2014 Seventh International Conference on Contemporary Computing (IC3)最新文献

筛选
英文 中文
ICSECV: An efficient approach of video encryption ICSECV:一种高效的视频加密方法
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897211
Saumya Batham, Virendra Kumar Yadav, Amitav Mallik
{"title":"ICSECV: An efficient approach of video encryption","authors":"Saumya Batham, Virendra Kumar Yadav, Amitav Mallik","doi":"10.1109/IC3.2014.6897211","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897211","url":null,"abstract":"Encryption for the compressed video stream has attracted the attention of many researchers within past few years. Due to exponential growth of digital multimedia contents over the network, their secure transmission over the network is a serious concern. Security and performance are two main peculiarities of any digital multimedia encryption algorithm. This paper presents an indexed chaotic sequence based selective encryption of compressed video (ICSECV) which exploits the characteristics of compressed video. ICSECV selectively encrypts the compressed Intra coded frames and predictively coded frames from each Group of picture (GoP). This method of encryption is quite efficient since it provides the real time encryption of digital multimedia contents. ICSECV uses indexed based chaotic sequence for encrypting the selected frames which do not leaks any information and provide desirable amount of security.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Fat time optimization protocol in cellular networks 蜂窝网络中的脂肪时间优化协议
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897150
Shiven Chawla, Sakshi Agarwal
{"title":"Fat time optimization protocol in cellular networks","authors":"Shiven Chawla, Sakshi Agarwal","doi":"10.1109/IC3.2014.6897150","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897150","url":null,"abstract":"As the widespread of cellular networks is broadening, the volumes of end-users also keep on increasing exponentially. Amongst the primeval issues, the concern of providing high throughput along with a decent fairness, surfaces with the ever expanding reign of cellular networks. The present-day algorithms such as Max-Rate, Round-Robin and Proportional-Fair algorithm are getting cast-out in the sprint for providing a dependable solution to this problem in effect with such vast volume of users. We have developed a scheduling algorithm for the receiving stations based upon the fat-time scheduling criteria. The algorithm aims at providing fairness and an increased throughput between mobile stations (having constantly changing channel conditions) by exponentially decreasing or increasing the differential factor of the rate of transmission of data under consistent condition of no noise, or Doppler shift, reflection, diffraction or scattering.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116215292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LevelSync: A hierarchical time synchronization mechanism for wireless sensor networks LevelSync:无线传感器网络的分层时间同步机制
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897186
Dhyanendra S. Rathore, D. Bordoloi, E. Pilli, M. C. Govil
{"title":"LevelSync: A hierarchical time synchronization mechanism for wireless sensor networks","authors":"Dhyanendra S. Rathore, D. Bordoloi, E. Pilli, M. C. Govil","doi":"10.1109/IC3.2014.6897186","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897186","url":null,"abstract":"Time synchronization in wireless sensor networks is a critical requirement for distributed and collaborative processing among the nodes. This paper presents a coarse grained hierarchical time synchronization scheme `LevelSync' which synchronizes nodes in a sensor network with regards to their distance from the sink or master node. A hierarchical tree is dynamically constructed during the synchronization with master node acting as the root. The master node initiates and controls the synchronization phase and is responsible for normalizing the virtual time with the corresponding UTC. Each node is assigned a level and maintains a virtual clock which runs at a frequency different than that of its physical clock. Virtual clocks run at a fixed frequency calculated by the root or reference nodes hence are free from the drifts. LevelSync decreases the number of messages required for the synchronization and the resynchronization periods. We evaluate the performance and energy efficiency of the LevelSync through simulation and compare with existing time synchronization protocols. LevelSync is computationally light, energy efficient and achieves long lasting synchronizations.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116231445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of “a biometric-based user authentication scheme for heterogeneous wireless sensor networks” “基于生物特征的异构无线传感器网络用户认证方案”的密码分析
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897192
M. Sarvabhatla, M. Giri, C. Vorugunti
{"title":"Cryptanalysis of “a biometric-based user authentication scheme for heterogeneous wireless sensor networks”","authors":"M. Sarvabhatla, M. Giri, C. Vorugunti","doi":"10.1109/IC3.2014.6897192","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897192","url":null,"abstract":"With the advancement of Internet of Things (IoT) technology and rapid growth of WSN applications, provides an opportunity to connect WSN to IoT, which results in the secure sensor data can be accessible via in secure Internet. The integration of WSN and IoT effects lots of security challenges and requires strict user authentication mechanism. Quite a few isolated user verification or authentication schemes using the password, the biometrics and the smart card have been proposed in the literature. In 2013, A.K Das et al. designed a biometric-based remote user verification scheme using smart card for heterogeneous wireless sensor networks. A.K Das et al insisted that their scheme is secure against several known cryptographic attacks. Unfortunately, in this manuscript we will show that their scheme fails to resist replay attack, user impersonation attack, failure to accomplish mutual authentication and failure to provide data privacy.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quantification of non-functional requirements 非功能需求的量化
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897177
Kiran Khatter, A. Kalia
{"title":"Quantification of non-functional requirements","authors":"Kiran Khatter, A. Kalia","doi":"10.1109/IC3.2014.6897177","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897177","url":null,"abstract":"Requirements Analysis is considered as the most important phase for the development of quality software because errors caused by poor and inadequate requirement analysis are likely to creep in design and implementation phase. These errors are observed as time-consuming and most expensive to repair. Thus, Requirement Analysis is the phase, which determines the success or failure of a software project. Poor requirement analysis increases the cost of development by 70-85%, which requires reworking on all phases of software project. It is observed that non-functional properties are often ignored while focusing on the functionality of the software. Many software systems have failed because of negligence of non-functional requirements. Therefore, it is necessary to measure the satisfaction level of non-functional requirement during software development process.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131712667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Leveraging frequency and diversity based ensemble selection to consensus clustering 利用频率和多样性为基础的集成选择共识聚类
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897160
Arko Banerjee
{"title":"Leveraging frequency and diversity based ensemble selection to consensus clustering","authors":"Arko Banerjee","doi":"10.1109/IC3.2014.6897160","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897160","url":null,"abstract":"Consensus clustering, also called aggregation of clustering (or partitions) is a method that desires to improve the robustness and quality in clustering of a dataset by optimally reconciling the results of different clusterings of the same dataset generated in different ways. This paper proposes a novel way of arriving at a consensus clustering by an ensemble selection strategy. The method avoids considering the entire ensemble and judiciously select few clusterings in the ensemble without compromising on the quality of the consensus. It begins with sorting the ensemble by prioritizing clusterings based on diversity and frequency. It is observed that considering jointly the diversity and frequency helps in identifying few representative partitions that have high potentiality to form qualitatively better consensus than that of the entire ensemble. Finally a greedy strategy is used to select the clusterings in an iterative consensus generation technique that ensures the internal quality of clustering to be monotonically non-decreasing. Empirical results show that the consensus clustering obtained by the proposed algorithm gives better clustering accuracy for many datasets.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132412394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Analytical approach based on self organized maps (SOM) in Indian classical music raga clustering 基于自组织映射的印度古典音乐拉格聚类分析方法
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897215
Akhilesh K. Sharma, Kamaljit I. Lakhtaria, A. Panwar, S. Vishwakarma
{"title":"An Analytical approach based on self organized maps (SOM) in Indian classical music raga clustering","authors":"Akhilesh K. Sharma, Kamaljit I. Lakhtaria, A. Panwar, S. Vishwakarma","doi":"10.1109/IC3.2014.6897215","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897215","url":null,"abstract":"This paper is mainly focusing the aspects regarding the Self organized maps in the recognition of the Ragas and the strategy behind the Digital signal processing for the raga recognition and clustering of the same. Paper mainly describes all the features extraction mechanism for the SOM input and we devised an algorithm for creating the clusters of the raga based on their PCP (pitch class profiles) and the onsets detected. Our strategy is very promising that its providing better clusters of the raga patterns and the raga segments are very much clearly be distinguished from the other ragas, as we compared them with the formation of the key attributes. The Indian classical music history is very old and the need for identifying the music based on the raga onsets is very much helping for the music professionals and domestic users for identifying and detecting the raga types and using the same without the help or availability of any experts nearby. Thus our strategy is very promising in nature for the novice users and practitioners as well as home users. The very early learners would also find it very interesting and supportive after due course of frequent uses of it. At last we provided the future possibilities for the enhancements.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115128374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performance evaluation of various resampling techniques on IRS imagery 各种重采样技术对IRS图像的性能评价
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897222
Shardha Porwal, S. Katiyar
{"title":"Performance evaluation of various resampling techniques on IRS imagery","authors":"Shardha Porwal, S. Katiyar","doi":"10.1109/IC3.2014.6897222","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897222","url":null,"abstract":"Resampling is used to calculate pixel values when one raster grid is fitted to another. High-resolution remote sensing satellite images contain more information in the discrete samples and after resampling process, it is desirable that the reconstructed image should maintain the same sharpness as the original image. Although several techniques are available, but it is essential to determine the best one for maintaining the sharpness and the pixel break at higher magnification level for photographic and digital display of high resolution satellite images. To preserve image quality, the interpolating function used for the resampling should be an ideal low-pass filter. In order to determine the best interpolation function, different resampling functions, namely Nearest Neighbor (NN), Bilinear (BL), Cubic Convolution ( α = 0 ), High-resolution Cubic Spline with Edge Enhancement ( α = -1 ), High-resolution Cubic Spline ( α = -0.5 ), Cubic Spline ( α = -2 ), Cubic Spline ( α = -.3/4), Cubic B-spline, Catmull-Rom Cubic, Quadratic Interpolation and Approximating Quadratic B-Spline have been analyzed on different spatial resolution Indian Remote Sensing (IRS) satellite images (LISS-III, LISS-IV and CARTOSAT-1). Performance of the above resampling methods has been evaluated by Visual interpretation, Digital Number Percentage (DN %) Analysis as well as other parameters likes Entropy and Image Noise Index (INI), MSE and PSNR. Investigation results have shown that with the change in the image processing operation, spatial resolution and evaluation parameter, the performance of resampling method changes, thereby emphasizing the need to judiciously select the resampling method.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125190813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Anti-forensics techniques: An analytical review 反取证技术:分析回顾
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897209
Anup Jain, Gurpal Singh Chhabra
{"title":"Anti-forensics techniques: An analytical review","authors":"Anup Jain, Gurpal Singh Chhabra","doi":"10.1109/IC3.2014.6897209","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897209","url":null,"abstract":"The rapid growth and development in technology has made computer as a weapon which can cause great loss if used with wrong intentions. Computer forensics aims at collecting, and analyzing evidences from the seized devices in such ways so that they are admissible in court of law. Anti-forensics, on the other hand, is collection of tricks and techniques that are used and applied with clear aim of forestalling the forensic investigation. Crime and crime prevention go hand in hand. Once a crime surfaces, then a defense is developed, then a new crime counters the new defense. Hence along with continuous developments in forensics, a thorough study and knowledge of developments in anti-forensics is equally important. This paper focuses on understanding different techniques that can be used for anti-forensic purposes with help of open source tools.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128377468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Grasp mapping for Dexterous Robot Hand: A hybrid approach 灵巧机器人手抓取映射:一种混合方法
2014 Seventh International Conference on Contemporary Computing (IC3) Pub Date : 2014-09-15 DOI: 10.1109/IC3.2014.6897180
Ritwik Chattaraj, B. Bepari, S. Bhaumik
{"title":"Grasp mapping for Dexterous Robot Hand: A hybrid approach","authors":"Ritwik Chattaraj, B. Bepari, S. Bhaumik","doi":"10.1109/IC3.2014.6897180","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897180","url":null,"abstract":"During past two decades many efforts have been made by different researchers in developing robotic grippers. Some of these grippers are robust and used for handling large objects. On the contrary, certain grippers are adroit enough even to handle biological cells. Wide varieties of grippers are now-a-days available featuring different kinematic ability, dexterity, mode of actuation, usage of sensors, maximum weight carrying capabilities and many more attributes. But they all accord to a single issue, i.e. inspiration. Essentially the goal of developing grippers focuses mainly on the manipulation ability of the human hand. Subsequently the designs have continuously become more and more complicated, which in turn have increased the programming complexity to keep abreast with the advances. Cognition in the field of robotics refers to sensing, generation and interpretation. To inculcate kinesthetic cognition to a robot hand unequivocally implies mapping. In this paper a hybrid methodology based on the existing grasp mapping algorithm has been proposed to increase the efficacy of the robotic hand.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126410032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信