A Pattern Recognition Approach To Secure Cipher Documents

نویسندگان

  • Saravanan Kumarasamy
  • T. Stephen Thangaraj
چکیده

Natural phenomena show that many creatures form large social groups and move in regular patterns. Previous In this paper, we first propose an efficient distributed mining algorithm to jointly identify a group of moving objects and discover their movement patterns in wireless sensor networks. Afterward, we propose a compression algorithm, called 2P2D, which exploits the obtained group movement patterns to reduce the amount of delivered data. The compression algorithm includes a sequence merge and an entropy reduction phases. we formulate a Hit Item Replacement (HIR) problem and propose a Replace algorithm that obtains the optimal solution. Moreover, we devise three replacement rules and derive the maximum compression ratio.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An invisible hybrid color image system using spread vector quantization neural networks with penalized FCM

In this paper, an invisible hybrid color image hiding scheme based on spread vector quantization (VQ) neural network with penalized fuzzy c-means (PFCM) clustering technology (named SPFNN) is proposed. The goal is to offer safe exchange of a color stego-image in the internet. In the proposed scheme, the secret color image is first compressed by a spread-unsupervised neural network with PFCM bas...

متن کامل

A Bayesian Approach for the Recognition of Control Chart Patterns

In this research, an iterative approach is employed to recognize and classify control chart patterns. To do this, by taking new observations on the quality characteristic under consideration, the Maximum Likelihood Estimator of pattern parameters is first obtained and then the probability of each pattern is determined. Then using Bayes’ rule, probabilities are updated recursively. Finally, when...

متن کامل

CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking

Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...

متن کامل

A New Statistical Approach for Recognizing and Classifying Patterns of Control Charts (RESEARCH NOTE)

Control chart pattern (CCP) recognition techniques are widely used to identify the potential process problems in modern industries. Recently, artificial neural network (ANN) –based techniques are very popular to recognize CCPs. However, finding the suitable architecture of an ANN-based CCP recognizer and its training process are time consuming and tedious. In addition, because of the black box ...

متن کامل

Weighted similarity measure on interval-valued fuzzy sets and its application to pattern recognition

A new approach to define the similarity measure betweeninterval-valued fuzzy sets is presented. The proposed approach isbased on a weighted measure in which the normalized similaritiesbetween lower functions and also between upper functions arecombined by a weight parameter. The properties of this similaritymeasure are investigated. It is shown that, the proposed measurehas some advantages in c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1303.0222  شماره 

صفحات  -

تاریخ انتشار 2013