Kirthanaa Raghuraman, Monisha Senthurpandian, Monisha Shanmugasundaram, Bhargavi, V. Vaidehi
{"title":"Online Incremental Learning Algorithm for anomaly detection and prediction in health care","authors":"Kirthanaa Raghuraman, Monisha Senthurpandian, Monisha Shanmugasundaram, Bhargavi, V. Vaidehi","doi":"10.1109/ICRTIT.2014.6996092","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996092","url":null,"abstract":"Anomaly Detection in health care by monitoring the vital health parameters of patients is a challenging problem in machine learning. The existing algorithms do not process the data incrementally and hence are not very effective in predicting the anomalies accurately and at the correct instance. In this paper, in order to process the health data in an online fashion a novel Online Incremental Learning Algorithm (OILA) is proposed. The OILA predicts the health parameters using a regression based approach with a feedback mechanism to reduce error. An alert is generated when an anomaly is seen in the health parameters, thus alerting the doctor to be cautious. The algorithm is compared with Kalman Filter for comparing the prediction capabilities of OILA with Kalman Filter. The proposed algorithm is validated with real time health parameter data sets for health parameters namely heart rate and blood pressure.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115378811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient energy consumption in green cloud","authors":"C. Valliyammai, S. Uma, B. Dhivya, P. Surya","doi":"10.1109/ICRTIT.2014.6996212","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996212","url":null,"abstract":"In the field of cloud computing, energy efficiency plays a major role. This is because the usage of cloud is increasing and so is the cost of energy; and also there is a necessity to reduce the carbon emission which occurs due to the usage of information and communication technologies (ICT). Hence there is a need for energy-efficient technologies that should reduce the overall energy consumption that is needed for computation, storage and communications. The proposed mechanism reduces the energy consumption by suspending the idle virtual machines (VMs) and categorizing the active VMs into different energy clusters with the help of fuzzy C-means algorithm. Also the percentage of Service Level Agreement (SLA) violated is kept minimal.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"13 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120905177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource allocation issues and challenges in cloud computing","authors":"S. Selvi, C. Valliyammai, V. N. Dhatchayani","doi":"10.1109/ICRTIT.2014.6996213","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996213","url":null,"abstract":"Resource management is the primary issue as the demand grows for provisioning resources and computation in cloud systems. This article presents various research issues pertaining to the management of cloud resources while a comparison is made between existing resource allocation systems. The issues and challenges discussed in this paper are resource provisioning, job scheduling, load balancing, scalability, pricing, energy management and availability.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121039748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of microarray data using Fuzzy inference system","authors":"Mukesh Kumar, S. K. Rath","doi":"10.1109/ICRTIT.2014.6996165","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996165","url":null,"abstract":"The DNA microarray classification is one of the most popular technique among researchers and practitioners. In microarray data analysis, huge useful information may be lost due to irrelevant and insignificant features of the dataset. To overcome this drawback of the data set, only those features are selected which have high relevance with the classes and high significance in the feature set. In this paper, the t-statistic is used for feature selection with high relevance; and Fuzzy inference system (FIS) has been presented for classification purpose. FIS model is applied to classify the leukemia data set for gene classification. A comparative analysis of Fuzzy inference system (FIS) with different set of features (genes) have been presented. The comparison was performed on the basis of available performance parameters in literature such as: precision, recall, specificity, F-Measure, ROC curve and accuracy. The obtained results have been critically examined with the existing classifiers in the literature and it is observed that the proposed system obtained promising results with an increase in classification accuracy rate.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient design of different forms of FIR filter","authors":"D. Bharti, K. Gupta","doi":"10.1109/ICRTIT.2014.6996204","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996204","url":null,"abstract":"Although a number of efficient and high-level design algorithms have been put forward for the realization of FIR filter using the least number of arithmetic operations, but they do not take into account the low-level implementation issues which can exactly make a difference to the area and delay in designing of FIR filter. In this paper, at first, we have presented the delay efficient addition and multiplication architectures that are used in designing of the filter operation. Here We have used an algorithm for the multiplication that reduces the bit width and then an efficient parallel adder is been used that implements the two form of FIR filter with very less amount of delay considering the cost of each operation too. The paper presents two different types of FIR filter with 8 and 16 tap among which one of the form is good for the speed and the other is good for the area.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114686367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving WLAN QoS for multimedia application using MAC and application layer (MAP) approach","authors":"Kishan Singh, P. Jayashree","doi":"10.1109/ICRTIT.2014.6996113","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996113","url":null,"abstract":"Quality of Service (QoS) is considered as the standard check of a conveyance system to show provided services and its availability. For illustration application like video conferencing, voice over ip (VOIP), streaming videos, real time operation feel necessity for draconian assurance on jitter, packet loss, prioritization of services and end-to-end delay. So to overcome these issues a novel scheme employing MAC and Application Layer protocols with enhanced (MAP) is proposed. Improved black-burst protocol as well as prioritization of services is proposed at the MAC layer. An influential packet scheduling scheme for multimedia application in IEEE 802.11e has also been designed. At the Application layer level, real time protocols such as Session Description Protocol (SDP) and Real Time Streaming Protocol (RTSP) are adopted to support QoS. The performance of proposed MAP with enhanced Black Burst Protocol is studied with OPNET 14.5 simulator. The result shows that proposed MAP mechanism has better performance in QoS parameters considered, while maintaining fairness during channel allocation.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121872732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An image encryption using chaotic permutation and diffusion","authors":"T. Gopalakrishnan, S. Ramakrishnan, M. Balakumar","doi":"10.1109/ICRTIT.2014.6996091","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996091","url":null,"abstract":"This paper proposes a chaos-based image encryption scheme with a permutation-diffusion structure. In this method the encryption is performed in bitwise manner. Mixing process is introduced to modify the pixel intensity values before encryption process. In the permutation stage the plain image pixels are shuffled and in the diffusion stage the generated random bits are exclusive or with the confused image pixels. Tent map and logistic maps are used to generate Permutation order and Diffusion bits.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"31 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114394887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ajitha, A. Fathima, V. Vaidehi, M. Hemalatha, R. Karthigaiveni
{"title":"Face recognition system using Combined Gabor Wavelet and DCT approach","authors":"S. Ajitha, A. Fathima, V. Vaidehi, M. Hemalatha, R. Karthigaiveni","doi":"10.1109/ICRTIT.2014.6996156","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996156","url":null,"abstract":"In this paper, an approach for face recognition combining multi-resolution analysis and transform domain analysis is proposed. Face Recognition system find its use in many applications such as authentication, surveillance, human-computer interaction systems etc. As the applications using face recognition systems are of much importance and demand more accuracy, more robustness in the face recognition system is expected with less computation time. In the proposed ComGW-DCT approach, features are extracted using a combination of Gabor filters and Discrete Cosine Transform (DCT). The normalised input grayscale image is approximated and reduced in dimension to lower the processing overhead for Gabor filters. This image is convolved with bank of Gabor filters with varying scales and orientations. Further DCT technique is adapted to reduce the feature space dimension. DCT extracts low frequency components of the Gabor wavelet thus resulting in the compression of Gabor features. For classification, k-Nearest Neighbour (k-NN) classifier is used to recognise the test image by comparing with each of the training set features. The ComGW-DCT approach is robust against illumination conditions as the Gabor features are illumination invariant. This algorithm also aims at better recognition rate using less number of features for varying expressions without affecting the computation time. The results of the proposed system are evaluated using AT&T database and MIT-India face database.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion detection system- An efficient way to thwart against Dos/DDos attack in the cloud environment","authors":"R. Aishwarya, Dr.S. Malliga","doi":"10.1109/ICRTIT.2014.6996163","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996163","url":null,"abstract":"One of the emerging and glooming technologies in the IT is Cloud computing where the information is permanently stored in the third party cloud servers and cached temporarily on clients that include different devices like desktops, entertainment centers, table computers, notebooks, wall computers, sensors, etc. Internet connection is the basic requirement for accessing the cloud. Virtualization technology is another technology which goes along with the cloud environment which is used most widely to reduce the cost purchasing the hardware infrastructures in organizations. Henceforth, the Cloud Computing Systems can be easily intruded by various types of cyber attacks including Denial of Serv-ice (DoS) attack and Distributed Denial of Service (DDoS) attack which utilize the entire resources like CPU, Memory, etc and makes the server to starve. This creates a major impact reducing the efficiency of the virtual machines. In the proposed method, attack can be overcome by Transmission Control Protocol (TCP) Mitigation Strategy which uses the SYN Cookie to prevent the attack in the cloud to prevent the attack in which the server ignores the connection packets when it does not receive the correct Acknowledgement (ACK) from the client which requested the connection. The server here has rules to be check whether it is a legitimate client or the spoofed one using the first layer of security for hop count filtering mechanism and second layer of security is encoding the sequence number of the SYN packet so that only a legitimate client can decode it. Additionally security is also provided for the data packets using the Message Authentication Code (MAC) and thus client is authenticated.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"416 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134464622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Karthick, S. Mercy Shalinie, Ar Eswarimeena, P. Madhumitha, T. Naga Abhinaya
{"title":"Effect of multi-word features on the hierarchical clustering of web documents","authors":"S. Karthick, S. Mercy Shalinie, Ar Eswarimeena, P. Madhumitha, T. Naga Abhinaya","doi":"10.1109/ICRTIT.2014.6996185","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996185","url":null,"abstract":"Contemporary search engines and other automated web tools are faced with the task of extracting relevant information from huge web archives. This is supposed to be a difficult task due to the semi-structured and unstructured nature of the web documents. Users need automated ways of organizing and cataloging the web documents so that they can be queried efficiently. Clustering is typically employed to organize web archives and to subsequently handle user queries. This paper analyzes the effect of including multi-word features on the performance of a hierarchical clustering algorithm. Noun sequences are the predominant features considered in our work, while most of the previous research uses n-grams as features. The paper also analyzes the effect of combining link and content based representations for the web documents and their inter-relationships on the clustering performance. Empirical evaluation of the hierarchical clustering engine suggests that including multi-word features enhances the performance of the hierarchical clustering algorithm with respect to precision.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114057006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}