2014 International Conference on Contemporary Computing and Informatics (IC3I)最新文献

筛选
英文 中文
Federated Intelligent Cloud Service-Oriented Federation in Global Cloud Market with Match-Making Service Broker and Global Workload Management 基于配对服务代理和全球工作负载管理的全球云市场中面向服务的联邦智能云联盟
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019639
S. Sathyanarayanan, Reynald Susainathan Reni Sagayaraj
{"title":"Federated Intelligent Cloud Service-Oriented Federation in Global Cloud Market with Match-Making Service Broker and Global Workload Management","authors":"S. Sathyanarayanan, Reynald Susainathan Reni Sagayaraj","doi":"10.1109/IC3I.2014.7019639","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019639","url":null,"abstract":"Federated Cloud Computing facilitates scalable on-demand service, ensuring business continuity through improved reliability on the cloud. This environment demands efficient Global Workload Management in the cloud market and appropriate mapping between service providers and consumers. This necessitates an efficient Service-Oriented Architecture, with an Enterprise Service Bus (ESB) providing a rich service abstraction. Service Broker, one of the main entities of ESB the implements Match-Making Algorithm. GWM focuses on scalable provisioning through Load-sharing policy improving QoS of global market. To realize this feature, the cloud coordinator implements an efficient distributed algorithm that incorporates vector clock based mutual exclusion on workload bursting. This paper presents vision, challenges and architectural elements of the Federated Intelligent Cloud.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128651411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data security in Cloud Computing using Cramer - Shoup cryptosystem 基于Cramer - Shoup密码系统的云计算数据安全
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019773
Dr. Raju Shanmugam, Y. M. Sirajudeen
{"title":"Data security in Cloud Computing using Cramer - Shoup cryptosystem","authors":"Dr. Raju Shanmugam, Y. M. Sirajudeen","doi":"10.1109/IC3I.2014.7019773","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019773","url":null,"abstract":"Cloud computing is an emerging technology which has become today's blistering research area due to the advancement of increased connectivity and it is most interesting and attractable technology which offers the on demand services to the users over the Internet. Since Cloud Computing stores the user data and allows the user to work on the cloud system and so the security has become the main concern which creates threat and tries to deploy the Cloud environments. Even though the Cloud Computing is efficient, there are many challenges for data security, which may take away the users from using the cloud computing. To ensure the security of data, we proposed a method by implementing Cramer - Shoup cryptosystem.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"76 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115665919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A review of theatmospheric effects on radiopath lossin cellular mobile communication system 蜂窝移动通信系统中大气对辐射患者信号丢失的影响研究进展
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019761
C. S. Hanchinal, K. N. Muralidhara
{"title":"A review of theatmospheric effects on radiopath lossin cellular mobile communication system","authors":"C. S. Hanchinal, K. N. Muralidhara","doi":"10.1109/IC3I.2014.7019761","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019761","url":null,"abstract":"Radio propagation is essential for emerging technologies with appropriate design, deployment and management strategies for any wireless network. It is heavily site specific and can vary significantly depending on terrain, atmospheric effects, frequency of operation, velocity of mobile terminal, interface sources and other dynamic factor. Accurate characterization of radio channel through key parameters and a mathematical model is important for: predicting signal coverage, achievable data rates, network planning, Quality of service, hand over performance, etc. Efficiency of present path loss models for cellular communication system suffers when they are used in the environment other than for which they have been used. Accurate path loss can be determined by measuring strength of signal through site specific field measurements.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125550725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A precedence based load balancing strategy for batch of DAGs for computational grid 基于优先级的计算网格批量dag负载均衡策略
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019681
Mohammad Shahid, Z. Raza
{"title":"A precedence based load balancing strategy for batch of DAGs for computational grid","authors":"Mohammad Shahid, Z. Raza","doi":"10.1109/IC3I.2014.7019681","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019681","url":null,"abstract":"Load balancing on computational resources in a computational grid environment is an NP Hard problem. Therefore, a number of schemes can be proposed for the same under different constraints. Accordingly, a variety of techniques have been proposed in the literature but none of them can be treated as the best for all conditions and QoS parameters. A computational grid enables the users to execute their compute intensive jobs on the resources in which investing is either not wise or beyond their limit to invest. Grid resources can be used to meet the user's requirements in terms of QoS parameters if the scheduling strategy provides the efficient mapping between the software parallelisms available in the application on the hardware parallelism offered by the grid. This work presents a centralized precedence based load balancing strategy for a batch of jobs represented as Direct Acyclic Graph (DAG) having communication requirements. Performance evaluation is carried out by comparing the proposed strategy with other load balancing schemes viz. LRR and OLB. Experimental study reveals that load distribution on nodes is better than LRR and OLB. The strategy can be used for the jobs which are more interactive as it results in a lower response time for the jobs of the batch.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126885635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance analysis of Free Space Optics link at different data rates 自由空间光链路在不同数据速率下的性能分析
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019625
G. Soni, V. Banga
{"title":"Performance analysis of Free Space Optics link at different data rates","authors":"G. Soni, V. Banga","doi":"10.1109/IC3I.2014.7019625","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019625","url":null,"abstract":"FSO technology offers the potential of broadband communication capacity using unlicensed optical wavelengths. FSO is an independent protocol that can be fixed to any network topology. Even if a line-of-sight condition of Free Space Optics (FSO) is satisfied, atmospheric-induced fading, scattering, and attenuation may severely deteriorate the availability of the communication link. In this paper the proposed FSO link with link range of 500 meters and at wavelength of 1550 nm is simulated under weak turbulence conditions and the link performance is evaluated at different data rates.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128065030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Edge based selective encryption scheme for biometric data using chaotic theory 基于混沌理论的生物特征数据边缘选择性加密方案
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019712
Garima Mehta, M. Dutta, C. Travieso-González, Pyung Soo Kim
{"title":"Edge based selective encryption scheme for biometric data using chaotic theory","authors":"Garima Mehta, M. Dutta, C. Travieso-González, Pyung Soo Kim","doi":"10.1109/IC3I.2014.7019712","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019712","url":null,"abstract":"Security of biometric data plays a major concern due to extensive use of biometric systems in many applications. This paper proposes an efficient method for encryption of iris images using edge based encryption algorithm based on chaotic theory. In this proposed technique, the iris image is segmented into significant and non significant blocks to find region of interest (ROI) i.e. to localize iris from complete eye image from which features are extracted to generate biometric template. Selective encryption is used to encrypt the region of interest and it reduces the computational overhead and processing time as compared to full encryption techniques. The experimental results prove that edge based selective encryption significantly reduces the time of encryption of iris images as compared to full encryption method without any compromise in performance. Performance of proposed algorithm has been experimentally analyzed using key sensitivity analysis and the results prove that the encryption algorithm has high key sensitivity and the algorithm is lossless in nature.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127478306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automatic detection of red lesions in digital color retinal images 数字彩色视网膜图像中红色病灶的自动检测
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019607
P. N. Sharath Kumar, R. Rajesh Kumar, A. Sathar, V. Sahasranamam
{"title":"Automatic detection of red lesions in digital color retinal images","authors":"P. N. Sharath Kumar, R. Rajesh Kumar, A. Sathar, V. Sahasranamam","doi":"10.1109/IC3I.2014.7019607","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019607","url":null,"abstract":"These days, Automated screening systems are becoming the best possible solution for not only reducing burden on the medical practitioners but also reducing human prone errors with the help of accurate automated diagnosis of the disease. In Diabetic Retinopathy (DR), the crucial step for an automated system is exhaustive detection of the lesions. In this paper, a modified red lesion detection method is presented based on some changes to the filters used in the prior work by Spencer et al. Along with this, a novel three stage false positive elimination technique is presented to remove non red-lesion candidates detected in the modified filter approach. Firstly, false positive candidates detected elsewhere in the retina are removed. Secondly, falsely found candidates on the blood vessels are removed. Third, candidates found in the optic disc area are removed using our earlier work. To evaluate our method for the detection of red lesions, we examined two sets of fundus images, first set constituting of 94 images obtained from the routine screening at Regional Institute of Ophthalmology, Thiruvananthapuram and the second set of 89 images from DIARETDB1 database. When determining whether an image contains red lesions, our method achieved a sensitivity of 95.6% and specificity of 93.2%. Also, our method detected 78.9% red lesions present in each of the images.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126397648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Business intelligence from online product review-a rough set based rule induction approach 在线产品评论的商业智能——基于粗糙集的规则归纳方法
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019662
T. K. Das, D. Acharjya, M. Patra
{"title":"Business intelligence from online product review-a rough set based rule induction approach","authors":"T. K. Das, D. Acharjya, M. Patra","doi":"10.1109/IC3I.2014.7019662","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019662","url":null,"abstract":"In this paper we have explained the detailed work done in developing a framework which can be used for the purpose of discovering business intelligence with the help of decision rules induced from the customer reviews of a product or a service posted online. We have explained the analysis for the product Samsung Galaxy S5. Our proposed framework has been designed by collecting the reviews from Samsung home page, preprocessing it and inducing rules by using rough set based LEM2 algorithm. The induced rules would be helpful for Business analyst in understanding the product dimensions, attributes and inherent association among them.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124422534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Depression level prediction using EEG signal processing 基于脑电信号处理的抑郁程度预测
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019674
H. Mallikarjun, H. N. Suresh
{"title":"Depression level prediction using EEG signal processing","authors":"H. Mallikarjun, H. N. Suresh","doi":"10.1109/IC3I.2014.7019674","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019674","url":null,"abstract":"Depression is one of the most common mental disorders that at its worst can lead to suicide. Diagnosing depression in the early curable stage is very important. It may also lead to various disorders like sleep disorders and alcoholism. Here in this project the Electroencephalogram Gram (EEG) signals are obtained from publicly available database are processed in MATLAB. This can be useful in classifying subjects with the disorders using classifier tools present in it. For this aim, the features are extracted from frequency bands (alpha, delta and theta).","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121642514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Imperceptible digital watermarking in medical retinal images for tele-medicine applications 用于远程医疗应用的医学视网膜图像中的不可察觉数字水印
2014 International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019705
M. Dutta, Anushikha Singh, M. Parthasarathi, C. Travieso
{"title":"Imperceptible digital watermarking in medical retinal images for tele-medicine applications","authors":"M. Dutta, Anushikha Singh, M. Parthasarathi, C. Travieso","doi":"10.1109/IC3I.2014.7019705","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019705","url":null,"abstract":"This paper proposes a method of inserting a digital pattern having patient identity information in the medical retinal image without changing the perceptual property and without causing any loss of medical information of this image. To achieve this insertion of the digital signature identity of the patient is done in the singular value based decomposition (SVD) domain of the image. After the insertion of this digital signature is done in the retinal image a detailed comparative study and analysis is done between original image and marked image to test if all the medical information and features of the image is retained. The important feature of the medical image like blood arteries, macula and optic disc has been segmented from the original and stego-image. The experimental results indicate that the original and the stego image have similar perceptual properties and no medical information is lost in the process of digital watermarking. Features of the original and stego image has been analyzed and experimental results indicates that the variation in the features is minimal and do not affect the medical information which has been validated by professional ophthalmologists. The correlation of the features extracted is above 0.99 indicating the insertion of the digital pattern did not cause any loss of medical information in the image.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"5 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122124814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信