2014 International Conference on Recent Trends in Information Technology最新文献

筛选
英文 中文
Analysis of acoustic signals from rotating machines for wear detection 用于磨损检测的旋转机械声信号分析
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996206
N. Iyer, Suresh R. Norman
{"title":"Analysis of acoustic signals from rotating machines for wear detection","authors":"N. Iyer, Suresh R. Norman","doi":"10.1109/ICRTIT.2014.6996206","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996206","url":null,"abstract":"Automated Condition Monitoring (ACM) of rotating machines is necessary to avoid sudden machine breakdown due to wear and tear of Rolling Element Bearings (REBs). Hence, detecting faults in REBs well before machine outage is important. The aim of the proposed system is to develop a prototype to detect mechanical wear, by capturing acoustic signals with frequencies between 20 Hz to 20 kHz, from the machine under test, using non-contact electret microphone sensor. The frequency spectra of the acoustic signal from a healthy bearing is compared with the acquired acoustic signal. This system aids in scheduled replacement of faulty parts, thereby reducing the machine downtime, increasing reliability and customer satisfaction, but the results do not infer on the severity of the fault present in the REBs. The system also helps in predicting Remaining Useful Life (RUL) of the machine under consideration.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126225702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CORDIC iterations based architecture for low power and high quality DCT 基于CORDIC迭代的低功耗高质量DCT体系结构
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996195
E. Leavline, S. Megala, D. A. A. G. Singh
{"title":"CORDIC iterations based architecture for low power and high quality DCT","authors":"E. Leavline, S. Megala, D. A. A. G. Singh","doi":"10.1109/ICRTIT.2014.6996195","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996195","url":null,"abstract":"Discrete Cosine Transform (DCT) is widely used in image and video compression standards. This paper presents low-power co-ordinate rotation digital computer (CORDIC) based reconfigurable architecture for discrete cosine transform (DCT). All the computations in DCT are not equally important in generating the frequency domain output. Considering the important difference in the DCT coefficients the number of CORDIC iterations can be dynamically changed to reduce the power of consumption with improved image quality. The proposed CORDIC based 2D DCT architecture is simulated using Modelsim and the experimental results show that our reconfigurable DCT achieves power savings with improved image quality.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"431 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123595913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Semi - Markov based node behavior model for isolating selfish neighbors in MANETs 基于半马尔可夫节点行为模型的自利邻居隔离
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996155
J. Sengathir, R. Manoharan, R. Raja Kumar
{"title":"Semi - Markov based node behavior model for isolating selfish neighbors in MANETs","authors":"J. Sengathir, R. Manoharan, R. Raja Kumar","doi":"10.1109/ICRTIT.2014.6996155","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996155","url":null,"abstract":"Reliable dissemination of data in mobile ad hoc network necessitates high degree of connectivity among the nodes present in that environment. The existence of selfish nodes could drastically affect the network connectivity. However, the impact of selfish nodes on network connectivity has been studied either through reputation factor computed based on past history or conditional probability manipulated based on both the past and present behavior of nodes. Hence, a need arises for formulating a mathematical model that makes its future routing decision only based on the present context of the node. In this paper, we propose a Semi-Markov based mathematical model, which isolates selfish nodes exponentially. In particular, we stochastically analyze the network resilience with the aid of transition probability matrix. The effectiveness of the proposed model for network survivability has been verified through quantitative analysis. The numerical results, thus obtained make it evident that the network survivability decreases when the number of selfish nodes increases in an ad hoc scenario.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121600073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EmoMeter: Measuring mixed emotions using weighted combinational model 情绪测量:使用加权组合模型测量混合情绪
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996192
S. Kanagaraj, A. Shahina, M. Devosh, N. Kamalakannan
{"title":"EmoMeter: Measuring mixed emotions using weighted combinational model","authors":"S. Kanagaraj, A. Shahina, M. Devosh, N. Kamalakannan","doi":"10.1109/ICRTIT.2014.6996192","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996192","url":null,"abstract":"Emotion Recognition is an important area of affective computing and has potential applications. This paper proposes a combinational model to compute the percentage of different emotions jointly present in a given speech input. This model is a weighted combination of the classifier models like Neural Network, k-Nearest Neighbors, Gaussian Mixture Model, Naïve Bayesian Classifier and Support Vector Machines is proposed. The results of classification from the individual models are reported and compared with the proposed combinational model. It shows that the best performance is achieved using the proposed combination than the individual models.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129536680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Peak: Power efficiency analysis for key distribution in Wireless Sensor Network 峰值:无线传感器网络中密钥分配的功率效率分析
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996202
M. Raghini, N. Maheswari, R. Venkatesh
{"title":"Peak: Power efficiency analysis for key distribution in Wireless Sensor Network","authors":"M. Raghini, N. Maheswari, R. Venkatesh","doi":"10.1109/ICRTIT.2014.6996202","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996202","url":null,"abstract":"Secure Distributed Wireless Sensor Network (DWSN) is empowered by using an efficient key management technique. Battery powered sensor nodes faces precarious aspects during key distribution in order to reduce the energy consumption for the components of sensor nodes. Thus, implementing a key distribution algorithm should possess minimum power consumption. The proposed work steps towards greater heights by integrating power module with pairwise key establishment using group configuration methodology. We present an investigation of power consumption using STEM (Sparse Topology and Energy Management) protocol on sensor nodes (SNs) during the pairwise key establishment using graphical tools. Further memory utilization is reduced due to less number of keys generated from group configuration methodology. Analytical results of this PEAK (Power Efficiency Analysis for Key Distribution) show that energy efficiency is increased with sensor nodes while establishing pairwise key using group configuration when compared to existing key predistribution techniques.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133306650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic secure storage system in cloud services 云服务中的动态安全存储系统
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996175
G. J. Rathanam, M. Sumalatha
{"title":"Dynamic secure storage system in cloud services","authors":"G. J. Rathanam, M. Sumalatha","doi":"10.1109/ICRTIT.2014.6996175","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996175","url":null,"abstract":"Nowadays storage systems are now exposed to wide numbers of threat while handling the information in cloud service. Therefore we design a secured storage system for ensuring security and dynamic operation in the environment. The data is stored in the server using dynamic data operation with partitioning method. Improved Adaptive Huffman Technique and Improved RSA Double Encryption Technique also used which enables the user to access process in a secure manner and efficient way. The system does a verification to prevent the loss of data and ensures security with storage integrity method. An efficient distributed storage auditing mechanism is implemented to overcome the limitations in handling the data loss. Security in this service enforces error localization and easy detection of misbehaving server. In nature the data are dynamic in cloud service; hence this process aims to store the data with reduced computational cost, space and time consumption.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132204587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Graph based resource recommender system 基于图的资源推荐系统
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996187
P. Pabitha, G. Amirthavalli, C. Vasuki, J. Mridhula
{"title":"Graph based resource recommender system","authors":"P. Pabitha, G. Amirthavalli, C. Vasuki, J. Mridhula","doi":"10.1109/ICRTIT.2014.6996187","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996187","url":null,"abstract":"As technology improves day by day communication and browsing has become very much easier. However lots of information floods over the internet every moment thereby confusing the user as to select what or make decisions. To assist the user in identifying their interests and provide suggestions, recommendation systems came into existence. These systems filter the necessary content from large volumes of data to predict resources to the user. Common techniques used to implement recommender systems are content based approach or collaborative approach. However there are few limitations like data not being available for new users, ratings very sparse for resources. A graph based recommender system is proposed that makes useful recommendations by exploiting the significant content available. Clustering technique is used to identify the neighbourhood of the current user so that relevant resources are suggested. A weight based approach is used to calculate the ratings for the resources. This method is adopted to make the system less prone to data sparsity problem. This system is a web based client side application which makes recommendations by constructing user-resource graph and ranking the resources by a new method designed similar to that of search algorithms.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125738541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flow and rank correlation based detection against Distributed Reflection Denial of Service attack 基于流量和等级相关性的分布式反射拒绝服务攻击检测
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996117
P. Revathi
{"title":"Flow and rank correlation based detection against Distributed Reflection Denial of Service attack","authors":"P. Revathi","doi":"10.1109/ICRTIT.2014.6996117","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996117","url":null,"abstract":"Denial of service attack in computing involves blocking of resources to particular user. This kind of blocking may be temporary or indefinite blocking to access web server in the network. This attack is usually done by a victim web server. Distributed denial of service attacks is given by more than two web servers. The flood of incoming network flows to the victim web server forces it to shut down. Although the attack's individual internet packets may be completely not dangerous and flood of such type of packets can overwhelm the victim server's internet connection or other packet-processing resources in the network. The result is that valid traffic, unable to compete with malicious flood, has little chance for obtaining useful service to legitimate users. This paper mainly concentrates on flow and rank correlation based algorithm (FRCD). With rank correlation we can check if there is any attack in the network or not. And having this as the base we could calculate flow correlation to check if this attack is legitimate or not. The proposed system is highly efficient and is a protocol independent method. The computational cost involved does not affect the network's throughput thereby increasing the possibilities of Distributed Reflection Denial of Service attack detection.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124653387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An impact analysis: Real time DDoS attack detection and mitigation using machine learning 影响分析:使用机器学习进行实时DDoS攻击检测和缓解
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996133
B. Kiruthika, Devi, G. Preetha, G. Selvaram, S. Mercy, Shalinie Corresponding
{"title":"An impact analysis: Real time DDoS attack detection and mitigation using machine learning","authors":"B. Kiruthika, Devi, G. Preetha, G. Selvaram, S. Mercy, Shalinie Corresponding","doi":"10.1109/ICRTIT.2014.6996133","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996133","url":null,"abstract":"Distributed Denial of service (DDoS) attacks is the most devastating attack which tampers the normal functionality of critical services in internet community. DDoS cyber weapon is highly motivated by several aspects including hactivitism, personal revenge, anti-government force, disgruntled employers/customers, ideological and political cause, cyber espionage and so on. IP spoofing is the powerful technique used by attackers to disrupt the availability of services in the internet network by impersonating as a trusted source. Since the spoofed traffic shares the same resources as that of the legitimate one's detection and filtering becomes very essential. The proposed model consists of online monitoring system (OMS), spoofed traffic detection module and interface based rate limiting (IBRL) algorithm. OMS provides DDoS impact measurements in real time by monitoring the degradation in host and network performance metrics. The spoofed traffic detection module incorporates hop count inspection algorithm (HCF) to check the authenticity of incoming packet by means of source IP address and its corresponding hops to destined victim. HCF coupled with support vector machine (SVM) provides 98.99% accuracy with reduced false positive. Followed with, IBRL algorithm restricts the traffic aggregates at victim router when exceeding system limits in order to provide sufficient bandwidth for remaining flows.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128792697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Distributing jobs in Delay-Tolerant Networks: Is optimization worth it? 在延迟容忍网络中分配作业:优化是否值得?
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996205
Akhilesh Jain, Prem Nath Suman, Kapil Tawar, Mayank Jain
{"title":"Distributing jobs in Delay-Tolerant Networks: Is optimization worth it?","authors":"Akhilesh Jain, Prem Nath Suman, Kapil Tawar, Mayank Jain","doi":"10.1109/ICRTIT.2014.6996205","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996205","url":null,"abstract":"Delay-Tolerant Networks (DTNs) refer to mobile wireless networks that lack continuous network connectivity among the nodes. To deal with such intermittent characteristics, DTNs use store-carry-and-forward based routing protocols instead of instantaneous end-to-end path transmissions. Many real-life applications of such networks have been identified and some of them pose complex computational challenges. DTN nodes, however, do not necessarily possess high degree of computational power and are also limited by their energy constraints. Distributed computing has the ability to solve computationally complex and lengthy problems by dividing them into many tasks, which are then spread over the network to be solved simultaneously, resulting in faster execution and significantly lower costs. In this paper, we study the prospect of distributed computing techniques in DTNs. We investigate different job distribution algorithms and their performance across multiple DTN scenarios. We simulate a distributed job processing system on top of a DTN for various scenarios and analyze the effect of node density, job slicing, and mobility models on their performance.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129916931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信