2014 Sixth International Conference on Advanced Computing (ICoAC)最新文献

筛选
英文 中文
NFC based automation system for Tea plantation sector 基于NFC的茶叶种植业自动化系统
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229762
T. Bojan, Umamaheswaran Raman Kumar, Viswanathan Manihatty Bojan
{"title":"NFC based automation system for Tea plantation sector","authors":"T. Bojan, Umamaheswaran Raman Kumar, Viswanathan Manihatty Bojan","doi":"10.1109/ICOAC.2014.7229762","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229762","url":null,"abstract":"Recent advances in technology are making huge impact in all spheres of societies. In particular fields like entertainment, education, automobile, and telecommunication are receiving significant attention due to commercial aspects. There has been little interest towards technology deployment in the agriculture sector and the sector is desperately in need of it. In this paper, we have developed a new approach of deploying Near Field Communication (NFC) technology for Tea industries and study its applications.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128542443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic resource allocation with efficient power utilization in Cloud 云环境下高效的动态资源分配
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229730
S. Selvi, C. Valliyammai
{"title":"Dynamic resource allocation with efficient power utilization in Cloud","authors":"S. Selvi, C. Valliyammai","doi":"10.1109/ICOAC.2014.7229730","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229730","url":null,"abstract":"In the Cloud, the most challenging task is to allocate resources for jobs. The major objective is to allocate resources to various tasks by reducing the CPU utilization of physical machines in the cloud. The various multi-agents look after the incoming jobs, schedules the jobs to various host machines, dynamically allocates jobs or tasks in other machines in order to reduce CPU power. VM migration is done through swapper agent when a host CPU utilization rises over the threshold value and if other hosts are working in less CPU power. So the agents can be used to migrate VMs from one node to another in run time, so that it can be stabilized and CPU utilization can be reduced. To increase the efficiency during allocation of virtual machine for jobs, a threshold based best fit algorithm is proposed to sort the VMs in the increasing order of CPU utilization. The power utilization is based on the number of hosts working at a certain period and the proposed strategy is used to reduce the power to improve the resource utilization in Cloud.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132158579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimization of reconfigurable DAB/DAB+ architecture using maximum likelihood path decoding 基于最大似然路径解码的可重构DAB/DAB+架构优化
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229754
G. Priya, P. Bharathi
{"title":"Optimization of reconfigurable DAB/DAB+ architecture using maximum likelihood path decoding","authors":"G. Priya, P. Bharathi","doi":"10.1109/ICOAC.2014.7229754","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229754","url":null,"abstract":"The broadcasting radio stations in several countries has benefitted by the usage of Digital Audio Broadcasting (DAB) technology, which replaces the usage of AM and FM broadcast services. An improved version of the Digital Audio Broadcasting technology is the DAB+ technology. These comprise of a transmitter and receiver systems for the transmission of the audio signal in the form of digital radio technology. In this paper, to achieve errorless audio signal the maximum likelihood Viterbi decoder in DAB/DAB+ is designed. The analysis has been carried out along with simulation studies under ModelSim Altera 6.4a that resulted in power and area efficient architecture. In order to show the efficiency of reliable DAB/DAB+ systems, the signal to noise ratio has been tabulated and executed with MATLAB Simulink tool.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117011718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic food recognition system for diabetic patients 糖尿病患者食物自动识别系统
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229735
P. Velvizhy, Pavithra, A. Kannan
{"title":"Automatic food recognition system for diabetic patients","authors":"P. Velvizhy, Pavithra, A. Kannan","doi":"10.1109/ICOAC.2014.7229735","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229735","url":null,"abstract":"There is good evidence that eating a healthy diet can reduce your risk of obesity and illnesses such as diabetes, heart disease, stroke, osteoporosis and some types of cancer. The food you eat contains different types of nutrients, which are all required for the many vital processes in our body. Our approach is to capture food and fed to Dense SIFT method, this method extract keypoint and visual vector from an image. Extracted visual vector are clustered using K-means clustering technique. Finally support vector machine classifier is used in this work, classifies the food image and measures the carbohydrate level from food image. Our proposed system is based on Bag of Feature (BoF) model.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124573453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Qualitative risk avoidance methodology for categorization of mined opinions from online reviews 定性风险规避方法的分类挖掘意见从网上评论
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229703
B. Dhanalakshmi, A. Chandrasekar
{"title":"Qualitative risk avoidance methodology for categorization of mined opinions from online reviews","authors":"B. Dhanalakshmi, A. Chandrasekar","doi":"10.1109/ICOAC.2014.7229703","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229703","url":null,"abstract":"The rapid development of the Internet has spectacularly changed the mode that people articulate their opinions. Nowadays, people can liberally send reviews on any aspect of various websites to convey their individual opinions. As the opinions communicate the subjective thoughts, estimation, and conjectures of people in natural language, this type of contents contributed by internet users have been well acknowledged as valuable information. It can be oppressed to evaluate public reviews on a specific topic or product in order to classify out user like or dislike, etc. Opinion blend and mining are the methods to explore and summarize opinions from reviews in order to understand public perception on a specific topic or an entity. The intend of this paper is to determine opinions from online reviews and managing risk in future. Our projected methodology involves phases such as Data preprocessing, Content discovery, review mining and Risk investigation. Initially the formless data from the websites is extracted and preprocessed. This stage is used for formatting the fact before sentiment classification and mining. Finally, managing risk by using a qualitative risk assessment methodology for categorizing opinions from online reviews is done.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129148531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on security over data outsourcing 数据外包的安全性调查
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229738
M. Thangavel, P. Varalakshmi
{"title":"A survey on security over data outsourcing","authors":"M. Thangavel, P. Varalakshmi","doi":"10.1109/ICOAC.2014.7229738","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229738","url":null,"abstract":"Today's world business depends on outsourcing the computing and storage. Lack of Security on Data Outsourcing is an important issue and becomes one of the wider areas in the Information science research field. The major challenges of outsourcing the data over un-trusted parties are providing confidentiality, maintaining integrity, Access control of multi- owners data, and user revocation of shared data. This paper addresses the analysis of security over data outsourcing on different concerns like Attribute based encryption (ABE), Key management, Anonymous authentication, User revocation and Access control. ABE is one type of a public key cryptosystem which has its more attraction for encrypting data, user revocation issues and access control particularly in case of data outsourcing. Securing and Managing the keys is as important as securing the data. Anonymous authentication is essential for the special cases where the user may wish to store sensitive data without revealing their identity. This paper surveyed all the different types of techniques used to enhance the security of outsourced data.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133972263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Defense against DoS attack: PSO approach in virtualization 防御DoS攻击:虚拟化中的PSO方法
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229709
S. Mercyshalinie, G. Madhupriya, S. Vairamani, S. Velayutham
{"title":"Defense against DoS attack: PSO approach in virtualization","authors":"S. Mercyshalinie, G. Madhupriya, S. Vairamani, S. Velayutham","doi":"10.1109/ICOAC.2014.7229709","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229709","url":null,"abstract":"Cloud Computing is a catchword in today's IT industry that nobody can escape. The technology offers reduced IT costs and provides on demand services to individual users as well as organizations over the internet. Cloud computing delivery its services through three different service models like Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). One of the important service is IaaS. IaaS provides infrastructure including software, hardware, storage space, network bandwidth to users on demand over the internet. Cloud computing relies upon virtualization to provide services. Physical characteristics of resources are hide from end users by virtualization. Cloud environment faces threats from confidentiality, integrity, and availability (CIA). But availability considered as one of the most important threat in cloud environment. The vulnerability of Denial of Service (DoS) attack can affect the availability of cloud. One form of the DoS attack is Transmission Control Protocol (TCP)-SYN flood attack. TCP SYN flood attack is an attempt to make a machine or networked resource unavailable to its intended users. The actual users of cloud can't use the resources. It is necessary to identify the exact position when TCP-SYN flood starts. Therefore the proposed framework uses the Particle Swarm Optimization (PSO) algorithm to identify the optimized position of SYN flood attack in the traffic flow.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134137688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detecting malicious nodes in MANET using rateless codes for maximum content distribution 使用无速率码检测MANET中的恶意节点以获得最大的内容分发
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229731
N. Suganthi, S. Neelavathy Pari
{"title":"Detecting malicious nodes in MANET using rateless codes for maximum content distribution","authors":"N. Suganthi, S. Neelavathy Pari","doi":"10.1109/ICOAC.2014.7229731","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229731","url":null,"abstract":"A mobile ad hoc network is a self-organizing infrastructure less network in which collection of mobile nodes are connected by wireless. Security is a major concern in real time mobile environment to provide secured communication. Major problem in wireless network security is data integrity. Existing cryptographic techniques protects the data which can easily be forged by the adversaries. In this paper the pollution attack that modifies the data packet which is easy to launch bogus data inside the network and significantly reduces the network performance. Rateless codes technique is used to encode and decode the data packets, to maintain the integrity of original data. Rateless codes are class of linear error correcting codes and create unlimited number of symbols. The proposed system determines the pollution attack using belief propagation inference technique in order to prevent fake data packets propagate throughout the network. Belief propagation is an iterative process to pass and update the messages until convergence among neighboring variables that allows acting inference on graphical models such as markov random fields, factor graph etc. It is also used to determine the marginal probabilities of all the variables and these estimated marginal probabilities are called as beliefs. The proposed work has been simulated using ns2.35 to evaluate the performance against honest and malicious mobile nodes.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129348527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DDoS detection and analysis in SDN-based environment using support vector machine classifier 支持向量机分类器在sdn环境下的DDoS检测与分析
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229711
R. Kokila, S. Thamarai Selvi, K. Govindarajan
{"title":"DDoS detection and analysis in SDN-based environment using support vector machine classifier","authors":"R. Kokila, S. Thamarai Selvi, K. Govindarajan","doi":"10.1109/ICOAC.2014.7229711","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229711","url":null,"abstract":"Software Defined Networking (SDN) provides separation of data plane and control plane. The controller has centralized control of the entire network. SDN offers the ability to program the network and allows dynamic creation of flow policies. The controller is vulnerable to Distributed Denial of Service (DDoS) attacks that leads to resource exhaustion which causes non-reachability of services given by the controller. The detection of DDoS requires adaptive and accurate classifier that does decision making from uncertain information. It is critical to detect the attack in the controller at earlier stage. SVM is widely used classifier with high accuracy and less false positive rate. We analyze the SVM classifier and compare it with other classifiers for DDoS detection. The experiments show that SVM performs accurate classification than others.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125662667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 159
QEER: QoS aware Energy Efficient Routing protocol for Wireless Sensor Networks 面向无线传感器网络的QoS感知节能路由协议
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229745
R. Logambigai, A. Kannan
{"title":"QEER: QoS aware Energy Efficient Routing protocol for Wireless Sensor Networks","authors":"R. Logambigai, A. Kannan","doi":"10.1109/ICOAC.2014.7229745","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229745","url":null,"abstract":"In a high density Wireless Sensor Network (WSN), the nearby sensor nodes detect the data duplication when sensing an event. Due to the limited power in sensor nodes, the efficient use of power is essential in order to prolong the network lifetime. Thus, it is necessary to lessen the amount of data that is sent to the sink. In this work, we propose an efficient routing technique called Quality of Service (QoS) aware Energy Efficient Routing protocol for WSNs. Two QoS metrics namely hop count and energy are used in this work. In this technique, a group of nodes forms a Cluster and the cluster heads are only allowed to perform routing. This reduces the energy consumption through aggregating the data by the Coordinator in the cluster. The results of the simulation show that this protocol work performs better than the other algorithms on routing based on QoS.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133436062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信