2012 IEEE International Conference on Computational Intelligence and Computing Research最新文献

筛选
英文 中文
Level identification of brain MR images using histogram of a LBP variant 使用LBP变异直方图的脑MR图像水平识别
Abraham Varghese, R. Varghese, K. Balakrishnan, J. S. Paul
{"title":"Level identification of brain MR images using histogram of a LBP variant","authors":"Abraham Varghese, R. Varghese, K. Balakrishnan, J. S. Paul","doi":"10.1109/ICCIC.2012.6510233","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510233","url":null,"abstract":"Axial brain slices containing similar anatomical structures are retrieved using features derived from the histogram of Local binary pattern (LBP). A rotation invariant description of texture in terms of texture patterns and their strength is obtained with the incorporation of local variance to the LBP, called Modified LBP (MOD-LBP). In this paper, we compare Histogram based Features of LBP (HF/LBP), against Histogram based Features of MOD-LBP (HF/MOD-LBP) in retrieving similar axial brain images. We show that replacing local histogram with a local distance transform based similarity metric further improves the performance of MOD-LBP based image retrieval.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A hybrid encryption algorithm based on RSA and Diffie-Hellman 一种基于RSA和Diffie-Hellman的混合加密算法
Shilpi Gupta, Jaya Sharma
{"title":"A hybrid encryption algorithm based on RSA and Diffie-Hellman","authors":"Shilpi Gupta, Jaya Sharma","doi":"10.1109/ICCIC.2012.6510190","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510190","url":null,"abstract":"Internet and Network applications have seen a tremendous growth in the last decade. As a result incidents of cyber attacks and compromised security are increasing. This requires more focus on strengthening and securing our communication. One way to achieve this is cryptography. Although a lot of work has been done in this area but this problem still has scope of improvement. In this paper we have focused on asymmetric cryptography and proposed a novel method by combining the two most popular algorithms RSA and Diffie-Hellman in order to achieve more security.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115390627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Kakkot Tree — A Binary Search Tree with caching Kakkot树——一个带缓存的二叉搜索树
R. Ramachandran
{"title":"Kakkot Tree — A Binary Search Tree with caching","authors":"R. Ramachandran","doi":"10.1109/ICCIC.2012.6510247","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510247","url":null,"abstract":"Kakkot Tree is a Binary Searching Tree with the caching concept added. It is used to speed up the searching process that is carried on a Binary Search Tree. The time complexity of BST varies between O(n) and O(log n) depends upon the number of nodes that are present in left and right children. Kakkot Tree is a new data structure which is a variant of BST with some initial nodes which act like caching.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"668 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115749197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
“Fuzzy based automated mobile controlled rescue robot” 基于模糊的自动移动控制救援机器人
L. Srivathsan, P. Velmurugan, K. Sivashankar, M. Chandru
{"title":"“Fuzzy based automated mobile controlled rescue robot”","authors":"L. Srivathsan, P. Velmurugan, K. Sivashankar, M. Chandru","doi":"10.1109/ICCIC.2012.6510260","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510260","url":null,"abstract":"Of late natural and man made calamities became unmanageable. Notwithstanding the fact that Government takes all steps to protect and reduce the impact of calamity, Right from the ancient times only humans are being used for these rescue operations. However, over the past decade or so, the autonomous systems role has changed — the emergence of smart munitions and precision aerial bombardment has resulted in the human entering tough urban combat situations to mop up any remains of calamities. Our system is the first of several such programs that are looking at revamping the rescuers gear. Our system basically has two modes. One mode is the automatic mode and the other mode is user control mode. The automatic mode makes the robot to detect the obstacles and move without any human intervention using Fuzzy Logic. In certain unavoidable circumstances the control comes to user who can control the operations of the robot from remote location using a mobile phone. The user can control the robot by seeing the video through 3G technology. It also helps to provide medical aid for needy. Our system can also be used to detect and defuse the fire, human life detection during earth quakes. Thus our aim is to provide a robotic system that can act as a savior during natural and man made calamities.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116691324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving network security using machine learning techniques 利用机器学习技术提高网络安全
Shaik Akbar, J. A. Chandulal, K. N. Rao, G. Kumar
{"title":"Improving network security using machine learning techniques","authors":"Shaik Akbar, J. A. Chandulal, K. N. Rao, G. Kumar","doi":"10.1109/ICCIC.2012.6510197","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510197","url":null,"abstract":"Discovery of malicious correlations in computer networks has been an emergent problem motivating extensive research in computer science to develop improved intrusion detecting systems (IDS). In this manuscript, we present a machine learning approach known as Decision Tree (C4.5) Algorithm and Genetic Algorithm, to classify such risky/attack type of connections. The algorithm obtains into consideration dissimilar features in network connections and to create a classification rule set. Every rule in rule set recognizes a particular attack type. For this research, we implement a GA, C.45 and educated it on the KDD Cup 99 data set to create a rule set that can be functional to the IDS to recognize and categorize dissimilar varieties of assault links. During our study, we have developed a rule set contain of six rules to classify six dissimilar attack type of connections that fall into 4 modules namely DoS, U2R, root to local and probing attacks. The rule produces works with 93.70% correctness for detecting the denial of service type of attack connections, and with significant accuracy for detecting the root to local, user to root and probe connections. Results from our experiment have given hopeful results towards applying enhanced genetic algorithm for NIDS.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115507446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An enhanced pre-processing technique for web log mining by removing web robots 一种去除网络机器人的增强web日志挖掘预处理技术
P. Nithya, P. Sumathi
{"title":"An enhanced pre-processing technique for web log mining by removing web robots","authors":"P. Nithya, P. Sumathi","doi":"10.1109/ICCIC.2012.6510325","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510325","url":null,"abstract":"Nowadays, internet becomes useful source of information in day-to-day life. It creates huge development of World Wide Web in its quantity of interchange and its size and difficulty of websites. Web Usage Mining (WUM) is one of the main applications of data mining, artificial intelligence and so on to the web data and forecast the user's visiting behaviors and obtains their interests by investigating the samples. Since WUM directly involves in large range of applications, such as, ecommerce, e-learning, Web analytics, information retrieval etc. Weblog data is one of the major sources which contain all the information regarding the users visited links, browsing patterns, time spent on a particular page or link and this information can be used in several applications like adaptive web sites, modified services, customer summary, pre-fetching, generate attractive web sites etc. There are several problems related with the existing web usage mining approaches. Existing web usage mining algorithms suffer from difficulty of practical applicability. So, a novel research is necessary for the accurate prediction of future performance of web users with rapid execution time. WUM consists of preprocessing, pattern discovery and pattern analysis. Log data is characteristically noisy and unclear. Hence, preprocessing is an essential process for effective mining process. In this paper, a novel pre-processing technique is proposed by removing local and global noise and web robots. Anonymous Microsoft Web Dataset and MSNBC.com Anonymous Web Dataset are used for estimating the proposed preprocessing technique.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122342818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Contribution of BFO in grid scheduling BFO在网格调度中的贡献
Joshua Samuel Raj, S. D. Priya
{"title":"Contribution of BFO in grid scheduling","authors":"Joshua Samuel Raj, S. D. Priya","doi":"10.1109/ICCIC.2012.6510214","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510214","url":null,"abstract":"Task scheduling is a critical issue in achieving high performance in grid computing. Bacterial foraging optimization is an algorithm that has its thrust on the group foraging behaviour of Escherichia coli (E-Coli) present in the human intestine and has been used to solve optimization problems and is applied to task scheduling. BFO has been hybridized with different algorithms in order to examine its local and global search properties separately in a multi processing environment. This paper presents a broad overview on the formalization of works carried out on task scheduling by BFO and its hybridized variants.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129028631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A risk analysis method for assessing risks based on interval-valued fuzzy number 一种基于区间模糊数的风险评估方法
Manisha Rathi, T. Chaussalet
{"title":"A risk analysis method for assessing risks based on interval-valued fuzzy number","authors":"Manisha Rathi, T. Chaussalet","doi":"10.1109/ICCIC.2012.6510296","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510296","url":null,"abstract":"Unplanned admission of a patient which is vague or fuzzy event has important economic implications for efficient hospital resource utilization. Several studies have targeted the preventability of unplanned admissions, but it is clear that unplanned admissions consume large amount of hospital resources. It is challenging to predict risk of admissions due to their vague nature. Patients at high risk of admission could be appropriate targets for models designed to reduce admissions in hospitals. Variation in decisions on admission may occur due to introduction of uncertainty in health system variables. Traditional approaches are not capable to account for the complex action of uncertainty and vague nature of hospital admissions. Therefore, in order to model decision making of experts, model adapting fuzzy regression method has been developed. The concept of interval-value fuzzy sets represents an attempt for treatment of vagueness and uncertainty due to fuzziness in both quantitative and qualitative ways.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129308342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient on-chip interconnects using CMS scheme with variation tolerant 采用CMS方案实现片上互连,具有容错性
T. Uma, K. Nirmaladevi
{"title":"Efficient on-chip interconnects using CMS scheme with variation tolerant","authors":"T. Uma, K. Nirmaladevi","doi":"10.1109/ICCIC.2012.6510253","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510253","url":null,"abstract":"Current Mode Signaling Scheme-Bias is one of the efficient schemes to achieve high-speed and low power communication over long On-Chip interconnects. In early days the repeaters and boosters circuits [4] are used to drive the on-chip interconnects. In this paper CMS scheme with various types of delay elements which is inserted in the circuit is used to analyze the performance in terms of power and tolerant variation. CMS scheme has an importance that it has a trade-off between speed and power as in[1]. In addition, the voltage swing on the line is reduced in our proposed scheme as in [2]. By the inserting a conventional buffer as delay element the improvement in energy/bit is 87% as in [1]. Further to improve the performance of the CMS-Bias the d-latch can be used as a delay element which consumes less power compared to buffer.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130375884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Directional gradient based registration of retinal images 基于方向梯度的视网膜图像配准
S. Patankar, J. Kulkarni
{"title":"Directional gradient based registration of retinal images","authors":"S. Patankar, J. Kulkarni","doi":"10.1109/ICCIC.2012.6510276","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510276","url":null,"abstract":"Registration of retinal images provided by different modalities is required to facilitate diagnosis of the retina specifically in context with Diabetes Retinopathy (DR). Temporal registration is necessary in order to follow the various stages DR, whereas multimodal registration allows us to improve the identification of some lesions or to compare pieces of information gathered from different sources. This paper presents an algorithm for temporal and/or multimodal registration of retinal images based on directional gradient of salient vessel bifurcation points. Gradient along 0, +45 and 90 degrees around bifurcation point is invariant to rotation. We have validated this by using Fourier transform. This enables to estimate the correspondence of bifurcation points between the image pairs to be aligned. The retinal vessel tree is first segmented and vessel bifurcation points are located. A feature vector comprising of directional gradients along 0, +45 and 90 degrees around labeled bifurcation point in its 3 × 3 neighborhood is then computed in order to determine correspondence. The rotation is estimated from the coordinates of the matched vessel bifurcation points. The algorithm is tested on publically available DRIVE and STARE database. The overall registration error is observed to be 0.8% and 0.7% for STARE and DRIVE database respectively.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121279615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信