2014 International Conference on Recent Trends in Information Technology最新文献

筛选
英文 中文
Online Incremental Learning Algorithm for anomaly detection and prediction in health care 医疗保健异常检测与预测的在线增量学习算法
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996092
Kirthanaa Raghuraman, Monisha Senthurpandian, Monisha Shanmugasundaram, Bhargavi, V. Vaidehi
{"title":"Online Incremental Learning Algorithm for anomaly detection and prediction in health care","authors":"Kirthanaa Raghuraman, Monisha Senthurpandian, Monisha Shanmugasundaram, Bhargavi, V. Vaidehi","doi":"10.1109/ICRTIT.2014.6996092","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996092","url":null,"abstract":"Anomaly Detection in health care by monitoring the vital health parameters of patients is a challenging problem in machine learning. The existing algorithms do not process the data incrementally and hence are not very effective in predicting the anomalies accurately and at the correct instance. In this paper, in order to process the health data in an online fashion a novel Online Incremental Learning Algorithm (OILA) is proposed. The OILA predicts the health parameters using a regression based approach with a feedback mechanism to reduce error. An alert is generated when an anomaly is seen in the health parameters, thus alerting the doctor to be cautious. The algorithm is compared with Kalman Filter for comparing the prediction capabilities of OILA with Kalman Filter. The proposed algorithm is validated with real time health parameter data sets for health parameters namely heart rate and blood pressure.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115378811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Efficient energy consumption in green cloud 绿色云节能高效
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996212
C. Valliyammai, S. Uma, B. Dhivya, P. Surya
{"title":"Efficient energy consumption in green cloud","authors":"C. Valliyammai, S. Uma, B. Dhivya, P. Surya","doi":"10.1109/ICRTIT.2014.6996212","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996212","url":null,"abstract":"In the field of cloud computing, energy efficiency plays a major role. This is because the usage of cloud is increasing and so is the cost of energy; and also there is a necessity to reduce the carbon emission which occurs due to the usage of information and communication technologies (ICT). Hence there is a need for energy-efficient technologies that should reduce the overall energy consumption that is needed for computation, storage and communications. The proposed mechanism reduces the energy consumption by suspending the idle virtual machines (VMs) and categorizing the active VMs into different energy clusters with the help of fuzzy C-means algorithm. Also the percentage of Service Level Agreement (SLA) violated is kept minimal.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"13 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120905177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Resource allocation issues and challenges in cloud computing 云计算中的资源分配问题和挑战
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996213
S. Selvi, C. Valliyammai, V. N. Dhatchayani
{"title":"Resource allocation issues and challenges in cloud computing","authors":"S. Selvi, C. Valliyammai, V. N. Dhatchayani","doi":"10.1109/ICRTIT.2014.6996213","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996213","url":null,"abstract":"Resource management is the primary issue as the demand grows for provisioning resources and computation in cloud systems. This article presents various research issues pertaining to the management of cloud resources while a comparison is made between existing resource allocation systems. The issues and challenges discussed in this paper are resource provisioning, job scheduling, load balancing, scalability, pricing, energy management and availability.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121039748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Classification of microarray data using Fuzzy inference system 基于模糊推理系统的微阵列数据分类
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996165
Mukesh Kumar, S. K. Rath
{"title":"Classification of microarray data using Fuzzy inference system","authors":"Mukesh Kumar, S. K. Rath","doi":"10.1109/ICRTIT.2014.6996165","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996165","url":null,"abstract":"The DNA microarray classification is one of the most popular technique among researchers and practitioners. In microarray data analysis, huge useful information may be lost due to irrelevant and insignificant features of the dataset. To overcome this drawback of the data set, only those features are selected which have high relevance with the classes and high significance in the feature set. In this paper, the t-statistic is used for feature selection with high relevance; and Fuzzy inference system (FIS) has been presented for classification purpose. FIS model is applied to classify the leukemia data set for gene classification. A comparative analysis of Fuzzy inference system (FIS) with different set of features (genes) have been presented. The comparison was performed on the basis of available performance parameters in literature such as: precision, recall, specificity, F-Measure, ROC curve and accuracy. The obtained results have been critically examined with the existing classifiers in the literature and it is observed that the proposed system obtained promising results with an increase in classification accuracy rate.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient design of different forms of FIR filter 高效设计不同形式的FIR滤波器
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996204
D. Bharti, K. Gupta
{"title":"Efficient design of different forms of FIR filter","authors":"D. Bharti, K. Gupta","doi":"10.1109/ICRTIT.2014.6996204","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996204","url":null,"abstract":"Although a number of efficient and high-level design algorithms have been put forward for the realization of FIR filter using the least number of arithmetic operations, but they do not take into account the low-level implementation issues which can exactly make a difference to the area and delay in designing of FIR filter. In this paper, at first, we have presented the delay efficient addition and multiplication architectures that are used in designing of the filter operation. Here We have used an algorithm for the multiplication that reduces the bit width and then an efficient parallel adder is been used that implements the two form of FIR filter with very less amount of delay considering the cost of each operation too. The paper presents two different types of FIR filter with 8 and 16 tap among which one of the form is good for the speed and the other is good for the area.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114686367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving WLAN QoS for multimedia application using MAC and application layer (MAP) approach 采用MAC和MAP方法改进多媒体应用的无线局域网QoS
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996113
Kishan Singh, P. Jayashree
{"title":"Improving WLAN QoS for multimedia application using MAC and application layer (MAP) approach","authors":"Kishan Singh, P. Jayashree","doi":"10.1109/ICRTIT.2014.6996113","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996113","url":null,"abstract":"Quality of Service (QoS) is considered as the standard check of a conveyance system to show provided services and its availability. For illustration application like video conferencing, voice over ip (VOIP), streaming videos, real time operation feel necessity for draconian assurance on jitter, packet loss, prioritization of services and end-to-end delay. So to overcome these issues a novel scheme employing MAC and Application Layer protocols with enhanced (MAP) is proposed. Improved black-burst protocol as well as prioritization of services is proposed at the MAC layer. An influential packet scheduling scheme for multimedia application in IEEE 802.11e has also been designed. At the Application layer level, real time protocols such as Session Description Protocol (SDP) and Real Time Streaming Protocol (RTSP) are adopted to support QoS. The performance of proposed MAP with enhanced Black Burst Protocol is studied with OPNET 14.5 simulator. The result shows that proposed MAP mechanism has better performance in QoS parameters considered, while maintaining fairness during channel allocation.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121872732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An image encryption using chaotic permutation and diffusion 一种利用混沌置换和扩散的图像加密方法
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996091
T. Gopalakrishnan, S. Ramakrishnan, M. Balakumar
{"title":"An image encryption using chaotic permutation and diffusion","authors":"T. Gopalakrishnan, S. Ramakrishnan, M. Balakumar","doi":"10.1109/ICRTIT.2014.6996091","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996091","url":null,"abstract":"This paper proposes a chaos-based image encryption scheme with a permutation-diffusion structure. In this method the encryption is performed in bitwise manner. Mixing process is introduced to modify the pixel intensity values before encryption process. In the permutation stage the plain image pixels are shuffled and in the diffusion stage the generated random bits are exclusive or with the confused image pixels. Tent map and logistic maps are used to generate Permutation order and Diffusion bits.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"31 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114394887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Face recognition system using Combined Gabor Wavelet and DCT approach 基于Gabor小波与DCT相结合的人脸识别系统
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996156
S. Ajitha, A. Fathima, V. Vaidehi, M. Hemalatha, R. Karthigaiveni
{"title":"Face recognition system using Combined Gabor Wavelet and DCT approach","authors":"S. Ajitha, A. Fathima, V. Vaidehi, M. Hemalatha, R. Karthigaiveni","doi":"10.1109/ICRTIT.2014.6996156","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996156","url":null,"abstract":"In this paper, an approach for face recognition combining multi-resolution analysis and transform domain analysis is proposed. Face Recognition system find its use in many applications such as authentication, surveillance, human-computer interaction systems etc. As the applications using face recognition systems are of much importance and demand more accuracy, more robustness in the face recognition system is expected with less computation time. In the proposed ComGW-DCT approach, features are extracted using a combination of Gabor filters and Discrete Cosine Transform (DCT). The normalised input grayscale image is approximated and reduced in dimension to lower the processing overhead for Gabor filters. This image is convolved with bank of Gabor filters with varying scales and orientations. Further DCT technique is adapted to reduce the feature space dimension. DCT extracts low frequency components of the Gabor wavelet thus resulting in the compression of Gabor features. For classification, k-Nearest Neighbour (k-NN) classifier is used to recognise the test image by comparing with each of the training set features. The ComGW-DCT approach is robust against illumination conditions as the Gabor features are illumination invariant. This algorithm also aims at better recognition rate using less number of features for varying expressions without affecting the computation time. The results of the proposed system are evaluated using AT&T database and MIT-India face database.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Intrusion detection system- An efficient way to thwart against Dos/DDos attack in the cloud environment 入侵检测系统——一种在云环境中阻止Dos/DDos攻击的有效方法
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996163
R. Aishwarya, Dr.S. Malliga
{"title":"Intrusion detection system- An efficient way to thwart against Dos/DDos attack in the cloud environment","authors":"R. Aishwarya, Dr.S. Malliga","doi":"10.1109/ICRTIT.2014.6996163","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996163","url":null,"abstract":"One of the emerging and glooming technologies in the IT is Cloud computing where the information is permanently stored in the third party cloud servers and cached temporarily on clients that include different devices like desktops, entertainment centers, table computers, notebooks, wall computers, sensors, etc. Internet connection is the basic requirement for accessing the cloud. Virtualization technology is another technology which goes along with the cloud environment which is used most widely to reduce the cost purchasing the hardware infrastructures in organizations. Henceforth, the Cloud Computing Systems can be easily intruded by various types of cyber attacks including Denial of Serv-ice (DoS) attack and Distributed Denial of Service (DDoS) attack which utilize the entire resources like CPU, Memory, etc and makes the server to starve. This creates a major impact reducing the efficiency of the virtual machines. In the proposed method, attack can be overcome by Transmission Control Protocol (TCP) Mitigation Strategy which uses the SYN Cookie to prevent the attack in the cloud to prevent the attack in which the server ignores the connection packets when it does not receive the correct Acknowledgement (ACK) from the client which requested the connection. The server here has rules to be check whether it is a legitimate client or the spoofed one using the first layer of security for hop count filtering mechanism and second layer of security is encoding the sequence number of the SYN packet so that only a legitimate client can decode it. Additionally security is also provided for the data packets using the Message Authentication Code (MAC) and thus client is authenticated.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"416 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134464622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Effect of multi-word features on the hierarchical clustering of web documents 多词特征对web文档分层聚类的影响
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996185
S. Karthick, S. Mercy Shalinie, Ar Eswarimeena, P. Madhumitha, T. Naga Abhinaya
{"title":"Effect of multi-word features on the hierarchical clustering of web documents","authors":"S. Karthick, S. Mercy Shalinie, Ar Eswarimeena, P. Madhumitha, T. Naga Abhinaya","doi":"10.1109/ICRTIT.2014.6996185","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996185","url":null,"abstract":"Contemporary search engines and other automated web tools are faced with the task of extracting relevant information from huge web archives. This is supposed to be a difficult task due to the semi-structured and unstructured nature of the web documents. Users need automated ways of organizing and cataloging the web documents so that they can be queried efficiently. Clustering is typically employed to organize web archives and to subsequently handle user queries. This paper analyzes the effect of including multi-word features on the performance of a hierarchical clustering algorithm. Noun sequences are the predominant features considered in our work, while most of the previous research uses n-grams as features. The paper also analyzes the effect of combining link and content based representations for the web documents and their inter-relationships on the clustering performance. Empirical evaluation of the hierarchical clustering engine suggests that including multi-word features enhances the performance of the hierarchical clustering algorithm with respect to precision.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114057006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信