2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)最新文献

筛选
英文 中文
Watermarking in motion vector for security enhancement of medical videos 运动矢量水印用于医学视频的安全性增强
S. Acharjee, Sayan Chakraborty, R. Ray, S. Nath, N. Dey
{"title":"Watermarking in motion vector for security enhancement of medical videos","authors":"S. Acharjee, Sayan Chakraborty, R. Ray, S. Nath, N. Dey","doi":"10.1109/ICCICCT.2014.6993019","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993019","url":null,"abstract":"With the advancement in technology, it becomes easy for some individuals to use digital data without the permission of the owner. To increase authentication and security of copyrights, digital watermarking was introduced. Medical videos contain very significant information about the condition of the patient. A good watermarking scheme should always contain very less distortion. Videos generally contain huge temporal redundancy, which demands the use of motion vector estimation technique in order to remove the temporal redundancy. In this work, an image was watermarked inside the motion vector of two consecutive frames of an echo-cardiograph video. Quality analysis of the recovered video with the original video proves the robustness of the proposed scheme.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"73 1","pages":"532-537"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86045202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Remote web based monitoring and controlling of a nonlinear process using micro controller 基于web的非线性过程的微控制器远程监控
D. Ganesh, M. K. Chakravarthi
{"title":"Remote web based monitoring and controlling of a nonlinear process using micro controller","authors":"D. Ganesh, M. K. Chakravarthi","doi":"10.1109/ICCICCT.2014.6993062","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993062","url":null,"abstract":"Controlling of liquid level in Nonlinear spherical is a difficult task in industries. It is highly non linear because of its shape. This paper represents a micro controller based Nonlinear tank level monitor and controlling system using LabVIEW(Laboratory Virtual Instrument Engineering Workbench). Differential Pressure Transmitter (DPT) measures the level and it gives the corresponding analog voltage signal, further process is done with the micro controller. The data will be displayed on the LabVIEW GUI and LCD. The tank1 level will be controlled over the Internet.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"47 1","pages":"767-770"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86062051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy efficient task scheduling for parallel workflows in cloud environment 云环境下并行工作流的节能任务调度
Mallari Harish Kumar, S. K. Peddoju
{"title":"Energy efficient task scheduling for parallel workflows in cloud environment","authors":"Mallari Harish Kumar, S. K. Peddoju","doi":"10.1109/ICCICCT.2014.6993161","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993161","url":null,"abstract":"The demand for the Cloud services are increasing day by day and so the resources in the Cloud data centers. To meet the demands, a lot of research has done in reducing the service response time by increasing the utilization of the resources, but neglected the energy consumption of the resources. The data centers consume huge amount of energy and dissipate carbon footprints in the environment. The energy consumption in Cloud includes the energy consumed by the servers, memory, network, cooling systems and conversion. As the servers consumes major fraction of energy, we consider our work on server's energy consumption. The parallel applications are gaining importance in Cloud that throws a significant challenge in energy saving of the Cloud servers. In this paper we propose a method to reduce the energy consumption by using the Dynamic Voltage Frequency Scaling technique where the servers operate at different levels of voltage by reducing the operating frequency. We use the slack time between the tasks to sacrifice the operating frequency so that the schedule do not violate the deadline of parallel applications. We used the real world applications represented by Directed Acyclic Graphs for simulation purpose. The results shows that the proposed algorithm achieves the significant energy saving with the existing approaches.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1997 1","pages":"1298-1303"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88174270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enhancing security of Android & IOS by implementing need-based security (NBS) 通过实施基于需求的安全(NBS)增强Android和IOS的安全性
M. Dar, J. Parvez
{"title":"Enhancing security of Android & IOS by implementing need-based security (NBS)","authors":"M. Dar, J. Parvez","doi":"10.1109/ICCICCT.2014.6993055","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993055","url":null,"abstract":"The most popular Smartphone platforms i.e. Android and iOS are equipped with the built-in security features to safeguard their end users. Android, being an Open Source Mobile Operating System, has some security vulnerabilities. Such limitations are also present in iOS which is a proprietary platform with some open source components. In this paper we will compare in detail the security features of Android and iOS, with the intent to integrate the need based security (NBS) model in Android which selectively grants permission to access resources on a Smartphone at run time. This paper proposes the implementation of a reverse engineering process which restricts an app's permissions and provides a need based mechanism to access resources. The repackaged app with need based security will run on all devices that were supported by the original application.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"38 1","pages":"728-733"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82532687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Wind and seismic calculation: Requirement of tall pressure vessel for preventing process industries disasters 风与地震计算:防止过程工业灾害的高压力容器要求
A. M. Senthil Anbalazahan, M. Dev Anand, K. Janardhanan, D. Kinslin
{"title":"Wind and seismic calculation: Requirement of tall pressure vessel for preventing process industries disasters","authors":"A. M. Senthil Anbalazahan, M. Dev Anand, K. Janardhanan, D. Kinslin","doi":"10.1109/ICCICCT.2014.6993184","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993184","url":null,"abstract":"The design of tall column is a big challenge to equipment developers in industries. The varied kind of design steps to be followed makes it difficult and complex. Apart from the column design, the wind and seismic loading calculation is one of the major requirements. This paper is an attempt to study how tall column has to be designed for withstanding heavy wind and seismic conditions and what are all the design steps fabricator needed to be considered during their design for preventing failures. The calculation is generated with respect to the requirement of international codes and standards. The code rules like ASME SECVIII DI, ASME SECVIII DII, ASCE-93 and ASCE-88 were used. The ASCE rule is combined with ASME to set up exact design requirements. The allowed stresses are used to determine the acceptability of column and its supports under all loading are studied. The obtained results are satisfactory in line with the requirement of international codes and standards. The design recommendation for safe design and the mandatory steps needed to be followed by fabricators in this type of design are recorded below.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"47 1","pages":"1418-1431"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82790351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of watermarking in vector quantization based image compression 基于矢量量化的图像压缩中水印的影响
S. Bose, Shatadru Roy Chowdhury, Madhulika, Sayan Chakraborty, S. Acharjee, N. Dey
{"title":"Effect of watermarking in vector quantization based image compression","authors":"S. Bose, Shatadru Roy Chowdhury, Madhulika, Sayan Chakraborty, S. Acharjee, N. Dey","doi":"10.1109/ICCICCT.2014.6993014","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993014","url":null,"abstract":"In the modern era of health care and medical diagnostics, medical image contents are needed to be transported through the internet, in a safe and secured way, within time. Image compression is a process of reducing the size of an image without affecting the quality. Image compression reduces the size and helps in quick transportation. Digital watermarking is a process of embedding some secret data in an image for copyright protection, authentication, and channel reliability detection, done without affecting its look. In this work, vector quantization based compression technique is used. It follows LBG clustering algorithm. For watermarking, DCT-DWT based embedding and extraction technique is adopted. At first, retina image was compressed and BPP, SNR, MSE, PSNR values were compared, before and after compression. Later, a binary EPR logo image was embedded into compressed and uncompressed images. Correlation values of original watermark and extracted watermark images were computed and compared for further study.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"30 1","pages":"503-508"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90822011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Study on the impact of CDFG on the design aspects of combinational logic circuits CDFG对组合逻辑电路设计的影响研究
V. Balamurugan, N. Nandhitha
{"title":"Study on the impact of CDFG on the design aspects of combinational logic circuits","authors":"V. Balamurugan, N. Nandhitha","doi":"10.1109/ICCICCT.2014.6992983","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992983","url":null,"abstract":"CDFG plays the most important role in digital circuit design as it directly affects the area, speed and cost of the designed circuit. Hence in order to obtain an effective circuit, it is necessary to optimize CDFG. In this paper a detailed study on CDFGs for four different circuits is made for both pipelined and non-pipelined architecture. Performance is Measured in terms of number of circuit elements, delay and Balsa cost, it is found that the area complexity increases in the CDFGs of pipelined architectures. On the other hand, the CDFGs of non-pipelined architecture are computationally simpler. However latency decreases in the former when compared to the later.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"6 1","pages":"340-343"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91276665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey of the existing shadow detection techniques 对现有阴影检测技术的综述
D. Nandini, A. Ezil, Sam Leni
{"title":"A survey of the existing shadow detection techniques","authors":"D. Nandini, A. Ezil, Sam Leni","doi":"10.1109/ICCICCT.2014.6992951","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992951","url":null,"abstract":"Shadows are formed when light from the source is obstructed by an object. Shadows hide the information of the underlying objects which will lead to wrong interpretations during image processing. Hence shadow detection has become a vital pre-processing step in digital image processing as most of the images acquired are contaminated with shadows. The shadows are found more in urban images where the surface elevation changes dramatically thus increasing the complexity of the scenes. In this paper we discuss the various techniques that have been used for shadow detection for both still images and moving objects.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"109 1","pages":"175-177"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91139268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Split range calibration in pressure measurement of re-entry flush air data sensing system (FADS) for overall system accuracy enhancement 再入空气数据传感系统(FADS)压力测量的分程校准,以提高整个系统的精度
S. Vidya, Arun Satheesan, Aisha Sidhick, K. Finitha, M. Jayakumar, A. K. Abdul Samad
{"title":"Split range calibration in pressure measurement of re-entry flush air data sensing system (FADS) for overall system accuracy enhancement","authors":"S. Vidya, Arun Satheesan, Aisha Sidhick, K. Finitha, M. Jayakumar, A. K. Abdul Samad","doi":"10.1109/ICCICCT.2014.6992949","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992949","url":null,"abstract":"Flush Air Data Sensing System (FADS) forms mission critical sub system in future reusable space transportation systems. FADS makes use of surface pressure measurements from the nose cap of the vehicle for deriving the air data parameters of the vehicle such as angle of attack, angle of sideslip, Mach number, etc. These parameters are used by the control and guidance system of the vehicle for reentry flight management as well as for subsequent mission phases upto landing. The overall system accuracy of FADS is mainly dictated by the accuracy of the surface pressure measurements. The demanded accuracies are of the order of 100 Pascal in a full scale of 140000 Pascal (0.07% FS). This paper addresses the four split range pressure calibration scheme that is used for achieving the above accuracy. Trade off studies carried out on the number of split ranges and the order of least squares curve fit to be used are presented. The scheme for voltage based split range selection to reduce the errors at range boundary crossover points and during recovery after a port blockage is presented. Details of the hysteresis logic used for real time implementation for preventing back and forth switching of scale factors at the split range crossover points are also presented. The use of split range calibration and hysteresis logic for pressure sensors in FADS has not been reported in earlier literature. Experimental results are presented which establishes the demanded pressure measurement accuracy.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"24 1","pages":"165-170"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82894527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison of RFID data processing using dimensionality reduction techniques 使用降维技术的RFID数据处理的比较
Maria Anu, Anandha Mala
{"title":"Comparison of RFID data processing using dimensionality reduction techniques","authors":"Maria Anu, Anandha Mala","doi":"10.1109/ICCICCT.2014.6992967","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992967","url":null,"abstract":"Radio Frequency Identification Technology (RFID) used in wide range environment. The volume of RFID data is enormous, the management and extraction of data is complex and time consuming process. RFID data processing can be performed after applying dimensionality reduction techniques. The proposed APCA is efficient one to handle the huge and noisy data. We had taken the two different sets of RFID data for applying this dimensionality reduction technique. The compression and execution time is calculated for these data sets. We have considered principal component Analysis (PCA) and advanced principal component analysis (APCA) and compared both the results in terms of dataset size and response time. Experiment results show that, APCA has better performance when process the RFID data.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"38 1","pages":"265-268"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83155233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信