2015 International Conference on Computing and Communications Technologies (ICCCT)最新文献

筛选
英文 中文
Evolution strategy classification utilizing meta features and domain-specific statistical a priori models for fully-automated and entire segmentation of medical datasets in 3D radiology 利用元特征和领域特定统计先验模型的进化策略分类,用于3D放射学中医疗数据集的全自动和完整分割
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292712
G. Zwettler, W. Backfrieder
{"title":"Evolution strategy classification utilizing meta features and domain-specific statistical a priori models for fully-automated and entire segmentation of medical datasets in 3D radiology","authors":"G. Zwettler, W. Backfrieder","doi":"10.1109/ICCCT2.2015.7292712","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292712","url":null,"abstract":"The employment of modern machine learning algorithms marks a huge advance towards automated and generalized segmentation in medical image analysis. Entire radiological datasets are classified, leading to a meaningful morphological interpretation, clearly distinguishing pathologies. After standard pre-processing, e.g. smoothing the input image data, the entire volume is partitioned into a large number of sub-regions utilizing watershed transform. These fragments are atomic and fused together building contiguous structures representing organs and typical morphology. This fusion is driven by similarity of regions. The relevant similarity measures respond to statistical a-priori models, derived from training datasets. In this work, the applicability of evolution strategy as classifier for a generic image segmentation approach is evaluated. Furthermore, it is analyzed if accuracy and robustness of the segmentation are improved by incorporation of meta features evaluated on the entire classification solution besides local features evaluated for the pre-fragmented regions to classify. The proposed generic strategy has a high potential in new segmentation domains, relying only on a small set of reference segmentations, as evaluated for different imaging modalities and diagnostic domains, such as brain MRI or abdominal CT. Comparison with results from other machine learning approaches, e.g. neural networks or genetic programming, proves that the newly developed evolution strategy is highly applicable for this classification domain and can best incorporate meta features for evaluation of solution fitness.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132287001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cluster based signature evaluation mechanism for protecting the user data in cloud environment through fuzzy ordering approach 一种基于聚类的签名评估机制,利用模糊排序的方法对云环境下的用户数据进行保护
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292782
R. Poorvadevi, S. Rajalakshmi
{"title":"A cluster based signature evaluation mechanism for protecting the user data in cloud environment through fuzzy ordering approach","authors":"R. Poorvadevi, S. Rajalakshmi","doi":"10.1109/ICCCT2.2015.7292782","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292782","url":null,"abstract":"A Fuzzy set techniques which perhaps eliminate the several ambiguities on the particular issue to take right decision. Users may prefer the fuzzy approaches for their internal computation conflicts or manipulation to access boundless of data from cloud. Even though we have many security approaches, users are facing massive difficulties to safeguard their owning data in cloud environment. Protecting the confidential data from various hackers is the tedious problem in the current trend. So, possibly we will achieve the efficient security outcome by applying the different set of security principles. This proposed model is well suitable for securing the user confidential information's from the attackers in any situation. It focuses on clustering the different sort of input factors of customer validation attributes and evaluates these attributes to ensure the authenticity of unique users in cloud environment by ranking the distinguished threshold levels to prove user authentication function.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131408478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Traffic Analysis of cloud data centre 云数据中心网络流量分析
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292785
S. Sankari, P. Varalakshmi, B. Divya
{"title":"Network Traffic Analysis of cloud data centre","authors":"S. Sankari, P. Varalakshmi, B. Divya","doi":"10.1109/ICCCT2.2015.7292785","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292785","url":null,"abstract":"Software Defined Network (SDN) is a network design that separate the control plane and data plane. The data plane network carries user traffic. The control plane network carries the network brainpower and policy establishment to an application called a controller. In SDN based data centre, an Open Virtual Switch (OVS) runs on the server is to improve the overall network performance designed to analyse the traffic flow using Open Flow Protocol (OFP) in the Data Centre Network (DCN). The network is designed using fat tree topology in the proposed system. This topology is full bisectional bandwidth and it is potential for an indiscriminate host in the data centre to commune with any other host in the network. The fat tree topology is easy to analyze the link utilization and time series of traffic on edge. Data centre network architecture is proposed for traffic generation and its analysis purpose.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114520849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A SCA-resistant processor architecture based on random delay insertion 一种基于随机延迟插入的抗sca处理器结构
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292760
Zhangqing He, B. Yang, X. Deng, Kui Dai, X. Zou
{"title":"A SCA-resistant processor architecture based on random delay insertion","authors":"Zhangqing He, B. Yang, X. Deng, Kui Dai, X. Zou","doi":"10.1109/ICCCT2.2015.7292760","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292760","url":null,"abstract":"Random delay insertion is a simple and efficient approach to counter side-channel attacks, but previous methods do not have the ideal protective effect. In this article, based on random delay insertion, an effective processor architecture resistant to side-channel attacks was proposed. It used a combination of randomized scheduling, randomized instruction insertion and randomized pipeline-delay to resist side-channel attacks. On the base of ARM7 processor, we implemented this architecture and the implementation results showed that this processor has increased approximate 24.3% in hardware area than the original ARM7 processor. The CPA attack experiment results suggested that our new secure processor have high capacity to resist side-channel attacks and thus could be used in USBKEY, Smart CARD and other application scenarios which require extremely high security level.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124890241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Traffic Engineering based on spectral radius in optical networks 基于频谱半径的光网络流量工程
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292747
V. Anusuya, D. Sheela, C. Chellamuthu
{"title":"Traffic Engineering based on spectral radius in optical networks","authors":"V. Anusuya, D. Sheela, C. Chellamuthu","doi":"10.1109/ICCCT2.2015.7292747","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292747","url":null,"abstract":"The purpose of Traffic Engineering is to facilitate efficient and consistent network performance with simultaneous focusing on optimizing network resource utilization and traffic performance. A network can be represented as a graph with nodes as vertices and links as edges. Spectral graph theory is a useful study on the relationship between graph properties and the spectrum of the adjacency matrix or Laplace matrix. In this paper, an important spectral graph parameter known as spectral radius is considered. This paper proposes an approach in which the links are identified based on their significance in terms of spectral radius and the capacity is assigned to the links accordingly. The performance of the proposed scheme is tested on backbone optical networks in terms of network congestion and resource requirements which are the main objectives of traffic engineering.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131126923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized local route repair and congestion control in Mobile Ad hoc Network 移动自组网中优化的本地路由修复和拥塞控制
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292770
P. Ranjan, R. L. Velusamy
{"title":"Optimized local route repair and congestion control in Mobile Ad hoc Network","authors":"P. Ranjan, R. L. Velusamy","doi":"10.1109/ICCCT2.2015.7292770","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292770","url":null,"abstract":"Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes which are autonomous, self organized and dynamic in nature. In this network due to mobility nodes are moving randomly, resulting in topology change. This topology change leads to frequent breakage of link. To repair the broken link AODV and DSR uses broadcasting mechanism. Broadcasting floods control packets. Flooding results in congestion due to limited buffer space, bandwidth, and battery power of mobile nodes. Congestion leads to dropping of packets resulting in decrease of network performance. Congestion can be avoided if the numbers of control packets are reduced. In this paper a new algorithm is proposed which avoid the congestion and repair the broken link by choosing a set of limited nodes for alternate route based on the quadrant position, battery status, queue length, and forwarding region. The proposed solution is termed as Improved Optimum Angle Selection AODV (IOAS-AODV) routing algorithm. This proposed solution is implemented, tested and the performance is analyzed. From the results it is observed that the proposed solution improves the routing performance such as throughput, end to end delay, routing overhead, and packet delivery ratio.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133611558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and performance analysis of visible light communication system through simulation 通过仿真对可见光通信系统进行设计与性能分析
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292748
K. Sindhubala, B. Vijayalakshmi
{"title":"Design and performance analysis of visible light communication system through simulation","authors":"K. Sindhubala, B. Vijayalakshmi","doi":"10.1109/ICCCT2.2015.7292748","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292748","url":null,"abstract":"An NRZ OOK visible light communication system is designed and simulated, using a white LED of wavelength 450 nm and a Photodetector. Ambient light noise source such as fluorescent lamp generated by conventional ballast is one of the important sources of degradation which affects the performance of the communication system. By using rectangular optical filter before the photodiode at the receiver, it reduces the ambient noise, improves the BER and clear eye diagram is achieved. Simulation of VLC system is done by using optisystem software. In this paper, performance analysis of optical to electrical power conversion, BER, Threshold, eye opening is done with respect to distance between the transmitter and receiver.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129483372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Single tree search sphere decoding algorithm for MIMO communication system MIMO通信系统的单树搜索球解码算法
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292753
P. Prakash, M. Kannan
{"title":"Single tree search sphere decoding algorithm for MIMO communication system","authors":"P. Prakash, M. Kannan","doi":"10.1109/ICCCT2.2015.7292753","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292753","url":null,"abstract":"Multiple Input Multiple Output (MIMO) systems utilize many antennas at both transmitter and receiver for higher Bandwidth efficiency. The implementation of MIMO detection becomes a difficult task as the computational complexity increases with the number of transmitting antenna and constellation size increases. The decoder for a 4*4 MIMO system with 16-QAM modulation and spatial multiplexing is implemented using Matlab. Difficult part is MIMO detection; ML decoding cannot be implemented directly because increase the complexity exponentially if size of constellation and number of transmit antenna increases. Sphere decoding reduce the complexity of decoding with some improvement with the decoding rate and BER. In my project sphere decoding combined with single tree search and ML decoding greatly improve the decoding Rate and BER. In sphere decoding selecting the sphere radius is very important. Sphere decoding algorithm implemented in the tree search complexity of algorithm is more reduced. In tree search Tree pruning strategies are used to reduce the more difficulty in the tree search based algorithms. The basic idea is to reduce the number of tree nodes visited to achieve a ML result. The decision where to visit a node or prune it is based on its Partial Euclidean Distance(PED). Depending upon tree pruning strategy the algorithm achieve optimal BER.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124008096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of fuzzy PID controller for SO2 emission control process 二氧化硫排放控制过程模糊PID控制器的实现
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292755
L. Kanimozhi, C. Maheswari, K. Krishnamurthy
{"title":"Implementation of fuzzy PID controller for SO2 emission control process","authors":"L. Kanimozhi, C. Maheswari, K. Krishnamurthy","doi":"10.1109/ICCCT2.2015.7292755","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292755","url":null,"abstract":"This paper mainly contributes to reduce the environmental effects induced by the combustion of coal that results in the emission of toxic sulphur dioxide (SO2). For the reduction of SO2, Flue Gas Desulphurization (FGD) is the most commonly used method. In our work, mathematical modelling of hydrogen peroxide based FGD has been developed. A fuzzy based PID controller is developed for SO2 emission control process using MATLAB/SIMULINK platform. By selecting appropriate fuzzy rules, the parameters Kp, Ki and Kd of the PID controller are tuned and the performance of the developed fuzzy based PID controller is compared with the conventional controllers such as ZN (Ziglar-Nichols) and IMC (Internal Model Control) PID controllers. The error indices such as ISE, IAE, ITAE and quality indices such as tr, ts, %Mp of the developed fuzzy PID controller produce better control actions than conventional ZN and IMC PID controllers.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132769388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A reliable and secure data transmission in CEAACK MANETs using Distinct Dynamic Key with classified Digital Signature Cryptographic Algorithm 采用不同动态密钥和分类数字签名加密算法实现CEAACK网络中可靠、安全的数据传输
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292735
J. Sathiamoorthy, B. Ramakrishnan, M. Usha
{"title":"A reliable and secure data transmission in CEAACK MANETs using Distinct Dynamic Key with classified Digital Signature Cryptographic Algorithm","authors":"J. Sathiamoorthy, B. Ramakrishnan, M. Usha","doi":"10.1109/ICCCT2.2015.7292735","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292735","url":null,"abstract":"CEAACK MANETs are vulnerable to attacks and this can be reduced by employing a cluster mechanism which ensures that packet transmission occurs without unnecessary delay. Clustering can be made effective in CEAACK MANETs by opting for a cluster head mechanism which ensures that control rests with a single powerful node within a cluster. This cluster head takes on the responsibility of routing the packets efficiently by coordinating with the base station. Cluster heads are also prone to malicious attacks and is affected more than a normal network. In this paper we try to incorporate a new approach in CEAACK MANETs by implementing a cryptographic technique to tackle the vulnerabilities of the network. This cryptographic is highly secure which uses a distinct classified digital key which can be generated dynamically using the Advanced Encryption Standard(AES) Algorithm. This technique can ensure that data is securely transmitted in a reliable manner. This scheme aims at transmission efficiency and also tries to reduce the intrudes in CEAACK MANETs.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134637958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信