2014 Sixth International Conference on Advanced Computing (ICoAC)最新文献

筛选
英文 中文
Attribute based classification and annotation of unstructured data in social networks 基于属性的社交网络非结构化数据分类与标注
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229726
P. Pabitha, A. M. Tino
{"title":"Attribute based classification and annotation of unstructured data in social networks","authors":"P. Pabitha, A. M. Tino","doi":"10.1109/ICOAC.2014.7229726","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229726","url":null,"abstract":"Classification and annotation are two different and independent problems in social networks, but rarely considered together. Intuitively, annotations give evidence for the class label, which is used for classification and the class label gives evidence for annotations. Classification of unstructured data with annotation is complicated because of the low quality of the data and the rapid development of the social networks. Vast volumes of unstructured data are uploaded and shared in social networks, but only few of them are correctly annotated. This creates huge demand for automatic classification and annotation technique. The aim of the paper is to study attribute based learning for classification and annotation of the unstructured data. The work focuses on attribute based learning which is used to extract the features and to predict the attributes of the unstructured data. The method generates high level description that is phrased in terms of attributes which is used for the identification of unstructured data and this will improve annotation technique.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"2 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131346890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Probabilistic approach for Intrusion Detection System - FOMC technique 入侵检测系统的概率方法- FOMC技术
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229705
A. S. Aneetha, S. Bose
{"title":"Probabilistic approach for Intrusion Detection System - FOMC technique","authors":"A. S. Aneetha, S. Bose","doi":"10.1109/ICOAC.2014.7229705","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229705","url":null,"abstract":"Detection of unexpected and emerging new threats has become a necessity for secured internet communication with absolute data confidentiality, integrity, and availability. Design and development of such a detection system shall not only be new, accurate and fast but also effective in a dynamic environment encompassing the surrounding network. In this work, an attempt is made to design an intrusion detection model based on the probabilistic approach, first-order Markov chain process, to effectively detection and predict network intrusions. As a first step, the states are defined using clustering techniques for the network traffic profiles; secondly state transition probability matrix and initial probability distribution are determined based on the states defined. Based on the network states, the probability of event occurrence is stochastically measured if the value is lesser than the predefined probability then it event is predicted as anomaly. The proposed probabilistic model performance is evaluated through experiments using KDD Cup99 dataset. The proposed models achieve better detection rate while the attacks are detected in levels of stages.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116333056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A resource allocation based multi - Cloud providers for VoD applications 一种基于多云提供商的资源分配的视频点播应用
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229732
S. Sankar, M. Sumalatha
{"title":"A resource allocation based multi - Cloud providers for VoD applications","authors":"S. Sankar, M. Sumalatha","doi":"10.1109/ICOAC.2014.7229732","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229732","url":null,"abstract":"Video streaming application has become one of the most familiar applications in the internet. Cloud computing offers an elastic infrastructure that Cloud Management Agents can use to obtain streaming resources that match the demand. Multi cloud providers support different platforms and offer constantly changing packages of capabilities. A problem is to decide on both the correct quantity of resources reserved in the cloud & their reservation time such that the quality of service on the Cloud Management Agent is not get affected. We suggest a method to implement MBRA algorithm for resource reservation that maximally exploits discounted rates offered in tariffs, while ensuring that sufficient resources are reserved in the cloud. MBRA algorithm is designed to reduce the risk of making wrong resource allocation decisions and its depends on the prediction of demand for streaming capacity. A managed cloud provider that supports financial controls across multiple cloud providers can help to maintain quality of service and service level agreement.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129299797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel intonation model to improve the quality of tamil text-to-speech synthesis system 一种提高泰米尔语文本-语音合成系统质量的语调模型
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229737
K. Rajeswari, P. Umamaheswari
{"title":"A novel intonation model to improve the quality of tamil text-to-speech synthesis system","authors":"K. Rajeswari, P. Umamaheswari","doi":"10.1109/ICOAC.2014.7229737","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229737","url":null,"abstract":"The global growth of Information and Communication technologies has a greater impact towards the research focus on speech technologies. Especially visually impaired people, vocally challenged people can utilize speech technology enabled devices as it helps them as a lifeline. In the broad sense, Speech technology has two major applications, speech synthesis and speech recognition. Speech synthesis is a popular technique to produce synthetic speech given the input text, whereas speech recognition is the technique that understands human speech and can produce either text or speech as output.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129708991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Setting up an energy measurable application bed of Wireless Sensor Network for the improved energy economics 为提高能源经济性,搭建了无线传感器网络能源测量应用平台
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229755
M. Thangaraj, S. Anuradha
{"title":"Setting up an energy measurable application bed of Wireless Sensor Network for the improved energy economics","authors":"M. Thangaraj, S. Anuradha","doi":"10.1109/ICOAC.2014.7229755","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229755","url":null,"abstract":"The Energy Engineering study and Energy Optimization initiatives have shown significant growth in the field of Wireless Sensor Network (WSN). But while setting up the WSN application bed the application specific Quality of Service parameters are considered in greater account, whereas the energy relevant parameters of activity and processes are ignored. Later hardware, topology, application and algorithmic components and embedded codings are adjusted for energy monitoring and energy improvements. None of energy improvement initiatives validate whether the energy correction improves the overall network energy, rather they focus on the one aspect of the energy improvement. Very rarely the economics involved in the energy correction and economics of optimized energy are validated. Most of the time it became the overhead for the person who sets up the application bed as hardware, embedded coding, instrument driver, application coding vendors least bother about the energy aspect. This paper is going to propose the design, deployment aspects at various stages of the Wireless Sensor Network for energy monitoring and improvement initiatives as well highlight the various market available vendor products with its lacking aspect of energy.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125850393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A study on data deduplication techniques for optimized storage 优化存储的重复数据删除技术研究
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229702
E. Manogar, S. Abirami
{"title":"A study on data deduplication techniques for optimized storage","authors":"E. Manogar, S. Abirami","doi":"10.1109/ICOAC.2014.7229702","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229702","url":null,"abstract":"In recent years, the explosion of the data such as text, image, audio, video, data centers and backup data lead to a lot of problem in both storage and retrieval process. The enterprises invest lot of money for storing the data. Hence, an efficient technique is needed for handling the enormous data. There are two existing techniques for eliminating the redundant data in the storage system such as data deduplication and data reduction. Data deduplication is one of the best technique which eliminates redundant data, reduces the bandwidth and also minimizes the disk usage and cost. Various research papers have been studied from the literature, as the result, this paper attempts to summarize various storage optimization techniques, concepts and categories using data deduplication. In addition to this, chunk based data deduplication techniques are surveyed in detail.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130183847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Research challenges in multimedia & cloud computing 多媒体和云计算的研究挑战
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229767
P. Anandhakumar
{"title":"Research challenges in multimedia & cloud computing","authors":"P. Anandhakumar","doi":"10.1109/ICOAC.2014.7229767","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229767","url":null,"abstract":"These keynote speeches discuss the following: Research challenges in multimedia & cloud computing; Latest trends and technologies in JAVA; Challenges & issues in V-learning; and Recent trends in digital era.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127530072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of UWB pulse generator for short range applications 短距离应用超宽带脉冲发生器分析
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229759
S. Sheeba, N. Revathy, C. Gomathy
{"title":"Analysis of UWB pulse generator for short range applications","authors":"S. Sheeba, N. Revathy, C. Gomathy","doi":"10.1109/ICOAC.2014.7229759","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229759","url":null,"abstract":"This paper presents the design of ultra wideband (UWB) pulse generators, and the performance metrics are analyzed. Two configurations of pulse generators for UWB transmit only system is presented for short range applications. These pulse generators are designed to cope with the requirements of the low power IEEE 802.15 standard wireless body area network (WBAN) technology. It uses a short pulse width of UWB pulses to achieve low power consumption without multipath fading and interference. It provides interoperability with other narrowband technologies. The first configuration consists of tunable pulse generator, which consumes power of about 5.4 μW. In the next configuration, the resistive sensing pulse generator controls the voltage in a voltage control ring oscillator (VCRO), and it consumes power of 0.15 μW, at a frequency of 45 MHZ. The simulation results obtained show that the performances of these UWB pulse generators satisfies the required FCC constraints.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"11 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132456302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting various SQL Injection vulnerabilities using String Matching and LCS method 使用字符串匹配和LCS方法检测各种SQL注入漏洞
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229717
V. Anitha, A. Lakshmi, M. Revathi, K. Selvi
{"title":"Detecting various SQL Injection vulnerabilities using String Matching and LCS method","authors":"V. Anitha, A. Lakshmi, M. Revathi, K. Selvi","doi":"10.1109/ICOAC.2014.7229717","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229717","url":null,"abstract":"Nowadays a lot of people are using the internet for sharing their personal and business information where there may be a chance for intruder to access the information. Hence, there is a need to take proper attention to overcome the vulnerabilities in the web pages. SQLI (SQL Injection) is a commonly occurring vulnerability where the intruder tries to access the back end (database) using SQL Query. Lot of research work has been done so far in order to prevent SQLI but still the problem remains as a challenge. Since, most of the technique will try to fix the problem in one perspective but in the other end there will be a huge flaw too. Hence, we require a proper system to detect the SQLI completely. Here, we are presenting a system which detects all type of SQLI vulnerabilities after elaborately reviewing the existing methods. Experimental result shows that our proposed system detects all type of SQLI vulnerability when compared with the existing techniques.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130504717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Exploring gender based influencers using Social Network Analysis 使用社会网络分析探索基于性别的影响者
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229715
Sounthar Manickavasagam, B. V. Sundaram
{"title":"Exploring gender based influencers using Social Network Analysis","authors":"Sounthar Manickavasagam, B. V. Sundaram","doi":"10.1109/ICOAC.2014.7229715","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229715","url":null,"abstract":"The social network is dominating the society with interactive collaboration and social interactions. It is very common now to share, post, like and comment on various topic of interest. These interactions has given space for research to explore the social relationships among online users. Predicting the influencers in social network can help us to control the flow of information in them. The objective of this research work is to analyze the likes in Facebook users cover photos to identify the influencers and their gender. Using clustering coefficient, degree analysis and triadic census we were able to identify the influencers and found that men are strong influencers in the network.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"312-315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130861201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信