Prakash Duraisamy, B. Yassine, Ye Yu, S. Jackson, K. Namuduri, B. Buckles
{"title":"Low-complexity registration of visual imagery with 3-D LiDAR","authors":"Prakash Duraisamy, B. Yassine, Ye Yu, S. Jackson, K. Namuduri, B. Buckles","doi":"10.1109/ICCCNT.2012.6479591","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6479591","url":null,"abstract":"A robust 3-D model reconstruction plays vital role in many real world applications like city planning, architecture design and cartography. In this paper, we develop a low complexity robust hybrid model-based algorithm for registering oblique aerial images onto a 3D model generated from airborne Light Detection and Ranging data. Our proposed algorithm consists of two steps. In the first step, we use an intelligent search process to roughly estimate the extrinsic parameters of a calibrated camera without any apriori knowledge. The estimated camera parameters are used to transform the Digital Surface Model (DSM) to a view close to the view from which the visual image is taken. The second step is an adjustment process, in which we determine the transformation that maps the visual image onto DSM. Experiments were conducted on a real world datasets.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122102122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting salient regions in static images","authors":"G. Cheng, E. Ayeh, Ziming Zhang","doi":"10.1109/ICCCNT.2012.6477848","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6477848","url":null,"abstract":"Computational visual attention systems, which aim at detecting salient regions in images, have been the subject of research for more than two decades. In this paper, we propose a novel approach (SEC) to detect salient regions in static images. This method is composed of two modules: segmentation-based entropy computation to determine the information content of clusters and local color contrast computation to enhance the saliency. DBSCAN is used first to segment the image. Then, the entropies of the resulting segments are computed. Spatial information of each segment size and cohesion is employed to adjust the entropy in terms of distinctiveness. Color contrast between adjacent segments is then computed and combined with spatial information to determine the most salient regions within the input image. We conducted two types of experiments, and compared visually and quantitatively with existing methods.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114077274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an approach for improved security in wireless sensor networks","authors":"T. Thenmozhi, R. Somasundaram","doi":"10.1109/ICCCNT.2012.6395920","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395920","url":null,"abstract":"Wireless sensor networks are of a large number of low cost resource constrained sensor nodes. Each node has to sense certain phenomena and forward its data towards a central node, which is also called the base station. The range of applications include basic data reading like temperature to a wide variety of applications including agriculture. A large amount of work has happened into the design and analysis of the sensor devices. These sensor can handle high level of data exchange without reduction in performance. The data to be exchanged are of vital importance and need to be handled with high level of confidentiality. Though there are security algorithms that offers mechanisms for data confidentiality there is a rising need for improvement for better level of security. The hackers can be from node level to process level. This paper outlines the different security issues in wireless sensor network and provides scope for improvement.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122609095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gain scheduling adaptive model predictive controller for two conical tank interacting level system","authors":"V. Ravi, T. Thyagarajan, S. Y. Priyadharshni","doi":"10.1109/ICCCNT.2012.6396058","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396058","url":null,"abstract":"Model predictive control (MPC) has become the leading form of advanced multivariable control in the chemical process industry. The objective of this work is to introduce a gain scheduling control strategy for multivariable MPC. The method of approach is to design multiple linear MPC controllers. This strategy maintains performance of multiple linear MPC controllers over a wide range of operating levels. One important contribution is that the strategy combines several multiple linear MPC controllers, each with their own linear state space model describing process dynamics at a specific level of operation. One of the linear MPC controller output is selected as gain scheduling adaptive controller's output based on the current value of the measured process variable. The tuning parameters for the MPC controller are obtained using real coded Genetic Algorithm (GA). The capabilities of the gain scheduling adaptive (GSA) control strategy for MPC controller are investigated on Two Conical Tank Interacting Level System (TCTILS) through computer simulation.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124284770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"P2P Botnet detection: Combined host- and network-level analysis","authors":"K. Muthumanickam, E. Ilavarasan","doi":"10.1109/ICCCNT.2012.6395940","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395940","url":null,"abstract":"As Internet becomes part of our daily life, Botnet (BotNetwork) attacker take advantage of it to misuse in different ways. Botnet is a collection of interconnected compromised computers (Bots) which are remotely controlled by its owner (BotMaster) under a common command-and-control(C&C) infrastructure. Botnets can be innovatively designed propositionally for technology improvement, which makes the bonet detection a challenging problem. As P2P (peer to peer) Botnet has a unique distributed attacking behavior, it is difficult to detect this bot. Thus to build an efficient botnet detection system we coined a framework that combines host level information and network level information for p2p botnet detection.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129340211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On proposing automobile accident prevention system (A2PS) using wireless sensors and zigbee technology","authors":"M. Rajesh, D. Muruganandam","doi":"10.1109/ICCCNT.2012.6396066","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396066","url":null,"abstract":"A disaster is a deviation from planned or expected behavior or a course of event that endangers or adversely affects people, property, or the environment. This paper proposes a realtime accident prevention system combining signal processing and zigbee technique, that gets triggered by rash driving. The objective is to detect speed patterns in the driver's driving and alert the guard if certain patterns repeatedly occur. Several patterns are identified which are linked to irresponsible driving. The fluctuations in acceleration and deceleration for a period of time is measured by a sensor attached to the accelerator and the footbrake. This sensor gives inputs to the microcontroller kit, based on the amount of pressure on the accelerator / brake. The microcontroller in the system ascertains the traffic conditions, based on these variations in speed. Once the driving pattern matches the pre-defined pattern of rash driving in heavy or low traffic region, an alarm is sent to the driver along with the speed recommended. If the vehicle continues to travel in the same manner as before, an Zbee module in a Zigbee network sends an alert, giving details of the vehicle, the date and time of violation to the nearest control room. This will allow early response and rescue of accidents.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining the customer behavior using web usage mining in e-commerce","authors":"Mahendra Pratap Yadav","doi":"10.1109/ICCCNT.2012.6395938","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395938","url":null,"abstract":"With the explosive growth of information sources available on the WWW, it has become an important tool for users in order to find, extract, filter and evaluate the desired information and resources. The main purpose of this paper is to study the customer's behavior using the Web mining techniques and its application in e-commerce to mine customer behavior. The concept of Web mining describing the process of Web data mining in detail: source data collection, data pre-processing, pattern discovery, pattern analysis and cluster analysis. With the advanced information technologies, server are now able to collect and store mountains of data, describing their numerous contributions and different customer profiles, from which they seek to derive information about their customer's requirements. Conventional methods are no longer appropriate for these business situations to find the customer behavior. The principle of data mining is to cluster customer segments by using K-Means algorithm in which input data comes from web log of various e-commerce websites. Hence, determine the relationship between Web data mining and e-commerce and also to apply Web mining technology in e-commerce.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130568421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Patient monitoring system using Wireless Sensor based Mesh Network","authors":"B. Vijayalakshmi, C. Ram Kumar","doi":"10.1109/ICCCNT.2012.6396102","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396102","url":null,"abstract":"Wireless Sensor Networks (WSN) is a significant technology that has a considerable attraction in many areas, particularly in health sector. On the other hand Wireless Mesh Networks (WMN), which are an extension of LAN, have far better range and also reduce the amount of cabling needed to connect to the backbone network. In this paper a scheme that is Wireless Sensor based Mesh Networks, which is an integration of the above two technologies has been used for monitoring the patients status as follows: The patient's temperature, heart beat and pressure is monitored automatically using a bio-medical kit that is connected with the patient. A LCD is provided with the kit that is used to notify the nurse about the patient's health status. The information is then sent to a mesh node through Zigbee technology. The mesh node is generally a PC that helps the duty doctor to monitor all the wards that are present in the hospital. This ensures that the patient's health status is monitored even in the absence of the nurse. From the mesh node, a SMS is sent to specified doctors through GSM connection. With the help of the information got through SMS, the doctors can be able to attend the patient very quickly. Since the monitoring is done automatically there is no need for any person to look after the patient.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120870761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data repliation techniques in MANETS","authors":"M. Qayyum, M. Husamuddin","doi":"10.1109/ICCCNT.2012.6395988","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395988","url":null,"abstract":"Data Replication Techniques in Mobile Adhoc Networks is presented in this paper and discussed about the Data Replication Technique for Real-Time Ad Hoc Mobile Databases (DREAM); Collaborative Allocation and Deallocation of Replicas with Efficiency (CADRE); Consistency and Load Based Efficicient Allocation of Replicas (CLEAR); Expanding Ring Replication; Distributed Hash Table Replication (DHTR); Hara's Data Replication Schemes; An Economic Model for Effcient Dynamic Replication in Mobile-P2P networks (EcoRep).","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120978709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power control with QoS constraints in WSN using game theoretic approach","authors":"R. Valli, P. Dananjayan","doi":"10.1109/ICCCNT.2012.6396104","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396104","url":null,"abstract":"The major issue in wireless sensor network (WSN) is the power control since it is impossible to recharge or replace the batteries of the sensors. The sensors transmit at high power to make its transmission successful. Transmitting at high power not only reduces the lifetime of the nodes and that of the network, it also introduces excessive interference. Therefore, every node should transmit at minimal power while satisfying the quality of service (QoS) requirements. This paper proposes a power control game with error control coding (ECC) while considering the QoS requirements. The performance of the power control game satisfying QoS delay constraints with Reed Solomon (RS) and Multivariate Interpolation Decoded RS code (MIDRS) code for WSN is evaluated in terms of bit error rate (BER), throughput and delay.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129209151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}