2014 International Conference on Recent Trends in Information Technology最新文献

筛选
英文 中文
DigiCloud: Scrutinizing apt service for coping with confidential control over utility practice DigiCloud:审查适当的服务,以应对公用事业实践的机密控制
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-12-29 DOI: 10.1109/ICRTIT.2014.6996162
T. Prasath, R. Vijayalakshmi, Krishnarao Arthi
{"title":"DigiCloud: Scrutinizing apt service for coping with confidential control over utility practice","authors":"T. Prasath, R. Vijayalakshmi, Krishnarao Arthi","doi":"10.1109/ICRTIT.2014.6996162","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996162","url":null,"abstract":"In day today emerging trends utility services, cloud and green computations are playing the major task. The Utilities based paradigm provides many services for general public and other business activities. In the middle end cloud plays the vital role in shifting towards computational paradigm and pays way for users to utilize the resources anywhere at any time. In the current trend green replaces cloud with the effective performance evaluation strategy, with proper resource utilization without any waste of resource not in use. In this paper, it aims at developing digital cloud based utility management to enhance security based metering and billing service by using monitoring strategy. The security based monitoring service provides the way for the utility usage service, to maintain the efficient billing strategy as per the metering service. It also provides zonal wide substation monitoring and base station monitoring services are enhanced to track in with proper usage of utilities by the general public. In the existing service analog based metering services are allowed, but the identification of electric hack is very high in the perspective of security and monitoring. Here the advanced digital based cloud fault detection management is enhanced and security, monitoring is improved.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127897557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and performance tradeoff analysis of floating point datapath in LTE downlink control channel receiver LTE下行控制信道接收机中浮点数据路径的设计与性能权衡分析
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996131
S. A. Abbas, S. Susithra, D. Priya, S. Thiruvengadam
{"title":"Design and performance tradeoff analysis of floating point datapath in LTE downlink control channel receiver","authors":"S. A. Abbas, S. Susithra, D. Priya, S. Thiruvengadam","doi":"10.1109/ICRTIT.2014.6996131","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996131","url":null,"abstract":"Long Term Evolution (LTE) receiver processing involves decoding of complex valued received symbols from each antenna port to detect the codeword sent by the transmitter. The main objective of this paper is to design and implement the receiver hardware architectures for the control channels, PCFICH (Physical Control Format Indicator Channel) and PHICH (Physical Hybrid ARQ Indicator Channel) using fixed point and IEEE 754 single precision floating point arithmetic units for single input single output (SISO) configuration and validate their performance based on the signal to noise ratio (SNR) and mean square error (MSE) or the decision values for detecting the code words received. Floating point based receiver has an edge over fixed point in terms of reduced developing time, reduced complexity, higher accuracy, higher precision and tolerance to error but at the cost of increased hardware. Floating point based receivers employing folding and superscalar techniques to optimize the architectures through reduction in resource utilization are synthesized and implemented. ModelSim 6.4a is used to simulate the results while the architecture is implemented in Virtex-6 FPGA device using Xilinx-Plan Ahead tool.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115367802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New fast search block matching Motion Estimation algorithm for H.264 /AVC H.264 /AVC下新的快速搜索块匹配运动估计算法
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996139
T. Muralidhar Reddy, P. Muralidhar, C. Rama Rao
{"title":"New fast search block matching Motion Estimation algorithm for H.264 /AVC","authors":"T. Muralidhar Reddy, P. Muralidhar, C. Rama Rao","doi":"10.1109/ICRTIT.2014.6996139","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996139","url":null,"abstract":"Video encoding algorithms with less complexity are required in many real time video coding applications. Motion Estimation (ME) is computationally intensive part of video compression. This paper introduces One bit transformation ME algorithm, which transforms the video sequences from multi-bit to a single bit per pixel representation and then used conventional motion estimation search strategies, this will reduce the arithmetic calculations and hardware complexity while maintaining almost good compression performance. In this paper, we propose an efficient fast search ME method for one bit transform to reduce computations involved in determining motion of blocks in a frame. The proposed Fast search algorithm effectively estimates the motion information in video. Experimental results shows 50% reduction in computations with a marginal loss of 3% PSNR compared to the conventional Exhaustive search algorithm.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116939315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trust model for privacy in social networking using probabilistic determination 基于概率确定的社交网络隐私信任模型
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996179
Preeti Yadav, Savita Gupta, S. Venkatesan
{"title":"Trust model for privacy in social networking using probabilistic determination","authors":"Preeti Yadav, Savita Gupta, S. Venkatesan","doi":"10.1109/ICRTIT.2014.6996179","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996179","url":null,"abstract":"With the advancement in the technology, this era of Internet has witnessed a bloom in the Social Networking sites popularity. Social Networking sites facilitate the users with features like sharing personal information, making friends, developing new relationships, giving rise to new privacy concerns, etc., allowing only reliable people in one's network. Here comes in the concept of `Trust'. How can we assure that a person is trustworthy and what factors account to build the trust between two persons, known or unknown to each other? This requires an exploratory insight into users' intention to share information. This paper aims to understand the factors of trust, trust levels based on trust ratings from others and probability of accepting the other person in his/her network.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115566555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reputation-enhanced similarity-based dynamic service discovery framework for service-based applications 基于声誉增强的基于相似性的动态服务发现框架,用于基于服务的应用程序
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996120
Jenith G. Delphin, R. Purushothaman
{"title":"Reputation-enhanced similarity-based dynamic service discovery framework for service-based applications","authors":"Jenith G. Delphin, R. Purushothaman","doi":"10.1109/ICRTIT.2014.6996120","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996120","url":null,"abstract":"Service-based applications are applications that make use of one or more autonomous computer-based entities owned by third parties known as services, to perform their functions. The identification of similar, reputed services during the execution of service-based applications to replace services in them that are no longer available is an important issue. This paper proposes a framework to support dynamic service discovery. The users subscribe with the framework and submit their request for services. The framework is integrated with a Web service repository, where the service providers publish their services with QoS specification. The framework also collects the user ratings of services. To discover services, first the framework finds the similarity between functional and quality characteristics of services in the repository and the user requests. Then it calculates the reputation score of the services based on the ratings collected. Based on the similarity score and reputation score, the framework lists and ranks a set of candidate services for replacement. The framework can perform service discovery both proactively and reactively. Thus the framework provides an effective, user-friendly and flexible approach for run time service identification for service-based applications.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128331243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The development of syllable based text to speech system for Tamil language 泰米尔语基于音节的文本转语音系统的发展
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996126
M. Karthikadevi, K. .. Srinivasagan
{"title":"The development of syllable based text to speech system for Tamil language","authors":"M. Karthikadevi, K. .. Srinivasagan","doi":"10.1109/ICRTIT.2014.6996126","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996126","url":null,"abstract":"Speech synthesis is the most significant applications in linguistic communication process. The Text to Speech structure is the undertaking of accepts the input sentence and converts the audible speech as output. The Tamil language may be a syllable based language. A syllable is the unit of language, which may be spoken independent of the adjacent phones. It consists of an interrupted portion of sound, once the word is pronounced. The task of proposed Text to Speech System for Tamil language includes syllabication, Letter-to-Sound rules and concatenation. Syllabication is that the method of distinguishing the linguistic unit units, that is presented within the given input. The Trainable Text syllabication algorithm is employed for deriving the syllables. The Letter to Sound mapping technique is employed for changing the text to phonemes. These phonemes square measure mapped with the waveform that may be a recorded sound file, which can be a variety of wave files. The recorded sounds are concatenated by Unit selection Speech Synthesis algorithm, which uses the massive databases of recorded speech. The efficient joining cost is required to be calculated for locating the best sequence of speech as synthesized output. Java Media Framework speak engine is employed to synthesis the speech. The proposed text to speech system founded on syllable unit for Tamil language is employed to boost the excellence of speech.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128426052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Highly correlated feature set selection for data clustering 用于数据聚类的高度相关特征集选择
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996215
M. Sumalatha, M. Ananthi, A. Arvind, N. Navin, C. Siddarth
{"title":"Highly correlated feature set selection for data clustering","authors":"M. Sumalatha, M. Ananthi, A. Arvind, N. Navin, C. Siddarth","doi":"10.1109/ICRTIT.2014.6996215","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996215","url":null,"abstract":"Feature set selection is the process of identifying a subset of features which produces the result same as the entire set. The feature set selection helps in clustering the datasets. In this paper, a Highly Correlated Feature set Selection (HCFS) algorithmis proposed for clustering the data. This algorithm helps in selecting features based on its relevancy and redundancy factors. All the selected features are finally clustered based on how they are correlated with each other. The main objective of this paper is to identify the feature subsets which will improve the classification performance by constructing minimum spanning tree (MST) between the features.The HCFS algorithm works in two steps. In the first step, the features are divided into clusters using the spanning tree construction process. In the second step, the cluster representatives are selected using Frequent Pattern Analysis (FPA) technique to form the effective feature set which reduces the time required for query evaluation process. The redundant and irrelevant features are removed based on their Symmetric Uncertainty (SU) values. This effectively improves the efficiency of data clustering process.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128721559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cluster based enhanced sybil attack detection in MANET through integration of RSSI and CRL 集成RSSI和CRL的基于集群的MANET增强符号攻击检测
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996207
R. V. Kumar, P. Ramesh, H. A. Rauf
{"title":"Cluster based enhanced sybil attack detection in MANET through integration of RSSI and CRL","authors":"R. V. Kumar, P. Ramesh, H. A. Rauf","doi":"10.1109/ICRTIT.2014.6996207","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996207","url":null,"abstract":"Fully self-controlled mobile ad hoc networks represent a complex system. Due to the broadcast nature of wireless channel, MANET has many security issues. Especially, Sybil Attack is a very serious threat to the MANET as it creates multiple virtual fake identities per entity, there by affecting the routing table. The multiple virtual identities are obtained by spoofing the victim's node or by creating an arbitrary node as there is no restriction to create an arbitrary node in MANET. In the existing system, author has used RSSI as a parameter to detect the Sybil node because of its lightweight but it has failed to detect the fast moving Sybil nodes. The proposed system works considering the Certification Authority as one parameter and RSSI as the other parameter. The RSSI is used to form the cluster and to elect the cluster head. The CA's responsibility is given to the CH. Whenever huge variations occur in RSSI on neighbour's entry and exit behaviour, the Certification Authority comes into play. The CA checks the certification of a node. If it is not valid, its certificate is revoked otherwise it is free to communicate in the network.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129314120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Event matching based on subscriber category in sensor cloud 传感器云中基于用户类别的事件匹配
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996171
S. Grace, M. Sumalatha
{"title":"Event matching based on subscriber category in sensor cloud","authors":"S. Grace, M. Sumalatha","doi":"10.1109/ICRTIT.2014.6996171","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996171","url":null,"abstract":"Sensor cloud infrastructure is composed of wireless sensor network and cloud computing technology. The limitation of wireless sensor network can be overcome by integrating it with cloud. The sensor data are collected and stored in cloud for processing that helps to make real time alert in critical situation used for future analysis. Distributing the sensor data to appropriate subscriber is more important. In existing work many event matching algorithms are discussed. The matching is performed on the basis of their predicates and requires more space for indexing all the predicate values. In our proposed work publisher/subscriber model has been taken. In the first stage, subscriptions are categorized on the basis of their privilege and in next stage the events will be matched to the subscription. By this method the subscription storing and matching can be made easier and faster.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121545945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Intrusion detection in MANET using Self Organizing Map (SOM) 基于自组织映射(SOM)的MANET入侵检测
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996118
V. Dinesh Kumar, S. Radhakrishnan
{"title":"Intrusion detection in MANET using Self Organizing Map (SOM)","authors":"V. Dinesh Kumar, S. Radhakrishnan","doi":"10.1109/ICRTIT.2014.6996118","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996118","url":null,"abstract":"Mobile Ad-hoc networks (MANET) are formed with dynamism and upheld by individual hosts in a network. In these type of networks all communication occurs through a wireless medium and the nature of the network is decentralized and dynamic. Hence it probes for a number of security problems and in order provide security against malicious attacks, Intrusion Detection System (IDS) is commonly used as a second route of protection in MANET. Intrusion detection models are used to detect the attacks based on the patterns and alerts in case of intruders are being met with the system. In this paper, we propose and implement intrusion-detection system grounded on artificial neural network model such as Self-Organizing Map (SOM) based competitive network, which in turn plays a vital role in detection of malicious nodes based on input data patterns. The proposed model deals with different types of attacks and their detection approach based on SOM model. The approach aids at increasing Detection rate as well as reducing the False alarm rate, which in turn helps to detect those attacks before it makes larger damage to the network and prevent them with supportive techniques and increase the network performance. The experimental results of proposed model is evaluated under different parameters.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130422719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信