{"title":"An approach for semantic query expansion based on maximum entropy-hidden Markov model","authors":"R. Jothilakshmi, N. Shanthi, R. Babisaraswathi","doi":"10.1109/ICCCNT.2013.6726755","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726755","url":null,"abstract":"The ineffectiveness of information retrieval systems is mostly caused by the inaccurate query formed by a few keywords that reflect actual user information need. One well known technique to overcome this limitation is Automatic Query Expansion (AQE), whereby the user's original query is improved by adding new features with a related meaning. It has long been accepted that capturing term associations is a vital part of information retrieval. It is therefore mainly to consider whether many sources of support may be combined to forecast term relations more precisely. This is mainly significant when frustrating to predict the probability of relevance of a set of terms given a query, which may involve both lexical and semantic relations between the terms. This paper presents a approach to expand the user query using three level domain model such as conceptual level(underlying Domain knowledge), linguistic level(term vocabulary based on Wordnet), stochastic model ME-HMM2 which combines (HMM (Hidden Markov Model and Maximum Entropy(ME) models) stores the mapping between such levels, taking into account the linguistic context of words.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"62 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90100321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nucleotide transfigurations using playback conversion","authors":"B. Kathiresan, G. Karthik","doi":"10.1109/ICCCNT.2013.6726612","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726612","url":null,"abstract":"Bioinformatics is the application of computer technology for the management and analysis of biological data. Pattern matching in a DNA sequence or searching a pattern from a large data base is a major research area in computational biology. One of the major problems in genomic field is to perform pattern comparison on DNA and protein sequences. A full DNA strand contains three billion of nucleotide bases. To parse and to convert amino acids of high volume, the existing approach takes some minutes. If the conversion process is aborted in middle, it will restart from the beginning again. In order to overcome this drawback, the playback conversion approach is proposed to continue the process from where it aborted. And the subsequent implementation of this approach in parallel mode will reduce forty percent of time taken by the existing approach. This paper entirely focuses on an approach to reduce the time taken for the conversion of nucleotide to amino acids. The proposed technique gives very good performance related to DNA sequence analysis for querying of publicly available genome sequence data. These experimental results show that there is considerable increase in the improvement of overall performance.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"26 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89150237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy rule based data forwarding for energy efficient wireless sensor networks in industrial control system","authors":"S. Jisha, Sangeetha Jamal","doi":"10.1109/ICCCNT.2013.6726638","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726638","url":null,"abstract":"Industrial Control System employ wireless sensor networks for monitoring plant operational condition. The key challenging issue with the implementation of wireless sensor networks is the limiting energy constraint of sensor nodes. This paper proposes a novel approach for an effective energy efficient data forwarding technique based on the state information monitored by the sensor nodes. The sensed data is checked against a fuzzy rule database and a forward decision is made only if any rule in the database is triggered. This approach reduces the data transmission overhead thereby improving lifetime of sensor nodes in the wireless sensor networks.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83062617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure multicast transmission","authors":"W. R. S. Jeyaseelan, S. Hariharan","doi":"10.1109/ICCCNT.2013.6726783","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726783","url":null,"abstract":"The group communication has been implemented by Multicast Authentication Batch Signature (MABS). This eliminates the network overheads such as packet loss, latency computation and communication overhead. The Batch signature is the effective cryptographic primitive which authenticates any number of packets simultaneously. This paper gives the solution by introducing Enhanced Multicast Authentication Batch Signature (MABS-E) by eliminating DOS impact. The sender side file content is displayed in both sender and receiver. The receiver can send the request to the sender by sending the file name. The authentication is verified by the sender by use of batch verify(). Then sender splits the file content into packets and signs each packet by generating the key then encrypts the packets and sends to the receiver. The receiver verifies the packets and then decrypts the message using sender's public key.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"20 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79089413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defense mechanism against selective forwarding attack in wireless sensor networks","authors":"P. C. Geethu, M. Rameez","doi":"10.1109/ICCCNT.2013.6726833","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726833","url":null,"abstract":"Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory make sensor networks incompatible with conventional security solutions, which need complex computations and high memory. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. In such an attack compromised nodes drop packets selectively, which may deteriorate the network efficiency. In this paper multipath routing scheme is used as defense mechanism against selective forwarding attack. When a node detects packet drop during the routing, it will resend the packet through alternate route. Due to the resending mechanism reliability of the routing scheme is improved.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"23 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87300491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of lung cancer nodules using automatic region growing method","authors":"Kenji Suzuki, H. Abe, H. MacMahon","doi":"10.1109/ICCCNT.2013.6726669","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726669","url":null,"abstract":"Image Segmentation is an important part of image processing. It is used in medical field to detect and to diagnose the death threatening diseases. Manual readings can be done to analyze the medical images. But still the result leads to misdiagnosis by manual segmentation and the accuracy is not so high. Many Computer Aided Detection systems arise to increase the accuracy and performance rate. In the field of medical diagnosis, imaging techniques is presently available, such as radiography, computed tomography (CT) and magnetic resonance imaging (MRI). Medical image segmentation is more crucial part in analyzing the images. Although the conventional region growing algorithm yields in better result, it lacks with the concept of manual selection of seed points. A new approach is used to segment the images to identify the focal areas in lung nodules. Threat Points Identification is used with region growing method for segmenting the suspicious region. Experiment is carried out using real time images to investigate our method.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"47 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84732932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Patrick Kamongi, Srujan Kotikela, M. Gomathisankaran, K. Kavi
{"title":"A methodology for ranking cloud system vulnerabilities","authors":"Patrick Kamongi, Srujan Kotikela, M. Gomathisankaran, K. Kavi","doi":"10.1109/ICCCNT.2013.6726854","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726854","url":null,"abstract":"Nowadays there is a high demand for security assurance within Cloud Computing world. To meet this demand, security practitioners attempt to assess security vulnerabilities that any given cloud system may have, however this task present some challenges when exposed to a complex cloud system. Different security tools have been developed to facilitate the vulnerabilities discovery process. In this paper we propose a new methodology for ranking cloud system vulnerabilities. We have designed and developed a working model. It starts with vulnerabilities discovery process from our custom cloud web application and ends up with a unified and simple view of ranked vulnerabilities mounted on each of the prioritized and generated attack paths.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"83 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90624213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vijayakumari Pushparaj, U. Gurunathan, B. Arumugam, Abhinaya Baskaran, Alamelu Valliappan
{"title":"An effective numbering and classification system for dental panoramic radiographs","authors":"Vijayakumari Pushparaj, U. Gurunathan, B. Arumugam, Abhinaya Baskaran, Alamelu Valliappan","doi":"10.1109/ICCCNT.2013.6726480","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726480","url":null,"abstract":"In the current scenario, identifying a person in mass disasters is a challenging problem if adequate biometric information is not available. It can be handled by using dental radiographs as a suitable biometric means in such a circumstance. Forensic Odontology is a branch under biometrics which uses dental radiographs for human identification. In this paper an attempt is made to develop an algorithm for teeth numbering and classification, which is a major section in Automated Dental Identification system. Individual identification using dental panoramic images is an issue addressed in the literature. Hence, this work makes use of panoramic images for emerging this algorithm. The dental radiographs are initially preprocessed and each tooth is isolated for further processing. This image is subjected to Support Vector Machine classifier to segregate the tooth as Molar or Premolar. Then template matching algorithm followed by Universal numbering system is used to number the teeth. Experimental results show that this algorithm has numbering accuracy of 93.3% for Molar and 92% for premolar.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"77 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80591980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adoption of business intelligence: In hotel industry","authors":"Mehdi Daryaei, M. Shirzad, Vinod Kumar","doi":"10.1109/ICCCNT.2013.6726506","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726506","url":null,"abstract":"These days using Business Intelligence systems are widely popular in the world. Global financial crises make every enterprise to organize a new strategy to stay abreast of rapidly changes. Making decision under time pressure, unpredictable market demand, dramatic market changes, competitors and several other factors compel force senior managers to adopt Intelligence systems [1]. The approach of Business Intelligence needs specific considerations, which are examined in this study in detail. The adoption process has closely affected to implementation process and some facts should be concerned carefully. Thus any failed applying procedures may have a source on adoption routine. Although one of the possible course of action is to care about individuals' behavior. In this study theories were developed to emerge a conceptual model. The survey is conducted to find weight and relations between the factors which are affecting the adoption process and the intention to use. Hypotheses were examined in order to investigate the impact of these factors to BI adoption.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"40 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91028614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data mining based CIDS: Cloud intrusion detection system for masquerade attacks [DCIDSM]","authors":"Jain Pratik, Madhu B R","doi":"10.1109/ICCCNT.2013.6726497","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726497","url":null,"abstract":"Data mining has been gaining popularity in knowledge discovery field. In recent years, data mining based intrusion detection systems (IDSs) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. Still, significant challenges exist in design and implementation of production quality IDSs. Masquerade attacks pose a serious threat for cloud system due to the massive amount of resource of these systems. This paper presents a Cloud Intrusion Detection System (CIDS) for CIDD dataset, which contains the complete audit parameters that help in detecting more than hundred instances of attacks and masquerades that exist in CIDD. It also offers numerous advantages in terms of alert infrastructure, security, scalability, reliability and also has data analysis tools.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"66 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89867815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}