2015 International Conference on Computing Communication Control and Automation最新文献

筛选
英文 中文
Component-Based Software System Test Case Prioritization with Genetic Algorithm Decoding Technique Using Java Platform 基于Java平台的基于遗传算法解码技术的组件化软件系统测试用例排序
2015 International Conference on Computing Communication Control and Automation Pub Date : 2015-02-26 DOI: 10.1109/ICCUBEA.2015.169
S. Mahajan, S. Joshi, V. Khanaa
{"title":"Component-Based Software System Test Case Prioritization with Genetic Algorithm Decoding Technique Using Java Platform","authors":"S. Mahajan, S. Joshi, V. Khanaa","doi":"10.1109/ICCUBEA.2015.169","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2015.169","url":null,"abstract":"Test case prioritization includes testing experiments in a request that builds the viability in accomplishing some execution objectives. The importance amongst the most imperative testing objectives is the fast rate of fault recognition. Test case ought to run in a request that extends the likelihood of fault discovery furthermore that detects the most serious issues at the early stage of testing life cycle. In this paper, we develop and prove the necessity of Component-Based Software testing prioritization framework which plans to uncover more extreme bugs at an early stage and to enhance software product deliverable quality utilizing Genetic Algorithm (GA) with java decoding technique. For this, we propose a set of prioritization keys to plan the proposed Component-Based Software java framework. In our proposed method, we allude to these keys as Prioritization Keys (PK). These keys may be project size, scope of the code, information stream, and bug inclination and impact of fault or bug on overall system, which prioritizes the Component-Based Software framework testing. The integrity of these keys was measured with implementation of key assessment metric called KAM that will likewise be ascertained. This paper demonstrates how software testing can be efficient with management of data integrity factor to avoid major security issues. One of the main advantages of our approach is that domain specific semantics can be integrated with the data quality test cases prioritization, thus being able to discover test feed data quality problems beyond conventional quality measures.","PeriodicalId":325841,"journal":{"name":"2015 International Conference on Computing Communication Control and Automation","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126457180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
FPGA Based Implementation of Power Optimization of 32 Bit RISC Core Using DLX Architecture 基于FPGA的32位RISC内核DLX架构功耗优化实现
2015 International Conference on Computing Communication Control and Automation Pub Date : 2015-02-26 DOI: 10.1109/ICCUBEA.2015.191
S. Murthy, U. Verma
{"title":"FPGA Based Implementation of Power Optimization of 32 Bit RISC Core Using DLX Architecture","authors":"S. Murthy, U. Verma","doi":"10.1109/ICCUBEA.2015.191","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2015.191","url":null,"abstract":"The aim of the work is to design and reduce the power consumption of low power 32 bits RISC core processor. The design is based on 5-stage pipelined DLX architecture. This paper proposes the design for the low power RISC processor. The DLX architecture with pipelined control in a RISC core consists of Fetch, Decode, Execute, Pipeline Control and Memory. The reduction in the power is achieved using HDL modification technique. Leakage power i.e Quiescent power which is also a static power in the processor cannot be reduced. Algorithm modification in the execute block of the RISC core will reduce the power consumed by the processor. 13.33% is the total power reduction between a normal processor and the low power version of the processor.","PeriodicalId":325841,"journal":{"name":"2015 International Conference on Computing Communication Control and Automation","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115139324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Methodology for Outlier Detection in Audit Logs for Financial Transactions 金融交易审计日志中的异常值检测方法
2015 International Conference on Computing Communication Control and Automation Pub Date : 2015-02-26 DOI: 10.1109/ICCUBEA.2015.167
P. Kanhere, H. Khanuja
{"title":"A Methodology for Outlier Detection in Audit Logs for Financial Transactions","authors":"P. Kanhere, H. Khanuja","doi":"10.1109/ICCUBEA.2015.167","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2015.167","url":null,"abstract":"Database audit logs contain the information about database operations which are helpful to verify accuracy, lawfulness and to report risks. In financial systems, the audit logs should be monitored on continuous basis in order to detect and take action against any reasonably abnormal behavior. Outlier detection is a very important concept in the data mining which is useful in data analysis. Nowadays, a direct mapping can be found between the data outliers and the real world anomalies, and hence the outlier detection techniques can be applied to detect the abnormal activities in financial transactions. The purpose of the present study is to automate the process of abnormal activity detection and report generation. In the proposed framework, we will detect outliers based on rules and then we will apply Bayesian classification technique for abnormal activity risk classification. We will also generate user transaction profiles by obtaining user behavior according to historic transactions based on categorical or numerical attributes. Later we will monitor new transactions and will compare it against the corresponding user profile, in order to determine if the transaction is unusual. This framework will work on audit logs from a financial system, and thus will be useful for financial system auditors performing data analysis tasks.","PeriodicalId":325841,"journal":{"name":"2015 International Conference on Computing Communication Control and Automation","volume":"13 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121876616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance Analysis & Implementation of Adaptive GMM for Image Restoration & Segmentation 性能分析&;自适应GMM在图像恢复中的实现分割
2015 International Conference on Computing Communication Control and Automation Pub Date : 2015-02-26 DOI: 10.1109/ICCUBEA.2015.213
Shilpa Hatwar, A. Wanare
{"title":"Performance Analysis & Implementation of Adaptive GMM for Image Restoration & Segmentation","authors":"Shilpa Hatwar, A. Wanare","doi":"10.1109/ICCUBEA.2015.213","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2015.213","url":null,"abstract":"Now days we can easily captured the images and video with the advanced technologies in camera. But this images and video are get easily contaminated by noise due to the characteristics of image sensors due to this they are mostly blurred so we can loss important data. To avoid this problem we proposed an algorithm for segmentation based on Gaussian mixture model (GMM) and restoration technique with spatial smoothness constraints and transform domain techniques. The researchers worked on single type of image but the different environmental images have any noises so that it is not suitable for all images. The proposed algorithm is works on the all diverse field of images which can remove noises from images so it is compatible to all environmental conditions with calculating different image parameter. From all of this we can get the optimum solution of suitable filter for combination of image and noise for reduction of noise by comparing of all of that. Here we also present the algorithm for video segmentation & restoration.","PeriodicalId":325841,"journal":{"name":"2015 International Conference on Computing Communication Control and Automation","volume":"398 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133509454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technical Support Using Assistive Robotics for Physically Challenged People 使用辅助机器人为残疾人提供技术支持
2015 International Conference on Computing Communication Control and Automation Pub Date : 2015-02-26 DOI: 10.1109/ICCUBEA.2015.175
M. S. Vardam, S. Chandurkar, S. Vispute, J. N. Shaikh, P. Tambe, S. Thorat, S. Borkar
{"title":"Technical Support Using Assistive Robotics for Physically Challenged People","authors":"M. S. Vardam, S. Chandurkar, S. Vispute, J. N. Shaikh, P. Tambe, S. Thorat, S. Borkar","doi":"10.1109/ICCUBEA.2015.175","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2015.175","url":null,"abstract":"The purpose of the present work is to create a robotic leg for physically challenged person. Using this product person will be able to apparently walk like any normal person. The idea is to make the program govern the motion of leg and control the leg driving mechanism accordingly. This can be achieved using Mega Ardiuno 2560 micro-controller and C++ based embedded system. This Robotic leg is accessed by user friendly keypad which will have the functions like simple walk, sit on chair, stand up and stop. Mechanical motion is carried by using worm and wheel mechanism which is self-locking, motor speed is reduced and produces high torque.","PeriodicalId":325841,"journal":{"name":"2015 International Conference on Computing Communication Control and Automation","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Disjoint Path Routing Using Genetic Algorithm for Wireless Sensor Network 基于遗传算法的无线传感器网络节能不相交路径路由
2015 International Conference on Computing Communication Control and Automation Pub Date : 2015-02-26 DOI: 10.1109/ICCUBEA.2015.40
D. Mehetre, Sanjeev J Wagh
{"title":"Energy Efficient Disjoint Path Routing Using Genetic Algorithm for Wireless Sensor Network","authors":"D. Mehetre, Sanjeev J Wagh","doi":"10.1109/ICCUBEA.2015.40","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2015.40","url":null,"abstract":"Design of effective WSN topology is major issue in prolonging network lifetime in wireless sensor networks. Designed topology is expected to be efficient and balanced in terms of energy consumption. This paper proposes Genetic Algorithm (GA) based energy efficient disjoint path routing scheme which will help in prolonging lifetime of wireless sensor networks. Simulation results shows that proposed algorithm is improvement over existing algorithm in terms of energy consumption and network lifetime. Proposed method will be also applicable to set of applications where disjoint paths is necessary for fault tolerance.","PeriodicalId":325841,"journal":{"name":"2015 International Conference on Computing Communication Control and Automation","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132253102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Highly Secure Authentication Scheme 高度安全认证方案
2015 International Conference on Computing Communication Control and Automation Pub Date : 2015-02-26 DOI: 10.1109/ICCUBEA.2015.58
Ushir Kishori Narhar, R. Joshi
{"title":"Highly Secure Authentication Scheme","authors":"Ushir Kishori Narhar, R. Joshi","doi":"10.1109/ICCUBEA.2015.58","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2015.58","url":null,"abstract":"The increased level of effective security control and transaction fraud in the world of electronic and internet commerce, demands for highly secured identification and personal verification systems. The Knowledge based authentication system encourage to user in selecting password for high security. For high security application the proposed scheme presents an integrated evaluation of the graphical password scheme by using persuasive cued click points, including usability and security evaluations, and implementation considerations along with the biometric authentication using finger nail plate surface. It implements the graphical passwords scheme to improvise the difficulty level of guessing it along with the biometric authentication which is very convenient and efficient method by acquiring low resolution images of nail plate surface which is the outermost part of the nail unit. The contour and texture characteristics of nail plates from three fingers (Index, Middle and Ring) are represented by the appearance and shape based feature descriptors. To implement these we use the technique of score level rules for fusion and classifier based fusion of matching scores by employing decision tree and support vector machine. The objective is to provide highly secure authentication scheme by using user name with graphical password using persuasive cued click points along with biometric authentication using finger nail plate. The scope of the scheme is limited to three fingers only and also for high security purpose where it is very important to keep tight security like military application, forensic labs, civilian, banking applications, etc.","PeriodicalId":325841,"journal":{"name":"2015 International Conference on Computing Communication Control and Automation","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134398022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Broadband CPW Fed Hexagonal Shape and Hexagonal Slot Cut Microstrip Antenna 宽带CPW馈电六角形和六角形槽切微带天线
2015 International Conference on Computing Communication Control and Automation Pub Date : 2015-02-26 DOI: 10.1109/ICCUBEA.2015.29
A. Deshmukh, A. Kadam, S. Agrawal, K. Ray
{"title":"Broadband CPW Fed Hexagonal Shape and Hexagonal Slot Cut Microstrip Antenna","authors":"A. Deshmukh, A. Kadam, S. Agrawal, K. Ray","doi":"10.1109/ICCUBEA.2015.29","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2015.29","url":null,"abstract":"The variations of Coplanar Wave guide fed hexagonal micro strip antennas with hexagonal slot ground plane are proposed in 3000 MHz frequency band. The first variation of hexagonal shaped micro strip antenna yields impedance bandwidth of more than 108% which covers Wi-MAX and WLAN bands. The hexagonal shaped patch is rotated in 300 backed by the same ground plane. This configuration yields higher bandwidth of nearly 115%. The proposed configurations show broadside radiation pattern with a gain of more than 6 dBi over most of the bandwidth.","PeriodicalId":325841,"journal":{"name":"2015 International Conference on Computing Communication Control and Automation","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133376704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Static Detection of Shared Object Loadings on Linux (Ubuntu 14.10) Linux (Ubuntu 14.10)上共享对象加载的静态检测
2015 International Conference on Computing Communication Control and Automation Pub Date : 2015-02-26 DOI: 10.1109/ICCUBEA.2015.121
Sneha D. Patel, T. Pattewar
{"title":"Static Detection of Shared Object Loadings on Linux (Ubuntu 14.10)","authors":"Sneha D. Patel, T. Pattewar","doi":"10.1109/ICCUBEA.2015.121","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2015.121","url":null,"abstract":"Shared Object loading is an important mechanism for computer software development. It enables a program, to use its exported functionalities and link a Shared Object. Shared Object loading is a system by which a PC program are able to run at run-time, fill all collections in memory chunks, recall the all specified parameters and functions included in the library, and run those functions, and link the library from recollection. Static Detection of unsafe Shared Object loadings of software component is a technique used to achieve flexibility and modularity in software components. This paper presents the first static analysis technique aiming to detect all possible loading associated errors. The main challenge is how to estimate what Shared Object may be loaded at specific program locations. Our main subject is that all this information is determined locally from the Shared Object loading memory locations. In general, we determine all application and system software running in the system, then we compute all specific Shared Object loadings and by using static technique, we evaluate specific unsafe Shared Object components. For evaluation, we implemented our technique to detect malicious and unsafe component loadings on popular software application on Linux Platform Ubantu.","PeriodicalId":325841,"journal":{"name":"2015 International Conference on Computing Communication Control and Automation","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114411111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Video Based Tracking and Optimization Using Mean-Shift, Kalman Filter and Swarm Intelligence 基于Mean-Shift、卡尔曼滤波和群体智能的视频跟踪与优化
2015 International Conference on Computing Communication Control and Automation Pub Date : 2015-02-26 DOI: 10.1109/ICCUBEA.2015.129
Ashvini Kulkarni, M. Vargantwar, Sujata Virulkar
{"title":"Video Based Tracking and Optimization Using Mean-Shift, Kalman Filter and Swarm Intelligence","authors":"Ashvini Kulkarni, M. Vargantwar, Sujata Virulkar","doi":"10.1109/ICCUBEA.2015.129","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2015.129","url":null,"abstract":"Tracking object in video sequence is receiving enormous interest in computer vision research. This paper we contrast performance of Mean-Shift algorithm's gradient descent based search strategy with Kalman Filter based tracking algorithm used to models the dynamic motion of target object to guide optimize object's position through time using Swarm Intelligence based Particle Swarm Optimization. Experimental results of tracking a car demonstrate that the proposed Kalman Filter for object tracking is efficient under dynamic environment, robust in occlusion comes at the cost of higher computational requirement, helps to separate object pixel from background pixel for fast moving object. And optimize time for all vehicles detected in video are calculated by Particle Swarm Optimization.","PeriodicalId":325841,"journal":{"name":"2015 International Conference on Computing Communication Control and Automation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116748274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信