2016 2nd International Conference on Next Generation Computing Technologies (NGCT)最新文献

筛选
英文 中文
Improved image compression technique using IWT-DCT transformation 利用IWT-DCT变换改进图像压缩技术
2016 2nd International Conference on Next Generation Computing Technologies (NGCT) Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877499
S. Agrwal, M. Sharma, D. Kumari, S. Gupta
{"title":"Improved image compression technique using IWT-DCT transformation","authors":"S. Agrwal, M. Sharma, D. Kumari, S. Gupta","doi":"10.1109/NGCT.2016.7877499","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877499","url":null,"abstract":"Wireless Image Compression is embedding scheme for reducing size of image so that image can be store in less disk space and faster attachment possible in communication. Research issues in Image Compression are to increase efficiency in term of the image quality of decompressed image on higher compression ratio and robustness against visual attacks. Discrete Wavelet transform domain based Image Compression is lossy compression technique. The disadvantage of DWT based compression is fraction loss in embedding which increases mean square error and results decreasing PSNR. Quality of decompressed image is proportional to PSNR. The Proposed compression approach use integer wavelet transforms to overcome above fraction loss. The paper presents Hybrid Integer wavelet transform (IWT) and discrete cosine transform (DCT) based compression technique to obtain increased quality of decompressed image compared to DWT+ DCT based compression technique. The proposed combined IWT + DCT based compression technique reduces the fractional loss compared to DWT based compression so the proposed technique provides better image quality of decompressed image on high compression ratio compared to DWT based and hybrid DWT DCT based image compression techniques.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115301367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An efficient system using item & user-based CF techniques to improve recommendation 一个有效的系统,使用基于项目和用户的CF技术来改进推荐
2016 2nd International Conference on Next Generation Computing Technologies (NGCT) Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877479
Celine Michael Rodrigues, S. Rathi, Ganesh V. Patil
{"title":"An efficient system using item & user-based CF techniques to improve recommendation","authors":"Celine Michael Rodrigues, S. Rathi, Ganesh V. Patil","doi":"10.1109/NGCT.2016.7877479","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877479","url":null,"abstract":"Nowadays large portion of web-based businesses, research projects, and scientist use recommendation systems to help their business to thrive & flourish. Standard recommendation system utilises either user CF, item CF or content based recommendation system, these furthermore confront issues like item cold start, user cold start and real-time prediction problem. In the perspective of these challenges, cluster based hybrid CF approach is proposed in this paper which uses item-based CF algorithm combined with user demographic based CF algorithm in clusters weighted mechanism. The proposed system is adaptable and extendable which is fruitful in addressing not only user cold start issues but also item cold start issues along with sparsity problem, with lower MAE enhancing the structure to give better suggestion progressively.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121081797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Physical telepresence: Growth trends of Tangible User Interface and its future 物理远程呈现:有形用户界面的增长趋势及其未来
2016 2nd International Conference on Next Generation Computing Technologies (NGCT) Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877420
Vikas Kumar, T. Choudhury, S. Sabitha
{"title":"Physical telepresence: Growth trends of Tangible User Interface and its future","authors":"Vikas Kumar, T. Choudhury, S. Sabitha","doi":"10.1109/NGCT.2016.7877420","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877420","url":null,"abstract":"Tangible User Interface (TUI) started with the invention of mouse and keyboard. Since the last two decades, TUI has experienced tremendous growth and has provided us with a link between the physical and the digital world. Even though, MIT Tangible Lab develops several tangible interface models every year, the research work in TUI is still in its infancy and extensive work is required to fully understand the potential of Tangible User Interfaces. This paper describes a brief history and some landmark Tangible User Interface models. It first acknowledges the existing work in TUI. Then, it is followed by the comparison between several TUI models. The paper brings out methods and technologies which are used in building TUI. It also aims at finding the advantages, disadvantages and applications of some TUI models. The paper concludes with finding those factors which are responsible for the growth of TUI.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114377972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Coverage and connectivity aware data gathering protocol for wireless sensor networks 无线传感器网络覆盖和连接感知数据采集协议
2016 2nd International Conference on Next Generation Computing Technologies (NGCT) Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877455
Vishakha Tomar, D. Singh
{"title":"Coverage and connectivity aware data gathering protocol for wireless sensor networks","authors":"Vishakha Tomar, D. Singh","doi":"10.1109/NGCT.2016.7877455","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877455","url":null,"abstract":"Wireless sensor networks (WSNS) is a collection of sensor nodes whose basic functionality is to monitor the region in which they are deployed. Main research issues in designing a protocol for WSNs is, how to minimize energy consumption and prolong the network lifetime, while ensuring the required coverage as well as connectivity. In this paper, we present a coverage and connectivity aware data gathering protocol to provide sufficient coverage and connectivity in the network. The proposed protocol reduces the energy consumption of a network using a sleep scheduling scheme to periodically turn on and off the communication radios. A backbone of relay nodes and independent nodes is maintained for ensuring the connectivity in the network and this is also periodically rebuild the backbone setup. Each node transmits its sensory data to its closest independent node and an independent node forwards the sensed data via relay nodes toward the sink. The proposed protocol does not use any geographic information and is a fully distributed. Simulation results show that the proposed protocol consumes less energy consumption compare to existing protocol and also prolong the network life time, while maintaining connectivity and coverage.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"94 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128699534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An improved approach for denoising MRI using non local means filter 一种改进的非局部均值滤波去噪方法
2016 2nd International Conference on Next Generation Computing Technologies (NGCT) Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877492
N. Joshi, Sarika Jain, Amit Agarwal
{"title":"An improved approach for denoising MRI using non local means filter","authors":"N. Joshi, Sarika Jain, Amit Agarwal","doi":"10.1109/NGCT.2016.7877492","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877492","url":null,"abstract":"Various types of noise affect Magnetic Resonance Images and consequently interrupt in correct diagnosis. Thus, noise reduction is a major task while working with Magnetic Resonance (MR) Images. The process of denoising reduces the undesirable noise, but at the same time the denoising process needs to preserve the image features as well. Various techniques are available for noise removal from MR Images. Non local means filtering approach is a popular denoising technique for MR images. Modifications have been performed on the original Non Local Means algorithm to apply it on numerous applications. The aim of this paper is to denoise MRI by a novel approach, making use of a median and wiener filter in conjunction with the Non local means filtering technique.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124695065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Designing and implementaion of smart LPG trolley with home safety 智能家用安全LPG小车的设计与实现
2016 2nd International Conference on Next Generation Computing Technologies (NGCT) Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877412
Ajay Mahaputra Kumar, Mukesh Kumar, Balwinder Singh
{"title":"Designing and implementaion of smart LPG trolley with home safety","authors":"Ajay Mahaputra Kumar, Mukesh Kumar, Balwinder Singh","doi":"10.1109/NGCT.2016.7877412","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877412","url":null,"abstract":"LPG cylinders have become an integral part of every home. Our kitchens are occupied with LPG cylinders which help us make delicious food. But it can be dangerous and life threatening. Therefore, it requires constant vigilance to reduce the danger. The aim of this paper is to design a safety oriented system which will alert the user about any threat in the kitchen through mobile and also capable of performing required action immediately. This system will detect leakage of LPG and send an alert message to the user, at the same time it will switch off the mains power supply and a mechanical design attached with it, can switch off regulator too. It ensures safety from any gas leakage accident like suffocation and explosion. As an additional advantage, this system has a weighing sensor which can measure the weight of the cylinder and regularly update user about gas left in the cylinder. This system will also help customers to know whether they are being cheated by gas agency by providing less amount of LPG. In the present time, everyone is busy in their daily life and it is difficult to know the status of the gas cylinder. Further, it will register your booking through GSM technology by sending SMS to the distributor company and also send an alert to user at the same time. It will be helpful for those aged people who live alone and are dependent on others, by making them independent and secure them from any kitchen hazardous.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"930 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127017668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A novel way to classify passenger data using Naïve Bayes algorithm (A real time anti-terrorism approach) 一种基于Naïve贝叶斯算法的乘客数据分类新方法(一种实时反恐方法)
2016 2nd International Conference on Next Generation Computing Technologies (NGCT) Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877433
Saurabh Singh, Shashikant Verma, Akhilesh Tiwari, Aditya Tiwari
{"title":"A novel way to classify passenger data using Naïve Bayes algorithm (A real time anti-terrorism approach)","authors":"Saurabh Singh, Shashikant Verma, Akhilesh Tiwari, Aditya Tiwari","doi":"10.1109/NGCT.2016.7877433","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877433","url":null,"abstract":"Terrorist Data Mining basically means to encounter all the data of terrorism from the huge amount of data. In a more intricate way we all know that terrorist set their foot into any predominant place through railway station, bus stands or airport. Usually to communicate they use their cell phones and network. Now if these areas are well equipped with LAN or WAN, that is the Wi-Fi connections surely these terrorist would avail themselves. Then with the help of data used by terrorists their presence can be spotted easily and their information can be collected. This paper describes a novel work to counter the presence of terrorist at public place in a well-defined manner.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116209244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An agent based architecture using ontology for intrusion detection system 基于本体的智能体入侵检测系统
2016 2nd International Conference on Next Generation Computing Technologies (NGCT) Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877481
M. Bist, A. P. Panwar, Vishwas Kumar
{"title":"An agent based architecture using ontology for intrusion detection system","authors":"M. Bist, A. P. Panwar, Vishwas Kumar","doi":"10.1109/NGCT.2016.7877481","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877481","url":null,"abstract":"Intrusion Detection Systems is one of the most useful tools which are used nowadays to identify the attacks happening on the network. But the high false positive and false negative rates are major limitations in Intrusion detection System. To overcome these limitations new techniques should be introduced. In our research we used Ontology in Intrusion Detection System. As Ontology describes the semantic relations between entities, we used this technique in our system to describe the attacks by their behavior. Our proposed Intrusion Detection System contains multiple agents like Sniffer agent, Analysis Agent, communication agent and manager agent. They work collectively to detect the intrusion in a much efficient way. Analysis agent uses ontology to identify the attack. Protege is software which creates ontology. Our system semantically analyses various fields of the packet and infer to a solution about attack. To identify complex attacks occurs in distributed environment that are not identified by the existing systems we are using complex attack ontology. So overall Ontology based Intrusion Detection Systems are much advanced as compared to other IDS as these are reliable, scalable, interoperable and helpful for finding new attacks.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124061302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT-based real time signature authentication and transfer from document to document with DNA encryption 基于物联网的实时签名认证和DNA加密文件之间的传输
2016 2nd International Conference on Next Generation Computing Technologies (NGCT) Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877380
Sharon A. Zachariah, D. Rajasekar, L. Agilandeeswari, M. Prabukumar
{"title":"IoT-based real time signature authentication and transfer from document to document with DNA encryption","authors":"Sharon A. Zachariah, D. Rajasekar, L. Agilandeeswari, M. Prabukumar","doi":"10.1109/NGCT.2016.7877380","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877380","url":null,"abstract":"The main idea of this paper is to suggest a way in which, by using the Internet of Things (IoT), a person can sign a document in a particular place, and have it reflect simultaneously on a similar document elsewhere, in real time. The primary user (authenticator) uses a digital pen to sign the paper document. The signature area of the document contains a particular dot pattern which helps the digital pen track the movements as the signature is created. While the paper is being signed, the digital pen also records the user's fingerprint for later verification. The obtained information is then converted to binary bits and is encoded using DNA encryption. This cipher data is transmitted to the secondary user (receiver) where the cipher is decoded and printed on the second copy of the document. Thus, the signature is securely transferred from one paper to the other.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125493103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Global aerosol single scattering albedo characteristics 全球气溶胶单次散射反照率特征
2016 2nd International Conference on Next Generation Computing Technologies (NGCT) Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877406
V. K. Sarma, Manu Mehta
{"title":"Global aerosol single scattering albedo characteristics","authors":"V. K. Sarma, Manu Mehta","doi":"10.1109/NGCT.2016.7877406","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877406","url":null,"abstract":"Single Scattering Albedo (SSA) is one of the most important parameters in deciding the type of aerosols present in the atmosphere. This study mainly aims to study the characteristics of SSA at 388nm wavelength (UV region) at global scale using Ozone Monitoring Instrument (OMI) (level-3) data which is on board the NASA Aura. The study is carried out for the period 2014 December to 2015 November. The Global region is divided into six sub-regions i.e., North-West, South-West, North, South, North-East and South-East. The SSA values for these sub-regions are averaged and analyzed on a seasonal basis. Four seasons have been chosen and the mean SSA of the sub-regions is calculated with respect to them. The sub-region seasonal approach gave a better inference on the aerosol SSA values. The decrease in the SSA values has been observed over the regions where biomass burning generally takes place. The Southern region is showing low SSA values in almost all the seasons than other regions because of the dust activities and biomass burning activities in the African sub-continent. The Californian and Indonesian forest fires also constitute high absorbing aerosols causing low SSA values.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122224284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书