2015 International Conference on Computing and Communications Technologies (ICCCT)最新文献

筛选
英文 中文
Agent based weighted page ranking algorithm for Web content information retrieval 基于Agent的Web内容信息检索加权页面排序算法
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-10-08 DOI: 10.1109/ICCCT2.2015.7292715
V. Nagappan, P. Elango
{"title":"Agent based weighted page ranking algorithm for Web content information retrieval","authors":"V. Nagappan, P. Elango","doi":"10.1109/ICCCT2.2015.7292715","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292715","url":null,"abstract":"The rapid extension of the web is causing the constant growth of information, important to several problems such as an increased difficulty of extracting potentially useful Information. Search engines have become the most powerful tools for obtaining useful information scattered on the web. Web content mining goads this problem with the help of agent by retrieving explicit information from different web sites for its access and knowledge discovery. Most of the search engines are ranking their search results in response to users queries to make their search navigation easier. This paper also explores agent based weighted page ranking algorithms for web content mining to retrieve more relevant information. The proposed extended Page Rank algorithm is Agent based Weighted Page Rank Algorithm. The Agent assigns larger rank values to more important pages instead of dividing the rank value of a page evenly among its content. AWPR algorithm retrieve the most important content information or web pages in front of end users.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127077162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Performance analysis of PAPR reduction in OFDM using combined approach method 基于组合方法的OFDM中PAPR降低性能分析
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-10-08 DOI: 10.1109/ICCCT2.2015.7292746
T. Sravanti, N. Vasantha
{"title":"Performance analysis of PAPR reduction in OFDM using combined approach method","authors":"T. Sravanti, N. Vasantha","doi":"10.1109/ICCCT2.2015.7292746","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292746","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is a multi carrier system which plays an important role in wireless communication system with limitation of soaring Peak to Average Power Ratio (PAPR), compared with single carrier systems. In this proposed method for enhanced performance of PAPR, the combination of Selective Mapping (SLM), Partial Transmit Sequence (PTS) and Dummy Signal Insertion (DSI) is implemented for diverse candidate signals.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"31 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125874099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent prediction model for learners outcome forecasting in e-learning 面向网络学习学习者结果预测的智能预测模型
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-10-08 DOI: 10.1109/ICCCT2.2015.7292711
M. Ravichandran, G. Kulanthaivel
{"title":"Intelligent prediction model for learners outcome forecasting in e-learning","authors":"M. Ravichandran, G. Kulanthaivel","doi":"10.1109/ICCCT2.2015.7292711","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292711","url":null,"abstract":"In e-learning environment, users are very much interested in predicting the outcomes and monitoring the learning process to verify their prediction. Traditional machine learning techniques includes objective prediction (quantitative measure with an abundance of data) and subjective forecasting (qualitative measure with small data) methods. However, these techniques may not be consistent in various situations. In this research paper, we present an intelligent prediction model for learners outcome forecasting approach, which helps facilitators and users discover more interesting knowledge information and predict the learning outcomes. A high level machine learning technique identifies partial similarities between learners time series data and categorize the data group in to various group based on their similarity computation. A modern visualization of the data categorization process helps us to understand the similarity between the time series information. Statistical measures evaluate the effectiveness of the proposed approach of categorization and testing their significance. Evaluation results show that our technique leads to relatively high accuracy in learners outcome prediction.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115567785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile streaming for QoS approach in media cloud 媒体云中面向QoS的移动流
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-10-08 DOI: 10.1109/ICCCT2.2015.7292784
S. Sankari, K. Ashwini, P. Varalakshmi
{"title":"Mobile streaming for QoS approach in media cloud","authors":"S. Sankari, K. Ashwini, P. Varalakshmi","doi":"10.1109/ICCCT2.2015.7292784","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292784","url":null,"abstract":"In Multimedia network applications, adaptive mobile streaming empowers cloud-based real time transcoding. The researchers in media cloud propose a well-organized technique to split the video content into different frames. The technique is to carry out disseminated encoding to resolve the multimedia data conversion problem. Also, it introduces an energetic outgoing and an extrapolative bandwidth for dynamic mobile environments. The bandwidth losses and more power consumption in the workstation is due to disproportionate packet diffusion in the traditional network whereas in the stable streaming service cloud network, it can be reduced. Quality of Service (QoS) technique ensures multimedia transmission information appropriate for workstation surroundings via an energetic mobile streaming services such as transmission frequency, according to the traditional network surroundings and also an energetic transmission transcending is to avoid the abuse of information measures and workstation power. Finally, this study proposes a model to validate the proposed technique feasibility. The proposed technique is an economical self-adaptive transmission streaming services for varied information measure environments.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127113793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure multi-party computation in differential private data with Data Integrity Protection 基于数据完整性保护的差分私有数据多方计算安全
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-10-08 DOI: 10.1109/ICCCT2.2015.7292742
S. Sundari, M. Ananthi
{"title":"Secure multi-party computation in differential private data with Data Integrity Protection","authors":"S. Sundari, M. Ananthi","doi":"10.1109/ICCCT2.2015.7292742","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292742","url":null,"abstract":"Secure multiparty computation (SMC) is needed now-a-days in which data are distributed between different parties. Moreover, organizations are wished to collaborate with other parties who conduct same business, for their mutual benefits. SMC provides users to gain much information from the larger data without disclosing the data. This project combines the technique secure multi-party computation and the differential privacy for vertically partitioned data between parties. To achieve this, a multi-party protocol has been proposed for the exponential mechanism. Reliable access to data is must for most computer applications and data servers. Some factors causes unauthorized access to stored data. Two Phase Validation (2PV) provides the authentication for the users, while integrating the data in multiparty computation. Data can get corrupted due to some malfunctions. Disk errors are common today but the storage technologies are not designed to handle such kind of errors. A simple integrity violation is detected by the higher level software which causes further loss of data. The proposed system is to verify the integrity of random subsets of data against general or malicious corruptions through Distributed Data Integrity (DDI) Protection.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132093891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A hybrid population seeding technique based Genetic Algorithm for stochastic Multiple Depot Vehicle Routing Problem 基于混合种群播种技术的遗传算法求解随机多车场车辆路径问题
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-10-08 DOI: 10.1109/ICCCT2.2015.7292731
S. Sathyanarayanan, K. S. Joseph, S. Jayakumar
{"title":"A hybrid population seeding technique based Genetic Algorithm for stochastic Multiple Depot Vehicle Routing Problem","authors":"S. Sathyanarayanan, K. S. Joseph, S. Jayakumar","doi":"10.1109/ICCCT2.2015.7292731","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292731","url":null,"abstract":"Vehicle Routing Problem (VRP) has wide applications in logistics and supply chain management and thus is one of the widely studied problems in the field of Operational Research. It is also a NP-hard combinatorial optimization problem and many different kinds of algorithms and techniques have been proposed to solve VRP. There are many types of VRP and this paper concentrates on two variants: Multiple-Depot Vehicle Routing Problem (MDVRP) and Stochastic Vehicle Routing problem (SVRP). While both MDVRP and SVRP enjoy wide popularity in literature, a combination of these two is not yet explored. The objective of this paper is to solve for MDVRP with stochastic travel times using a metaheuristic procedure in Evolutionary Computation called Genetic Algorithms (GA). A new hybrid population seeding technique is proposed for generating feasible solutions in the initial population. A randomized initial population generation technique is used to compare with the proposed hybrid population seeding technique and the results are compared. The results clearly conclude that the hybrid population seeding technique clearly yields better solutions in terms of time needed and distance travelled to serve the customers.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131732873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient modelling of video compression on demand in peak traffic condition using HEVC 高峰交通条件下基于HEVC的视频压缩高效建模
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-10-08 DOI: 10.1109/ICCCT2.2015.7292767
S. Murthy, B. Sujatha
{"title":"Efficient modelling of video compression on demand in peak traffic condition using HEVC","authors":"S. Murthy, B. Sujatha","doi":"10.1109/ICCCT2.2015.7292767","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292767","url":null,"abstract":"Performing a compression over massive video files in any network is one essential task from network and traffic management viewpoint. In the most recent times, HEVC (High Efficiency Video Coding) has stood up as new signaling protocol for performing video compression. Unfortunately, owing to the novelty in HEVC, there is less evidence of effective traffic management in prior studies. Therefore, the proposed system introduces a technique that perform most simple way of compression a video using HEVC considering the peak traffic condition. The system also presents a technique that performs compression on demand to reduce the network overhead. The system is evaluated with respect to bandwidth consumption as well as data transfer time. The outcome of the system is compared with the most recent work using HEVC to find that proposed system has much lesser processing time of using HEVC to compress a video file over peak traffic condition.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"834 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133928525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel Differential Phase Shift Quantum Key Distribution scheme for secure communication 一种新的安全通信差分相移量子密钥分配方案
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-10-08 DOI: 10.1109/ICCCT2.2015.7292737
Upendra Singh Chahar, Kakali Chatterjee
{"title":"A novel Differential Phase Shift Quantum Key Distribution scheme for secure communication","authors":"Upendra Singh Chahar, Kakali Chatterjee","doi":"10.1109/ICCCT2.2015.7292737","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292737","url":null,"abstract":"Quantum key distribution is used for secure communication between two parties for generation of secret key. Differential Phase Shift Quantum Key Distribution is a new and unique QKD protocol that is different from traditional ones, providing simplicity and practicality. This paper presents Delay Selected DPS-QKD scheme in which it uses a weak coherent pulse train, and features simple configuration and efficient use of the time domain. All detected photon participate to form a secure key bits and resulting in a higher key creation efficiency.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134279749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic number plate recognition system using super-resolution technique 采用超分辨率技术的自动车牌识别系统
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-10-08 DOI: 10.1109/ICCCT2.2015.7292759
G. Balamurugan, Sakthivel Punniakodi, K. Rajeswari, V. Arulalan
{"title":"Automatic number plate recognition system using super-resolution technique","authors":"G. Balamurugan, Sakthivel Punniakodi, K. Rajeswari, V. Arulalan","doi":"10.1109/ICCCT2.2015.7292759","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292759","url":null,"abstract":"Super resolution is a technique which is used to enhance the visual quality of a sequence of low resolution image by constructing a single high resolution image. This paper is interested in acquiring the automatic number plate recognition system from the traffic surveillance video. The proposed system detects the number plate of a vehicle from video input and then performs the super resolution technique. Applying the Optical Character Recognition Technique it acquires the text from the super resolution image of vehicle number plate by means it compares with the RTO database and then it display the details of the vehicle such as owners name, vehicle registration etc.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114394113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Automated detection of toxicity in the blood samples of dye factory workers 染料厂工人血液样本毒性的自动检测
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-10-08 DOI: 10.1109/ICCCT2.2015.7292771
E. Priya, A. Kumaran
{"title":"Automated detection of toxicity in the blood samples of dye factory workers","authors":"E. Priya, A. Kumaran","doi":"10.1109/ICCCT2.2015.7292771","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292771","url":null,"abstract":"Textile processing units largely employ azo dyes which are derivatives of benzene. Toxic sewage discharged from textile industries contains azo dyes. They affect soil fertility, water resources, marine organisms and the ecosystem. Benzedine is responsible for skin irritation and also increases the toxicity in blood and bone marrow which affects the production of blood cells and hence leads to anemia. Exposure to these benzedine dyes can induce hemolytic anemia which leads to deformation of Red Blood Cells (RBCs). In this work, an automated detection of toxicity is proposed to alert the workers prior to the critical stages of cancer. The proposed system consists of a portable unit where the blood samples are analyzed and the toxic status of the dye factory workers can be transmitted from the local health centre to the nearby hospital. Microscopic images of the smeared blood samples are acquired using the digital microscope. These RBC images of normal and abnormal are segmented using Laplacian of Gaussian (LoG) segmentation. Geometric shape based features are extracted from the segmented images. Significant geometric features are chosen by conducting student's `t' test. It is observed from the results that these significant geometric features show discrimination between the normal and abnormal RBCs. This early detection of toxicity can help workers in the site to take immediate medication which could reduce the probability of adversity in their health condition.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114527211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信