{"title":"Evolution strategy classification utilizing meta features and domain-specific statistical a priori models for fully-automated and entire segmentation of medical datasets in 3D radiology","authors":"G. Zwettler, W. Backfrieder","doi":"10.1109/ICCCT2.2015.7292712","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292712","url":null,"abstract":"The employment of modern machine learning algorithms marks a huge advance towards automated and generalized segmentation in medical image analysis. Entire radiological datasets are classified, leading to a meaningful morphological interpretation, clearly distinguishing pathologies. After standard pre-processing, e.g. smoothing the input image data, the entire volume is partitioned into a large number of sub-regions utilizing watershed transform. These fragments are atomic and fused together building contiguous structures representing organs and typical morphology. This fusion is driven by similarity of regions. The relevant similarity measures respond to statistical a-priori models, derived from training datasets. In this work, the applicability of evolution strategy as classifier for a generic image segmentation approach is evaluated. Furthermore, it is analyzed if accuracy and robustness of the segmentation are improved by incorporation of meta features evaluated on the entire classification solution besides local features evaluated for the pre-fragmented regions to classify. The proposed generic strategy has a high potential in new segmentation domains, relying only on a small set of reference segmentations, as evaluated for different imaging modalities and diagnostic domains, such as brain MRI or abdominal CT. Comparison with results from other machine learning approaches, e.g. neural networks or genetic programming, proves that the newly developed evolution strategy is highly applicable for this classification domain and can best incorporate meta features for evaluation of solution fitness.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132287001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cluster based signature evaluation mechanism for protecting the user data in cloud environment through fuzzy ordering approach","authors":"R. Poorvadevi, S. Rajalakshmi","doi":"10.1109/ICCCT2.2015.7292782","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292782","url":null,"abstract":"A Fuzzy set techniques which perhaps eliminate the several ambiguities on the particular issue to take right decision. Users may prefer the fuzzy approaches for their internal computation conflicts or manipulation to access boundless of data from cloud. Even though we have many security approaches, users are facing massive difficulties to safeguard their owning data in cloud environment. Protecting the confidential data from various hackers is the tedious problem in the current trend. So, possibly we will achieve the efficient security outcome by applying the different set of security principles. This proposed model is well suitable for securing the user confidential information's from the attackers in any situation. It focuses on clustering the different sort of input factors of customer validation attributes and evaluates these attributes to ensure the authenticity of unique users in cloud environment by ranking the distinguished threshold levels to prove user authentication function.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131408478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Traffic Analysis of cloud data centre","authors":"S. Sankari, P. Varalakshmi, B. Divya","doi":"10.1109/ICCCT2.2015.7292785","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292785","url":null,"abstract":"Software Defined Network (SDN) is a network design that separate the control plane and data plane. The data plane network carries user traffic. The control plane network carries the network brainpower and policy establishment to an application called a controller. In SDN based data centre, an Open Virtual Switch (OVS) runs on the server is to improve the overall network performance designed to analyse the traffic flow using Open Flow Protocol (OFP) in the Data Centre Network (DCN). The network is designed using fat tree topology in the proposed system. This topology is full bisectional bandwidth and it is potential for an indiscriminate host in the data centre to commune with any other host in the network. The fat tree topology is easy to analyze the link utilization and time series of traffic on edge. Data centre network architecture is proposed for traffic generation and its analysis purpose.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114520849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A SCA-resistant processor architecture based on random delay insertion","authors":"Zhangqing He, B. Yang, X. Deng, Kui Dai, X. Zou","doi":"10.1109/ICCCT2.2015.7292760","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292760","url":null,"abstract":"Random delay insertion is a simple and efficient approach to counter side-channel attacks, but previous methods do not have the ideal protective effect. In this article, based on random delay insertion, an effective processor architecture resistant to side-channel attacks was proposed. It used a combination of randomized scheduling, randomized instruction insertion and randomized pipeline-delay to resist side-channel attacks. On the base of ARM7 processor, we implemented this architecture and the implementation results showed that this processor has increased approximate 24.3% in hardware area than the original ARM7 processor. The CPA attack experiment results suggested that our new secure processor have high capacity to resist side-channel attacks and thus could be used in USBKEY, Smart CARD and other application scenarios which require extremely high security level.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124890241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic Engineering based on spectral radius in optical networks","authors":"V. Anusuya, D. Sheela, C. Chellamuthu","doi":"10.1109/ICCCT2.2015.7292747","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292747","url":null,"abstract":"The purpose of Traffic Engineering is to facilitate efficient and consistent network performance with simultaneous focusing on optimizing network resource utilization and traffic performance. A network can be represented as a graph with nodes as vertices and links as edges. Spectral graph theory is a useful study on the relationship between graph properties and the spectrum of the adjacency matrix or Laplace matrix. In this paper, an important spectral graph parameter known as spectral radius is considered. This paper proposes an approach in which the links are identified based on their significance in terms of spectral radius and the capacity is assigned to the links accordingly. The performance of the proposed scheme is tested on backbone optical networks in terms of network congestion and resource requirements which are the main objectives of traffic engineering.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131126923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized local route repair and congestion control in Mobile Ad hoc Network","authors":"P. Ranjan, R. L. Velusamy","doi":"10.1109/ICCCT2.2015.7292770","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292770","url":null,"abstract":"Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes which are autonomous, self organized and dynamic in nature. In this network due to mobility nodes are moving randomly, resulting in topology change. This topology change leads to frequent breakage of link. To repair the broken link AODV and DSR uses broadcasting mechanism. Broadcasting floods control packets. Flooding results in congestion due to limited buffer space, bandwidth, and battery power of mobile nodes. Congestion leads to dropping of packets resulting in decrease of network performance. Congestion can be avoided if the numbers of control packets are reduced. In this paper a new algorithm is proposed which avoid the congestion and repair the broken link by choosing a set of limited nodes for alternate route based on the quadrant position, battery status, queue length, and forwarding region. The proposed solution is termed as Improved Optimum Angle Selection AODV (IOAS-AODV) routing algorithm. This proposed solution is implemented, tested and the performance is analyzed. From the results it is observed that the proposed solution improves the routing performance such as throughput, end to end delay, routing overhead, and packet delivery ratio.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133611558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and performance analysis of visible light communication system through simulation","authors":"K. Sindhubala, B. Vijayalakshmi","doi":"10.1109/ICCCT2.2015.7292748","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292748","url":null,"abstract":"An NRZ OOK visible light communication system is designed and simulated, using a white LED of wavelength 450 nm and a Photodetector. Ambient light noise source such as fluorescent lamp generated by conventional ballast is one of the important sources of degradation which affects the performance of the communication system. By using rectangular optical filter before the photodiode at the receiver, it reduces the ambient noise, improves the BER and clear eye diagram is achieved. Simulation of VLC system is done by using optisystem software. In this paper, performance analysis of optical to electrical power conversion, BER, Threshold, eye opening is done with respect to distance between the transmitter and receiver.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129483372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single tree search sphere decoding algorithm for MIMO communication system","authors":"P. Prakash, M. Kannan","doi":"10.1109/ICCCT2.2015.7292753","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292753","url":null,"abstract":"Multiple Input Multiple Output (MIMO) systems utilize many antennas at both transmitter and receiver for higher Bandwidth efficiency. The implementation of MIMO detection becomes a difficult task as the computational complexity increases with the number of transmitting antenna and constellation size increases. The decoder for a 4*4 MIMO system with 16-QAM modulation and spatial multiplexing is implemented using Matlab. Difficult part is MIMO detection; ML decoding cannot be implemented directly because increase the complexity exponentially if size of constellation and number of transmit antenna increases. Sphere decoding reduce the complexity of decoding with some improvement with the decoding rate and BER. In my project sphere decoding combined with single tree search and ML decoding greatly improve the decoding Rate and BER. In sphere decoding selecting the sphere radius is very important. Sphere decoding algorithm implemented in the tree search complexity of algorithm is more reduced. In tree search Tree pruning strategies are used to reduce the more difficulty in the tree search based algorithms. The basic idea is to reduce the number of tree nodes visited to achieve a ML result. The decision where to visit a node or prune it is based on its Partial Euclidean Distance(PED). Depending upon tree pruning strategy the algorithm achieve optimal BER.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124008096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of fuzzy PID controller for SO2 emission control process","authors":"L. Kanimozhi, C. Maheswari, K. Krishnamurthy","doi":"10.1109/ICCCT2.2015.7292755","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292755","url":null,"abstract":"This paper mainly contributes to reduce the environmental effects induced by the combustion of coal that results in the emission of toxic sulphur dioxide (SO2). For the reduction of SO2, Flue Gas Desulphurization (FGD) is the most commonly used method. In our work, mathematical modelling of hydrogen peroxide based FGD has been developed. A fuzzy based PID controller is developed for SO2 emission control process using MATLAB/SIMULINK platform. By selecting appropriate fuzzy rules, the parameters Kp, Ki and Kd of the PID controller are tuned and the performance of the developed fuzzy based PID controller is compared with the conventional controllers such as ZN (Ziglar-Nichols) and IMC (Internal Model Control) PID controllers. The error indices such as ISE, IAE, ITAE and quality indices such as tr, ts, %Mp of the developed fuzzy PID controller produce better control actions than conventional ZN and IMC PID controllers.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132769388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A reliable and secure data transmission in CEAACK MANETs using Distinct Dynamic Key with classified Digital Signature Cryptographic Algorithm","authors":"J. Sathiamoorthy, B. Ramakrishnan, M. Usha","doi":"10.1109/ICCCT2.2015.7292735","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292735","url":null,"abstract":"CEAACK MANETs are vulnerable to attacks and this can be reduced by employing a cluster mechanism which ensures that packet transmission occurs without unnecessary delay. Clustering can be made effective in CEAACK MANETs by opting for a cluster head mechanism which ensures that control rests with a single powerful node within a cluster. This cluster head takes on the responsibility of routing the packets efficiently by coordinating with the base station. Cluster heads are also prone to malicious attacks and is affected more than a normal network. In this paper we try to incorporate a new approach in CEAACK MANETs by implementing a cryptographic technique to tackle the vulnerabilities of the network. This cryptographic is highly secure which uses a distinct classified digital key which can be generated dynamically using the Advanced Encryption Standard(AES) Algorithm. This technique can ensure that data is securely transmitted in a reliable manner. This scheme aims at transmission efficiency and also tries to reduce the intrudes in CEAACK MANETs.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134637958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}