize information access. User profiling is done using a hybrid approach by taking into consideration login details and click-through data. This system mapping framework automatically maps Dmoz Open Directory Project (ODP) topics to users' interests and takes advantage of manually edited data available in ODP, to categorize and personalize search results, according to user interests. Reranking of the results is done based on user interests. This makes it easy to find relevant DL pages faster than normal search engines. Performance has been evaluated for online DL systems. System's performance improves by 16.55% if the average per query is calculated and approximately 10% if per user average is calculated over baseline (Google CSE) after re-ranking.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129073324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sahastradhara: Biometric and EToken integrated secure email system Sahastradhara:生物识别和电子令牌集成安全电子邮件系统
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710516
R. Shukla, H. Prakash, R. Bhushan, S. Venkataraman, G. Varadan
{"title":"Sahastradhara: Biometric and EToken integrated secure email system","authors":"R. Shukla, H. Prakash, R. Bhushan, S. Venkataraman, G. Varadan","doi":"10.1109/ICACT.2013.6710516","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710516","url":null,"abstract":"E-mail Security has been a growing concern over the past few years. The average individual, who uses e-mail naively believes that their e-mail is private and secure. The electronic world is filled with snoopers who can access all types of data over the network. As the world goes digital, with more and more raw information about individuals available electronically, the need for security increases. Ubiquity and speed of email have made it increasingly effective. So providing reliance over this medium has become an inevitable requirement. The emails of today are secured by encrypting the content on an external medium and sending this as an attachment over the mail. The current trend increases the size of the mail and makes it inconvenient for the user. There are other systems that provide specific security and are strongly tied to the mail servers and browsers.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131450855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信