2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)最新文献

筛选
英文 中文
Low-complexity registration of visual imagery with 3-D LiDAR 三维激光雷达视觉图像的低复杂度配准
Prakash Duraisamy, B. Yassine, Ye Yu, S. Jackson, K. Namuduri, B. Buckles
{"title":"Low-complexity registration of visual imagery with 3-D LiDAR","authors":"Prakash Duraisamy, B. Yassine, Ye Yu, S. Jackson, K. Namuduri, B. Buckles","doi":"10.1109/ICCCNT.2012.6479591","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6479591","url":null,"abstract":"A robust 3-D model reconstruction plays vital role in many real world applications like city planning, architecture design and cartography. In this paper, we develop a low complexity robust hybrid model-based algorithm for registering oblique aerial images onto a 3D model generated from airborne Light Detection and Ranging data. Our proposed algorithm consists of two steps. In the first step, we use an intelligent search process to roughly estimate the extrinsic parameters of a calibrated camera without any apriori knowledge. The estimated camera parameters are used to transform the Digital Surface Model (DSM) to a view close to the view from which the visual image is taken. The second step is an adjustment process, in which we determine the transformation that maps the visual image onto DSM. Experiments were conducted on a real world datasets.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122102122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting salient regions in static images 检测静态图像中的显著区域
G. Cheng, E. Ayeh, Ziming Zhang
{"title":"Detecting salient regions in static images","authors":"G. Cheng, E. Ayeh, Ziming Zhang","doi":"10.1109/ICCCNT.2012.6477848","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6477848","url":null,"abstract":"Computational visual attention systems, which aim at detecting salient regions in images, have been the subject of research for more than two decades. In this paper, we propose a novel approach (SEC) to detect salient regions in static images. This method is composed of two modules: segmentation-based entropy computation to determine the information content of clusters and local color contrast computation to enhance the saliency. DBSCAN is used first to segment the image. Then, the entropies of the resulting segments are computed. Spatial information of each segment size and cohesion is employed to adjust the entropy in terms of distinctiveness. Color contrast between adjacent segments is then computed and combined with spatial information to determine the most salient regions within the input image. We conducted two types of experiments, and compared visually and quantitatively with existing methods.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114077274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an approach for improved security in wireless sensor networks 一种提高无线传感器网络安全性的方法
T. Thenmozhi, R. Somasundaram
{"title":"Towards an approach for improved security in wireless sensor networks","authors":"T. Thenmozhi, R. Somasundaram","doi":"10.1109/ICCCNT.2012.6395920","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395920","url":null,"abstract":"Wireless sensor networks are of a large number of low cost resource constrained sensor nodes. Each node has to sense certain phenomena and forward its data towards a central node, which is also called the base station. The range of applications include basic data reading like temperature to a wide variety of applications including agriculture. A large amount of work has happened into the design and analysis of the sensor devices. These sensor can handle high level of data exchange without reduction in performance. The data to be exchanged are of vital importance and need to be handled with high level of confidentiality. Though there are security algorithms that offers mechanisms for data confidentiality there is a rising need for improvement for better level of security. The hackers can be from node level to process level. This paper outlines the different security issues in wireless sensor network and provides scope for improvement.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122609095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gain scheduling adaptive model predictive controller for two conical tank interacting level system 双锥槽交互液位系统增益调度自适应模型预测控制器
V. Ravi, T. Thyagarajan, S. Y. Priyadharshni
{"title":"Gain scheduling adaptive model predictive controller for two conical tank interacting level system","authors":"V. Ravi, T. Thyagarajan, S. Y. Priyadharshni","doi":"10.1109/ICCCNT.2012.6396058","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396058","url":null,"abstract":"Model predictive control (MPC) has become the leading form of advanced multivariable control in the chemical process industry. The objective of this work is to introduce a gain scheduling control strategy for multivariable MPC. The method of approach is to design multiple linear MPC controllers. This strategy maintains performance of multiple linear MPC controllers over a wide range of operating levels. One important contribution is that the strategy combines several multiple linear MPC controllers, each with their own linear state space model describing process dynamics at a specific level of operation. One of the linear MPC controller output is selected as gain scheduling adaptive controller's output based on the current value of the measured process variable. The tuning parameters for the MPC controller are obtained using real coded Genetic Algorithm (GA). The capabilities of the gain scheduling adaptive (GSA) control strategy for MPC controller are investigated on Two Conical Tank Interacting Level System (TCTILS) through computer simulation.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124284770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
P2P Botnet detection: Combined host- and network-level analysis P2P僵尸网络检测:结合主机和网络级分析
K. Muthumanickam, E. Ilavarasan
{"title":"P2P Botnet detection: Combined host- and network-level analysis","authors":"K. Muthumanickam, E. Ilavarasan","doi":"10.1109/ICCCNT.2012.6395940","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395940","url":null,"abstract":"As Internet becomes part of our daily life, Botnet (BotNetwork) attacker take advantage of it to misuse in different ways. Botnet is a collection of interconnected compromised computers (Bots) which are remotely controlled by its owner (BotMaster) under a common command-and-control(C&C) infrastructure. Botnets can be innovatively designed propositionally for technology improvement, which makes the bonet detection a challenging problem. As P2P (peer to peer) Botnet has a unique distributed attacking behavior, it is difficult to detect this bot. Thus to build an efficient botnet detection system we coined a framework that combines host level information and network level information for p2p botnet detection.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129340211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On proposing automobile accident prevention system (A2PS) using wireless sensors and zigbee technology 提出基于无线传感器和zigbee技术的汽车事故预防系统(A2PS)
M. Rajesh, D. Muruganandam
{"title":"On proposing automobile accident prevention system (A2PS) using wireless sensors and zigbee technology","authors":"M. Rajesh, D. Muruganandam","doi":"10.1109/ICCCNT.2012.6396066","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396066","url":null,"abstract":"A disaster is a deviation from planned or expected behavior or a course of event that endangers or adversely affects people, property, or the environment. This paper proposes a realtime accident prevention system combining signal processing and zigbee technique, that gets triggered by rash driving. The objective is to detect speed patterns in the driver's driving and alert the guard if certain patterns repeatedly occur. Several patterns are identified which are linked to irresponsible driving. The fluctuations in acceleration and deceleration for a period of time is measured by a sensor attached to the accelerator and the footbrake. This sensor gives inputs to the microcontroller kit, based on the amount of pressure on the accelerator / brake. The microcontroller in the system ascertains the traffic conditions, based on these variations in speed. Once the driving pattern matches the pre-defined pattern of rash driving in heavy or low traffic region, an alarm is sent to the driver along with the speed recommended. If the vehicle continues to travel in the same manner as before, an Zbee module in a Zigbee network sends an alert, giving details of the vehicle, the date and time of violation to the nearest control room. This will allow early response and rescue of accidents.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mining the customer behavior using web usage mining in e-commerce 利用网络使用挖掘技术挖掘电子商务中的客户行为
Mahendra Pratap Yadav
{"title":"Mining the customer behavior using web usage mining in e-commerce","authors":"Mahendra Pratap Yadav","doi":"10.1109/ICCCNT.2012.6395938","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395938","url":null,"abstract":"With the explosive growth of information sources available on the WWW, it has become an important tool for users in order to find, extract, filter and evaluate the desired information and resources. The main purpose of this paper is to study the customer's behavior using the Web mining techniques and its application in e-commerce to mine customer behavior. The concept of Web mining describing the process of Web data mining in detail: source data collection, data pre-processing, pattern discovery, pattern analysis and cluster analysis. With the advanced information technologies, server are now able to collect and store mountains of data, describing their numerous contributions and different customer profiles, from which they seek to derive information about their customer's requirements. Conventional methods are no longer appropriate for these business situations to find the customer behavior. The principle of data mining is to cluster customer segments by using K-Means algorithm in which input data comes from web log of various e-commerce websites. Hence, determine the relationship between Web data mining and e-commerce and also to apply Web mining technology in e-commerce.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130568421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Patient monitoring system using Wireless Sensor based Mesh Network 基于Mesh网络的无线传感器病人监护系统
B. Vijayalakshmi, C. Ram Kumar
{"title":"Patient monitoring system using Wireless Sensor based Mesh Network","authors":"B. Vijayalakshmi, C. Ram Kumar","doi":"10.1109/ICCCNT.2012.6396102","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396102","url":null,"abstract":"Wireless Sensor Networks (WSN) is a significant technology that has a considerable attraction in many areas, particularly in health sector. On the other hand Wireless Mesh Networks (WMN), which are an extension of LAN, have far better range and also reduce the amount of cabling needed to connect to the backbone network. In this paper a scheme that is Wireless Sensor based Mesh Networks, which is an integration of the above two technologies has been used for monitoring the patients status as follows: The patient's temperature, heart beat and pressure is monitored automatically using a bio-medical kit that is connected with the patient. A LCD is provided with the kit that is used to notify the nurse about the patient's health status. The information is then sent to a mesh node through Zigbee technology. The mesh node is generally a PC that helps the duty doctor to monitor all the wards that are present in the hospital. This ensures that the patient's health status is monitored even in the absence of the nurse. From the mesh node, a SMS is sent to specified doctors through GSM connection. With the help of the information got through SMS, the doctors can be able to attend the patient very quickly. Since the monitoring is done automatically there is no need for any person to look after the patient.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120870761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Data repliation techniques in MANETS MANETS中的数据复制技术
M. Qayyum, M. Husamuddin
{"title":"Data repliation techniques in MANETS","authors":"M. Qayyum, M. Husamuddin","doi":"10.1109/ICCCNT.2012.6395988","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395988","url":null,"abstract":"Data Replication Techniques in Mobile Adhoc Networks is presented in this paper and discussed about the Data Replication Technique for Real-Time Ad Hoc Mobile Databases (DREAM); Collaborative Allocation and Deallocation of Replicas with Efficiency (CADRE); Consistency and Load Based Efficicient Allocation of Replicas (CLEAR); Expanding Ring Replication; Distributed Hash Table Replication (DHTR); Hara's Data Replication Schemes; An Economic Model for Effcient Dynamic Replication in Mobile-P2P networks (EcoRep).","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120978709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power control with QoS constraints in WSN using game theoretic approach 基于博弈论的无线传感器网络QoS约束功率控制
R. Valli, P. Dananjayan
{"title":"Power control with QoS constraints in WSN using game theoretic approach","authors":"R. Valli, P. Dananjayan","doi":"10.1109/ICCCNT.2012.6396104","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396104","url":null,"abstract":"The major issue in wireless sensor network (WSN) is the power control since it is impossible to recharge or replace the batteries of the sensors. The sensors transmit at high power to make its transmission successful. Transmitting at high power not only reduces the lifetime of the nodes and that of the network, it also introduces excessive interference. Therefore, every node should transmit at minimal power while satisfying the quality of service (QoS) requirements. This paper proposes a power control game with error control coding (ECC) while considering the QoS requirements. The performance of the power control game satisfying QoS delay constraints with Reed Solomon (RS) and Multivariate Interpolation Decoded RS code (MIDRS) code for WSN is evaluated in terms of bit error rate (BER), throughput and delay.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129209151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信