{"title":"Attribute based classification and annotation of unstructured data in social networks","authors":"P. Pabitha, A. M. Tino","doi":"10.1109/ICOAC.2014.7229726","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229726","url":null,"abstract":"Classification and annotation are two different and independent problems in social networks, but rarely considered together. Intuitively, annotations give evidence for the class label, which is used for classification and the class label gives evidence for annotations. Classification of unstructured data with annotation is complicated because of the low quality of the data and the rapid development of the social networks. Vast volumes of unstructured data are uploaded and shared in social networks, but only few of them are correctly annotated. This creates huge demand for automatic classification and annotation technique. The aim of the paper is to study attribute based learning for classification and annotation of the unstructured data. The work focuses on attribute based learning which is used to extract the features and to predict the attributes of the unstructured data. The method generates high level description that is phrased in terms of attributes which is used for the identification of unstructured data and this will improve annotation technique.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"2 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131346890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probabilistic approach for Intrusion Detection System - FOMC technique","authors":"A. S. Aneetha, S. Bose","doi":"10.1109/ICOAC.2014.7229705","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229705","url":null,"abstract":"Detection of unexpected and emerging new threats has become a necessity for secured internet communication with absolute data confidentiality, integrity, and availability. Design and development of such a detection system shall not only be new, accurate and fast but also effective in a dynamic environment encompassing the surrounding network. In this work, an attempt is made to design an intrusion detection model based on the probabilistic approach, first-order Markov chain process, to effectively detection and predict network intrusions. As a first step, the states are defined using clustering techniques for the network traffic profiles; secondly state transition probability matrix and initial probability distribution are determined based on the states defined. Based on the network states, the probability of event occurrence is stochastically measured if the value is lesser than the predefined probability then it event is predicted as anomaly. The proposed probabilistic model performance is evaluated through experiments using KDD Cup99 dataset. The proposed models achieve better detection rate while the attacks are detected in levels of stages.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116333056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A resource allocation based multi - Cloud providers for VoD applications","authors":"S. Sankar, M. Sumalatha","doi":"10.1109/ICOAC.2014.7229732","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229732","url":null,"abstract":"Video streaming application has become one of the most familiar applications in the internet. Cloud computing offers an elastic infrastructure that Cloud Management Agents can use to obtain streaming resources that match the demand. Multi cloud providers support different platforms and offer constantly changing packages of capabilities. A problem is to decide on both the correct quantity of resources reserved in the cloud & their reservation time such that the quality of service on the Cloud Management Agent is not get affected. We suggest a method to implement MBRA algorithm for resource reservation that maximally exploits discounted rates offered in tariffs, while ensuring that sufficient resources are reserved in the cloud. MBRA algorithm is designed to reduce the risk of making wrong resource allocation decisions and its depends on the prediction of demand for streaming capacity. A managed cloud provider that supports financial controls across multiple cloud providers can help to maintain quality of service and service level agreement.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129299797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel intonation model to improve the quality of tamil text-to-speech synthesis system","authors":"K. Rajeswari, P. Umamaheswari","doi":"10.1109/ICOAC.2014.7229737","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229737","url":null,"abstract":"The global growth of Information and Communication technologies has a greater impact towards the research focus on speech technologies. Especially visually impaired people, vocally challenged people can utilize speech technology enabled devices as it helps them as a lifeline. In the broad sense, Speech technology has two major applications, speech synthesis and speech recognition. Speech synthesis is a popular technique to produce synthetic speech given the input text, whereas speech recognition is the technique that understands human speech and can produce either text or speech as output.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129708991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Setting up an energy measurable application bed of Wireless Sensor Network for the improved energy economics","authors":"M. Thangaraj, S. Anuradha","doi":"10.1109/ICOAC.2014.7229755","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229755","url":null,"abstract":"The Energy Engineering study and Energy Optimization initiatives have shown significant growth in the field of Wireless Sensor Network (WSN). But while setting up the WSN application bed the application specific Quality of Service parameters are considered in greater account, whereas the energy relevant parameters of activity and processes are ignored. Later hardware, topology, application and algorithmic components and embedded codings are adjusted for energy monitoring and energy improvements. None of energy improvement initiatives validate whether the energy correction improves the overall network energy, rather they focus on the one aspect of the energy improvement. Very rarely the economics involved in the energy correction and economics of optimized energy are validated. Most of the time it became the overhead for the person who sets up the application bed as hardware, embedded coding, instrument driver, application coding vendors least bother about the energy aspect. This paper is going to propose the design, deployment aspects at various stages of the Wireless Sensor Network for energy monitoring and improvement initiatives as well highlight the various market available vendor products with its lacking aspect of energy.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125850393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on data deduplication techniques for optimized storage","authors":"E. Manogar, S. Abirami","doi":"10.1109/ICOAC.2014.7229702","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229702","url":null,"abstract":"In recent years, the explosion of the data such as text, image, audio, video, data centers and backup data lead to a lot of problem in both storage and retrieval process. The enterprises invest lot of money for storing the data. Hence, an efficient technique is needed for handling the enormous data. There are two existing techniques for eliminating the redundant data in the storage system such as data deduplication and data reduction. Data deduplication is one of the best technique which eliminates redundant data, reduces the bandwidth and also minimizes the disk usage and cost. Various research papers have been studied from the literature, as the result, this paper attempts to summarize various storage optimization techniques, concepts and categories using data deduplication. In addition to this, chunk based data deduplication techniques are surveyed in detail.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130183847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research challenges in multimedia & cloud computing","authors":"P. Anandhakumar","doi":"10.1109/ICOAC.2014.7229767","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229767","url":null,"abstract":"These keynote speeches discuss the following: Research challenges in multimedia & cloud computing; Latest trends and technologies in JAVA; Challenges & issues in V-learning; and Recent trends in digital era.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127530072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of UWB pulse generator for short range applications","authors":"S. Sheeba, N. Revathy, C. Gomathy","doi":"10.1109/ICOAC.2014.7229759","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229759","url":null,"abstract":"This paper presents the design of ultra wideband (UWB) pulse generators, and the performance metrics are analyzed. Two configurations of pulse generators for UWB transmit only system is presented for short range applications. These pulse generators are designed to cope with the requirements of the low power IEEE 802.15 standard wireless body area network (WBAN) technology. It uses a short pulse width of UWB pulses to achieve low power consumption without multipath fading and interference. It provides interoperability with other narrowband technologies. The first configuration consists of tunable pulse generator, which consumes power of about 5.4 μW. In the next configuration, the resistive sensing pulse generator controls the voltage in a voltage control ring oscillator (VCRO), and it consumes power of 0.15 μW, at a frequency of 45 MHZ. The simulation results obtained show that the performances of these UWB pulse generators satisfies the required FCC constraints.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"11 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132456302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting various SQL Injection vulnerabilities using String Matching and LCS method","authors":"V. Anitha, A. Lakshmi, M. Revathi, K. Selvi","doi":"10.1109/ICOAC.2014.7229717","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229717","url":null,"abstract":"Nowadays a lot of people are using the internet for sharing their personal and business information where there may be a chance for intruder to access the information. Hence, there is a need to take proper attention to overcome the vulnerabilities in the web pages. SQLI (SQL Injection) is a commonly occurring vulnerability where the intruder tries to access the back end (database) using SQL Query. Lot of research work has been done so far in order to prevent SQLI but still the problem remains as a challenge. Since, most of the technique will try to fix the problem in one perspective but in the other end there will be a huge flaw too. Hence, we require a proper system to detect the SQLI completely. Here, we are presenting a system which detects all type of SQLI vulnerabilities after elaborately reviewing the existing methods. Experimental result shows that our proposed system detects all type of SQLI vulnerability when compared with the existing techniques.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130504717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring gender based influencers using Social Network Analysis","authors":"Sounthar Manickavasagam, B. V. Sundaram","doi":"10.1109/ICOAC.2014.7229715","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229715","url":null,"abstract":"The social network is dominating the society with interactive collaboration and social interactions. It is very common now to share, post, like and comment on various topic of interest. These interactions has given space for research to explore the social relationships among online users. Predicting the influencers in social network can help us to control the flow of information in them. The objective of this research work is to analyze the likes in Facebook users cover photos to identify the influencers and their gender. Using clustering coefficient, degree analysis and triadic census we were able to identify the influencers and found that men are strong influencers in the network.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"312-315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130861201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}