2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)最新文献

筛选
英文 中文
An approach for semantic query expansion based on maximum entropy-hidden Markov model 基于最大熵隐马尔可夫模型的语义查询扩展方法
R. Jothilakshmi, N. Shanthi, R. Babisaraswathi
{"title":"An approach for semantic query expansion based on maximum entropy-hidden Markov model","authors":"R. Jothilakshmi, N. Shanthi, R. Babisaraswathi","doi":"10.1109/ICCCNT.2013.6726755","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726755","url":null,"abstract":"The ineffectiveness of information retrieval systems is mostly caused by the inaccurate query formed by a few keywords that reflect actual user information need. One well known technique to overcome this limitation is Automatic Query Expansion (AQE), whereby the user's original query is improved by adding new features with a related meaning. It has long been accepted that capturing term associations is a vital part of information retrieval. It is therefore mainly to consider whether many sources of support may be combined to forecast term relations more precisely. This is mainly significant when frustrating to predict the probability of relevance of a set of terms given a query, which may involve both lexical and semantic relations between the terms. This paper presents a approach to expand the user query using three level domain model such as conceptual level(underlying Domain knowledge), linguistic level(term vocabulary based on Wordnet), stochastic model ME-HMM2 which combines (HMM (Hidden Markov Model and Maximum Entropy(ME) models) stores the mapping between such levels, taking into account the linguistic context of words.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"62 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90100321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nucleotide transfigurations using playback conversion 使用回放转换的核苷酸变形
B. Kathiresan, G. Karthik
{"title":"Nucleotide transfigurations using playback conversion","authors":"B. Kathiresan, G. Karthik","doi":"10.1109/ICCCNT.2013.6726612","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726612","url":null,"abstract":"Bioinformatics is the application of computer technology for the management and analysis of biological data. Pattern matching in a DNA sequence or searching a pattern from a large data base is a major research area in computational biology. One of the major problems in genomic field is to perform pattern comparison on DNA and protein sequences. A full DNA strand contains three billion of nucleotide bases. To parse and to convert amino acids of high volume, the existing approach takes some minutes. If the conversion process is aborted in middle, it will restart from the beginning again. In order to overcome this drawback, the playback conversion approach is proposed to continue the process from where it aborted. And the subsequent implementation of this approach in parallel mode will reduce forty percent of time taken by the existing approach. This paper entirely focuses on an approach to reduce the time taken for the conversion of nucleotide to amino acids. The proposed technique gives very good performance related to DNA sequence analysis for querying of publicly available genome sequence data. These experimental results show that there is considerable increase in the improvement of overall performance.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"26 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89150237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy rule based data forwarding for energy efficient wireless sensor networks in industrial control system 基于模糊规则的高效节能无线传感器网络数据转发
S. Jisha, Sangeetha Jamal
{"title":"Fuzzy rule based data forwarding for energy efficient wireless sensor networks in industrial control system","authors":"S. Jisha, Sangeetha Jamal","doi":"10.1109/ICCCNT.2013.6726638","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726638","url":null,"abstract":"Industrial Control System employ wireless sensor networks for monitoring plant operational condition. The key challenging issue with the implementation of wireless sensor networks is the limiting energy constraint of sensor nodes. This paper proposes a novel approach for an effective energy efficient data forwarding technique based on the state information monitored by the sensor nodes. The sensed data is checked against a fuzzy rule database and a forward decision is made only if any rule in the database is triggered. This approach reduces the data transmission overhead thereby improving lifetime of sensor nodes in the wireless sensor networks.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83062617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure multicast transmission 安全组播传输
W. R. S. Jeyaseelan, S. Hariharan
{"title":"Secure multicast transmission","authors":"W. R. S. Jeyaseelan, S. Hariharan","doi":"10.1109/ICCCNT.2013.6726783","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726783","url":null,"abstract":"The group communication has been implemented by Multicast Authentication Batch Signature (MABS). This eliminates the network overheads such as packet loss, latency computation and communication overhead. The Batch signature is the effective cryptographic primitive which authenticates any number of packets simultaneously. This paper gives the solution by introducing Enhanced Multicast Authentication Batch Signature (MABS-E) by eliminating DOS impact. The sender side file content is displayed in both sender and receiver. The receiver can send the request to the sender by sending the file name. The authentication is verified by the sender by use of batch verify(). Then sender splits the file content into packets and signs each packet by generating the key then encrypts the packets and sends to the receiver. The receiver verifies the packets and then decrypts the message using sender's public key.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"20 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79089413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defense mechanism against selective forwarding attack in wireless sensor networks 无线传感器网络对选择性转发攻击的防御机制
P. C. Geethu, M. Rameez
{"title":"Defense mechanism against selective forwarding attack in wireless sensor networks","authors":"P. C. Geethu, M. Rameez","doi":"10.1109/ICCCNT.2013.6726833","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726833","url":null,"abstract":"Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory make sensor networks incompatible with conventional security solutions, which need complex computations and high memory. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. In such an attack compromised nodes drop packets selectively, which may deteriorate the network efficiency. In this paper multipath routing scheme is used as defense mechanism against selective forwarding attack. When a node detects packet drop during the routing, it will resend the packet through alternate route. Due to the resending mechanism reliability of the routing scheme is improved.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"23 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87300491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Detection of lung cancer nodules using automatic region growing method 自动区域生长法检测肺癌结节
Kenji Suzuki, H. Abe, H. MacMahon
{"title":"Detection of lung cancer nodules using automatic region growing method","authors":"Kenji Suzuki, H. Abe, H. MacMahon","doi":"10.1109/ICCCNT.2013.6726669","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726669","url":null,"abstract":"Image Segmentation is an important part of image processing. It is used in medical field to detect and to diagnose the death threatening diseases. Manual readings can be done to analyze the medical images. But still the result leads to misdiagnosis by manual segmentation and the accuracy is not so high. Many Computer Aided Detection systems arise to increase the accuracy and performance rate. In the field of medical diagnosis, imaging techniques is presently available, such as radiography, computed tomography (CT) and magnetic resonance imaging (MRI). Medical image segmentation is more crucial part in analyzing the images. Although the conventional region growing algorithm yields in better result, it lacks with the concept of manual selection of seed points. A new approach is used to segment the images to identify the focal areas in lung nodules. Threat Points Identification is used with region growing method for segmenting the suspicious region. Experiment is carried out using real time images to investigate our method.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"47 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84732932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
A methodology for ranking cloud system vulnerabilities 一种对云系统漏洞进行排名的方法
Patrick Kamongi, Srujan Kotikela, M. Gomathisankaran, K. Kavi
{"title":"A methodology for ranking cloud system vulnerabilities","authors":"Patrick Kamongi, Srujan Kotikela, M. Gomathisankaran, K. Kavi","doi":"10.1109/ICCCNT.2013.6726854","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726854","url":null,"abstract":"Nowadays there is a high demand for security assurance within Cloud Computing world. To meet this demand, security practitioners attempt to assess security vulnerabilities that any given cloud system may have, however this task present some challenges when exposed to a complex cloud system. Different security tools have been developed to facilitate the vulnerabilities discovery process. In this paper we propose a new methodology for ranking cloud system vulnerabilities. We have designed and developed a working model. It starts with vulnerabilities discovery process from our custom cloud web application and ends up with a unified and simple view of ranked vulnerabilities mounted on each of the prioritized and generated attack paths.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"83 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90624213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An effective numbering and classification system for dental panoramic radiographs 牙科全景x线片的有效编号和分类系统
Vijayakumari Pushparaj, U. Gurunathan, B. Arumugam, Abhinaya Baskaran, Alamelu Valliappan
{"title":"An effective numbering and classification system for dental panoramic radiographs","authors":"Vijayakumari Pushparaj, U. Gurunathan, B. Arumugam, Abhinaya Baskaran, Alamelu Valliappan","doi":"10.1109/ICCCNT.2013.6726480","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726480","url":null,"abstract":"In the current scenario, identifying a person in mass disasters is a challenging problem if adequate biometric information is not available. It can be handled by using dental radiographs as a suitable biometric means in such a circumstance. Forensic Odontology is a branch under biometrics which uses dental radiographs for human identification. In this paper an attempt is made to develop an algorithm for teeth numbering and classification, which is a major section in Automated Dental Identification system. Individual identification using dental panoramic images is an issue addressed in the literature. Hence, this work makes use of panoramic images for emerging this algorithm. The dental radiographs are initially preprocessed and each tooth is isolated for further processing. This image is subjected to Support Vector Machine classifier to segregate the tooth as Molar or Premolar. Then template matching algorithm followed by Universal numbering system is used to number the teeth. Experimental results show that this algorithm has numbering accuracy of 93.3% for Molar and 92% for premolar.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"77 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80591980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adoption of business intelligence: In hotel industry 采用商业智能:在酒店行业
Mehdi Daryaei, M. Shirzad, Vinod Kumar
{"title":"Adoption of business intelligence: In hotel industry","authors":"Mehdi Daryaei, M. Shirzad, Vinod Kumar","doi":"10.1109/ICCCNT.2013.6726506","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726506","url":null,"abstract":"These days using Business Intelligence systems are widely popular in the world. Global financial crises make every enterprise to organize a new strategy to stay abreast of rapidly changes. Making decision under time pressure, unpredictable market demand, dramatic market changes, competitors and several other factors compel force senior managers to adopt Intelligence systems [1]. The approach of Business Intelligence needs specific considerations, which are examined in this study in detail. The adoption process has closely affected to implementation process and some facts should be concerned carefully. Thus any failed applying procedures may have a source on adoption routine. Although one of the possible course of action is to care about individuals' behavior. In this study theories were developed to emerge a conceptual model. The survey is conducted to find weight and relations between the factors which are affecting the adoption process and the intention to use. Hypotheses were examined in order to investigate the impact of these factors to BI adoption.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"40 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91028614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data mining based CIDS: Cloud intrusion detection system for masquerade attacks [DCIDSM] 基于数据挖掘的CIDS:伪装攻击的云入侵检测系统[DCIDSM]
Jain Pratik, Madhu B R
{"title":"Data mining based CIDS: Cloud intrusion detection system for masquerade attacks [DCIDSM]","authors":"Jain Pratik, Madhu B R","doi":"10.1109/ICCCNT.2013.6726497","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726497","url":null,"abstract":"Data mining has been gaining popularity in knowledge discovery field. In recent years, data mining based intrusion detection systems (IDSs) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. Still, significant challenges exist in design and implementation of production quality IDSs. Masquerade attacks pose a serious threat for cloud system due to the massive amount of resource of these systems. This paper presents a Cloud Intrusion Detection System (CIDS) for CIDD dataset, which contains the complete audit parameters that help in detecting more than hundred instances of attacks and masquerades that exist in CIDD. It also offers numerous advantages in terms of alert infrastructure, security, scalability, reliability and also has data analysis tools.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"66 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89867815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信