{"title":"Classification of gold bangles based on tamura texture features","authors":"S. Pallavi, S. M. Roomi, V. Chellaprabu","doi":"10.1109/ICOAC.2014.7229756","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229756","url":null,"abstract":"Mortgaging gold for money in the bank is common in India. Banks rely on assessor's skills to test the purity of gold, its weight and provide a description of the items. The absence of skilled assessor makes the loan granting process tedious and time consuming when the quantum of gold items is mortgaged. This paper provides an image processing solution to automatically provide a description of the mortgage of gold bangle that would become a handy note for borrowers as well. This work classifies the gold bangles by circularity and texture features. The proposed work is oriented towards classifying the bangle into different classes as plain bangle, Stone bangle and kada bangle using SVM classifier. Its accuracy is obtained as 86.66% and KNN classifier is used for comparison.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122624474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for preserving data security in hybrid cloud environment using trusted multiple cloud service providers","authors":"K. Vijayanand, T. Mala","doi":"10.1109/ICOAC.2014.7229710","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229710","url":null,"abstract":"Cloud computing is widely accepted nowadays by the industry as well as academic people as a new generation computing paradigm. Cloud computing has become popular because of its characteristic features like on-demand self-service, ubiquitous network access, resource pooling, rapid elasticity, metered service, etc. But, security challenges are still among the biggest obstacles when considering the adoption of cloud services. Most of the cases, it is seen that the merits of the could computing itself are the root causes of the security issues, and hence it is becoming difficult to tackle. Thus, lots of research activities are happening in the area of cloud computing to make cloud a secure place to keep your sensitive or critical data. This paper proposes a framework for preserving data security in a hybrid cloud environment using trusted multiple cloud service providers. A multi-cloud architecture is used to secure the data of the cloud customer, and the framework uses the trust factor for a dynamic and safe selection of the service providers.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116612941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective integrated parallel distributed processing approach in optimized multi-cloud computing environment","authors":"K. Indira, M. Kavithadevi","doi":"10.1109/ICOAC.2014.7229718","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229718","url":null,"abstract":"Cloud computing service make possible applications by given that visualized resources that can be energetically allocated to virtual clusters. Nowadays IT companies and business companies make use of cloud environment for virtual storage and managing users. The job organization is the input position in cloud service and job arrangement troubles is vital competence of the whole cloud services. Job arrangement mechanism is the range of appropriate property for job implementation. A job arrangement has to make happy for virtual users to decide about Quality of Service. In this paper, the proposed method is used to enhance job arrangement and resource allotment by minimizing make span and reducing source price and safeguard error acceptance and quality service. The proposed algorithms have been evaluated with existing scheduling policies through CloudSim toolkit. The experimental results show that proposed framework gives better results in terms of execution time, user response, execution cost and time on different cloud workloads as compared to existing algorithms.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"62 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128486006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance study of classification techniques for phishing URL detection","authors":"Pradeepthi K, K. A","doi":"10.1109/ICOAC.2014.7229761","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229761","url":null,"abstract":"In the constantly evolving World Wide Web environment, the end-users are subjected to many threats. Phishing is the most relentless of all the attacks. Detection of phishing URLs from genuine ones is a paramount task to minimize the financial loss incurred. By applying pattern recognition capabilities of machine learning to phishing detection domain, we can achieve significant performance improvements. This paper provides a survey of research works conducted on classification techniques by various researchers for phishing URL detection. The experiments were performed using 4,500 URLs and several classification algorithms. The observed results showed that tree-based classifiers provide maximum accuracy.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"18 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133107010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"About department of computer technology","authors":"","doi":"10.1109/icoac.2014.7229769","DOIUrl":"https://doi.org/10.1109/icoac.2014.7229769","url":null,"abstract":"The Department of Computer Technology at the MIT Campus (sponsored by DST-FIST), Chennai was bifurcated from the Department of Information Technology in the year of 2010, with a view to promote the pursuit of excellence in the field Computer Science and Engineering.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125677817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICoAC 2014 (Sixth International Conference on Advanced Computing)","authors":"","doi":"10.1109/icoac.2014.7229770","DOIUrl":"https://doi.org/10.1109/icoac.2014.7229770","url":null,"abstract":"ICoAC 2014 (Sixth International Conference on Advanced Computing) seeks to bring together international researchers to present papers and generate discussions on current research and development in latest trends in computing. The conference will feature a range of presentations on latest research as well as stimulating talks and keynote addresses. Theme of the conference is Multimedia, Cloud Computing and Virtual Learning. ICoAC 2014 is an international conference in the field of Computer Science and Communication, focusing to address issues and developments in advanced computing. It is hosted by Department of Computer Technology annually during December. The First, Second, Third, Fourth and Fifth editions of ICoAC have been held during 13–15 December 2009, 14–16 December 2010, 14–16 December 2011, 13–15 December 2012 and 18–20 December 2013. Information Society is facing challenges due to the complexity of its structure in terms of networking, middleware, peer to peer applications, ubiquitous computing, pervasive computing with diverse usage in commercial, personal, communal and public domains, posing various critical issues to be addressed and solved. This conference is technically co-sponsored by IEEE Madras Section.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115443064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}