2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies最新文献

筛选
英文 中文
Using Visual Clues Concept for Extracting Main Data from Deep Web Pages 利用视觉线索概念从深层网页中提取主数据
Satish Pusdekar, S. P. Chhaware
{"title":"Using Visual Clues Concept for Extracting Main Data from Deep Web Pages","authors":"Satish Pusdekar, S. P. Chhaware","doi":"10.1109/ICESC.2014.39","DOIUrl":"https://doi.org/10.1109/ICESC.2014.39","url":null,"abstract":"Extracting data from deep Web pages is a challenging problem due to the underlying intricate structures of such pages. A large number of techniques have been proposed to address this problem, but all of them have inherent limitations because they are Web-page-programming-language-dependent. The contents on Web pages are always displayed regularly for users to browse. There is different ways for deep Web data extraction to overcome the limitations of previous works by utilizing some interesting common visual features on the deep Web pages. In this paper vision-based approach is Web page programming-language-independent approach is proposed. This approach utilizes the visual features of the web pages to extract data from deep web pages including data record extraction and data item extraction. Again we also propose a new evaluation measure revision to capture human effort needed to produce exact extraction of data. Our implementation on large set of web databases describes the proposed vision-based approach is highly effective for data extraction from deep web pages.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131220637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mammography Feature Analysis and Mass Detection in Breast Cancer Images 乳腺x线摄影特征分析与乳腺癌肿块检测
Bhagwati Charan Patel, G. Sinha
{"title":"Mammography Feature Analysis and Mass Detection in Breast Cancer Images","authors":"Bhagwati Charan Patel, G. Sinha","doi":"10.1109/ICESC.2014.89","DOIUrl":"https://doi.org/10.1109/ICESC.2014.89","url":null,"abstract":"This paper introduces a novel approach for accomplishing mammographic feature analysis through detection of tumor, in terms of their size and shape with experimental work for early breast tumor detection. The objective is to detect the abnormal tumor/tissue inside breast tissues using three stages: Preprocessing, Segmentation and post processing stage. By using preprocessing noise are remove and than segmentation is applied to detect the mass, after that post processing is applied to find out the benign and malignant tissue with the affected area in the cancers breast image. Size of tumor is also detected in these steps. The occurrences of cancer nodules are identified clearly. Compared with an expert observer reading the Mammography, our algorithm achieves 96.5% sensitivity, 89% specificity, 95.6% accuracy value.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132485096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Overview on Edge Detection Methods 边缘检测方法综述
Diplaxmi R. Waghule, R. S. Ochawar
{"title":"Overview on Edge Detection Methods","authors":"Diplaxmi R. Waghule, R. S. Ochawar","doi":"10.1109/ICESC.2014.31","DOIUrl":"https://doi.org/10.1109/ICESC.2014.31","url":null,"abstract":"Edge in an image is a contour across which the brightness of the image changes abruptly. Edge detection plays a vital role in image processing. Edge detection is a process that detects the presence and location of edges constituted by sharp changes in intensity of the image. An important property of the edge detection method is its ability to extract the accurate edge line with good orientation. Different edge detectors work better under different conditions. Comparative evaluation of different methods of edge detection makes it easy to decide which edge detection method is appropriate for image segmentation. This paper presents an overview of the published work on edge detection.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131733340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Performance Optimization of Focused Web Crawling Using Content Block Segmentation 基于内容块分割的集中网络抓取性能优化
Bireshwar Ganguly, Devashri Raich
{"title":"Performance Optimization of Focused Web Crawling Using Content Block Segmentation","authors":"Bireshwar Ganguly, Devashri Raich","doi":"10.1109/ICESC.2014.69","DOIUrl":"https://doi.org/10.1109/ICESC.2014.69","url":null,"abstract":"The World Wide Web (WWW) is a collection of billions of documents formatted using HTML. Web Search engines are used to find the desired information on the World Wide Web. Whenever a user query is inputted, searching is performed through that database. The size of repository of search engine is not enough to accommodate every page available on the web. So it is desired that only the most relevant pages must be stored in the database. So, to store those most relevant pages from the World Wide Web, a better approach has to be followed. The software that traverses web for getting the relevant pages is called \"Crawlers\" or \"Spiders\". A specialized crawler called focused crawler traverses the web and selects the relevant pages to a defined topic rather than to explore all the regions of the web page. The crawler does not collect all the web pages, but retrieves only the relevant pages out of all. So the major problem is how to retrieve the relevant and quality web pages. To address this problem, in this paper, we have designed and implemented an algorithm which partitions the web pages on the basis of headings into content blocks and then calculates the relevancy of each partitioned block in web page. Then the page relevancy is calculated by sum of all block relevancy scores in one page. It also calculates the URL score and identifies whether the URL is relevant to a topic or not On the basis of headings, there is an appropriate division of pages into blocks because a complete block comprises of the heading, content, images, links, tables and sub tables of a particular block only.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125144844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhanced Flooding Scheme for AODV Routing Protocol in Mobile Ad Hoc Networks 移动自组织网络中AODV路由协议的增强泛洪方案
S. Gupta, Abhishek Mathur
{"title":"Enhanced Flooding Scheme for AODV Routing Protocol in Mobile Ad Hoc Networks","authors":"S. Gupta, Abhishek Mathur","doi":"10.1109/ICESC.2014.60","DOIUrl":"https://doi.org/10.1109/ICESC.2014.60","url":null,"abstract":"Mobile Ad Hoc Networks (MANETs) are composed of wireless mobile devices (nodes) equipped with portable radios but without the aid of any centralized management or existing infrastructure such as base-station. Broadcasting is an inevitable operation of route discovery Mobile Ad hoc Network (MANET). Though the broadcast by flooding is simple but inefficient and results in redundant message relays. This in turn over use of limited network resources like channel node energy and bandwidth. The normal flooding scheme is cause high retransmissions which lead to packet collisions and media congestion that can significantly degrade the network performance and throughput. Knowing the geographical position of the mobile nodes can help the protocol to reduce the number of retransmissions, thus enhancing the protocol performance. In this paper, an improved Flooding Algorithm has been proposed that makes use of the nodes' position to rebroadcast the packets and efficiently spread the control traffic in the mobile ad hoc network. The proposed algorithm is applied on the route discovery process of Ad-hoc On Demand Distance Vector (AODV) routing protocol to reduce the number of propagating Route Request (RREQ) messages. The RREQ has been customized by assigning a list to the RREQ contain fourth Nominated Neighbours to Rebroadcast the RREQ (NNRR) and used concept of requested zone and expected Zone to limit area of route discovery. The results produced by simulator shows that our scheme reduces the routing overhead and improves network throughput.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130870092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An Agent Based Intrusion Detection System for Wireless Network with Artificial Immune System (AIS) and Negative Clone Selection 基于人工免疫和负克隆选择的智能体无线网络入侵检测系统
G. Kumar, D. K. Reddy
{"title":"An Agent Based Intrusion Detection System for Wireless Network with Artificial Immune System (AIS) and Negative Clone Selection","authors":"G. Kumar, D. K. Reddy","doi":"10.1109/ICESC.2014.73","DOIUrl":"https://doi.org/10.1109/ICESC.2014.73","url":null,"abstract":"Intrusion in Wireless network differs from IP network in a sense that wireless intrusion is both of packet level as well as signal level. Hence a wireless intrusion signature may be as simple as say a changed MAC address or jamming signal to as complicated as session hijacking. Therefore merely managing and cross verifying the patterns from an intrusion source are difficult in such a network. Beside the difficulty of detecting the intrusion at different layers, the network credential varies from node to node due to factors like mobility, congestion, node failure and so on. Hence conventional techniques for intrusion detection fail to prevail in wireless networks. Therefore in this work we device a unique agent based technique to gather information from various nodes and use this information with an evolutionary artificial immune system to detect the intrusion and prevent the same via bypassing or delaying the transmission over the intrusive paths. Simulation results show that the overhead of running AIS system does not vary and is consistent for topological changes. The system also proves that the proposed system is well suited for intrusion detection and prevention in wireless network.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124053109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Use of Statistical Methods for Dimensionality Reduction in Hand Shape Identification Employing Radon Transform and Collaborative Representation Based Classification 基于Radon变换和协同表示分类的手部形状识别统计降维方法的应用
Oindrila Chatterjee, Ahana Gangopadhyay, A. Chatterjee
{"title":"Use of Statistical Methods for Dimensionality Reduction in Hand Shape Identification Employing Radon Transform and Collaborative Representation Based Classification","authors":"Oindrila Chatterjee, Ahana Gangopadhyay, A. Chatterjee","doi":"10.1109/ICESC.2014.58","DOIUrl":"https://doi.org/10.1109/ICESC.2014.58","url":null,"abstract":"Hand shape based authentication has long been established as an effective method of biometric identification for access control and security. This paper presents the use of the different statistical measures like mean, median and standard deviation for feature dimensionality reduction following Radon transform along an optimal direction for each query image. Subsequently, the feature vector of the query image was coded over similarly processed training samples from all classes and the Regularized Least Square (RLS) method was employed to identify the query image as a member of the class which produces the least reconstruction residual. It was experimentally demonstrated that the overall performances of CRC based solutions were significantly better than that of artificial neural network (ANN) based classifiers, utilized for identical problems on the same database.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122665061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Perpetual Echo Attack Detection on User Datagram Protocol Port 7 Using Ant Colony Optimization 基于蚁群优化的用户数据报协议端口7智能永久回波攻击检测
Abhishek Gupta, O. Pandey, M. Shukla, A. Dadhich, Anup Ingle, V. Ambhore
{"title":"Intelligent Perpetual Echo Attack Detection on User Datagram Protocol Port 7 Using Ant Colony Optimization","authors":"Abhishek Gupta, O. Pandey, M. Shukla, A. Dadhich, Anup Ingle, V. Ambhore","doi":"10.1109/ICESC.2014.82","DOIUrl":"https://doi.org/10.1109/ICESC.2014.82","url":null,"abstract":"The escalating complexity of computer networks on a daily basis has increased the probability of malicious exploitation. Even a rare vulnerability in a single computer might compromise the network security of an entire organisation. Intrusion Detection Systems form an integral component of the mechanisms designed to prevent internet and data communication systems from such attacks. The attacks on the network comprise of information gathering and modification through unauthorized access to resources and denial of service to legitimate users. IDS play a key role in detecting the patterns of behaviour on the network that might be indicative of impending attacks. Majority of groundbreaking research on IDS is carried out on KDD'99 dataset and focuses on either all the attacks in the network or the attacks corresponding to TCP/IP protocol. This paper presents a step forward in this direction where the IDS model addresses a specific part of the network attacks commonly detected at port 7 in UDP. Port scans in UDP account for a sizable portion of the Internet traffic and comparatively little research characterizes security in UDP port scan activity. To meet the growing trend of attacks and other security challenges in the constantly evolving internet arena, this is paper presents a computationally intelligent intrusion detection mechanism using swarm intelligence paradigm, particularly ant colony optimisation, to analyze sample network traces in UDP port scans. This work aims at generating customised and efficient network intrusion detection systems using soft computing to increase general network security through specific network security.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127958846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Different RNA Secondary Structure Prediction Methods 不同的RNA二级结构预测方法
P. Borkar, A. Mahajan
{"title":"Different RNA Secondary Structure Prediction Methods","authors":"P. Borkar, A. Mahajan","doi":"10.1109/ICESC.2014.44","DOIUrl":"https://doi.org/10.1109/ICESC.2014.44","url":null,"abstract":"Bioinformatics is the combination of two fields Biology and Computer Science. Now a days this application plays vital role for each molecular biological study. It uses various implementations and algorithms for analyzing and integration of biological data. RNA (ribo-nucleic acid) provides a mechanism to copy the genetic information of the DNA. It is very important to study the folding of RNA molecules to understand their role and functionalities. Researchers can find different important role of RNA molecules depending upon their RNA secondary structure which will be useful to discover antiviral drugs for diseases. In this paper we have given a review of various implementations and algorithms for RNA Secondary structure prediction.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129141129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Electrocardiogram Feature Based Inter-human Biometric Authentication System 基于心电图特征的人间生物特征认证系统
M. Dey, N. Dey, S. Mahata, Sayan Chakraborty, S. Acharjee, Achintya Das
{"title":"Electrocardiogram Feature Based Inter-human Biometric Authentication System","authors":"M. Dey, N. Dey, S. Mahata, Sayan Chakraborty, S. Acharjee, Achintya Das","doi":"10.1109/ICESC.2014.57","DOIUrl":"https://doi.org/10.1109/ICESC.2014.57","url":null,"abstract":"Biometrics integrates various technologies to identify an individual by exploiting their physiological and behavioral characteristics, which are unique and measurable. This paper proposes a novel technique for the development of a robust and secure biometric authentication system. In this current work, an interhuman ECG-Hash code is generated by performing an inner product between the Electrocardiogram (ECG) feature matrices of two different individuals located remotely. The individuals will have each other's ECG features, stored in their database. The accuracy of the system increases as the authentication mechanism requires traits from both the individuals, amongst whom the transmission is taking place. Moreover, the use of ECG features as a biometric trait enhances the security aspects of the system as traits like fingerprints or facial features maybe compromised with age or otherwise.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125334278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信