Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Computing and mathematical modeling
PREMIUM
Số trang
327
Kích thước
62.1 MB
Định dạng
PDF
Lượt xem
956

Computing and mathematical modeling

Nội dung xem thử

Mô tả chi tiết

Computing and

Mathematical Modeling

Computing and

Mathematical Modeling

E d ito rs

K. Thangavel

P. Balasubramaniam

Narosa Publishing House

N ew Delhi Chennai M umbai Kolkata

E d ito rs

K . T h angavel

P. B alasu b ram an iam

Department of Mathematics

Gandhigram Rural Institute (Deemed University)

Gandhigram, India

Copyright €> 2006, Narosa Publishing House Pvt. Ltd.

N A R O S A P U B L I S H I N G H O U S E PVT. LTD.

22 Daryaganj, Delhi Medical Association Road, New Delhi 110 002

35-36 Greams Road, Thousand Lights, Chennai 600 006

306 Shiv Centre, D.B.C. Sector 17, K.U. Bazar P.O., Navi Mumbai 400 703

2F-2G Shivam Chambers, 53 Syed Amir Ali Avenue, Kolkata 700 019

w w w .narosa.com

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,

or transmitted in any form or by any means, electronic, mechanical, photocopying,

recording or otherwise, without prior written permission of the publisher.

All export rights for this book vest exclusively with Narosa Publishing House.

Unauthorised export is a violation of terms of sale and is subject to legal action.

Printed from the camera-ready copy provided by the Editors.

ISBN 81-7319-720-2

Published by N.K. Mehra for Narosa Publishing House Pvt. Ltd.,

22 Daryaganj, Delhi Medical Association Road, New Delhi 110 002

and printed at Rajkamal Electric Press, New Delhi 110 033, India

Preface

M athem atics is the com m on language o f m odem science, engineering, and business. T echniques

o f m athem atical m odeling and data analysis are key instrum ents in the tool kit o f m odern

practitioners and researchers in a w ide array o f disciplines.

C om puting and M athem atical m odeling is a prom ising and hot area o f current research

and developm ent, w hich can provide im portant advantages to the users. It can yield substantial

know ledge from m odeling prim arily gathered for a w ide range o f different applications. A lm ost

all industrialists, scientists, engineers and science disciplines are applying the com puting and

m athem atical m odeling to increasing effect.

T he D epartm ent o f M athem atics o f G andhigram R ural Institute-D eem ed U niversity,

G andhigram had organized a tw o day N ational C onference on C om puting and M athem atical

M odeling(N C C M M -2005) under U niversity G rants Com m ission-Special A ssistance Program m e

(U G C -SA P). T he conference facilitated the tools for the researchers w orking in soft com puting/

com putational in telligence and application d evelopers from m any differen t areas, to share

state-of-the-art research results and practical developm ent experiences. T h is volum e contains

38 papers presented after peer review . T he D epartm ent o f M athem atics ex presses its sincere

thanks and regards for all the help and assistance it received from various organizations, Institutions

and individuals.

We ow e our deep sense o f gratitude to the U G C for having sanctioned SA P (D R S ) to

the D epartm ent o f M athem atics from 2004 to 2009 and for having perm itted us to organize the

conference under th is program m e.

E ditors

K. Thangavel

P. Balasubramaniam

Table of Contents

Preface

Cryptography

Information Security and Threshold Cryptography

M.K. Viswanath and K P. Vidya

A Public Distribution Model Using the Feige-Fiat-Shamir Scheme

M K Viswanath and A R Deepti

Neural vs Genetic in Steganography to Indirectly Hide Sensitive Data

T Subha Jayanthi and V. Kavitha

Data M ining

Rule Identification in HIV Data Using Rough Set Strategies

A. Pethalakshmi and K. Thangavel

Grid Based Performance Enhancement of the Mathematical Application

K.S. Ravichandran and M.G. Lakshmi Kanna

Reducts in Information System with Conditional Decision Attributes

G Ganesan and C. Raghavendra Rao

Extended ID3 Algorithm for G enerating Decision Rules Directly for

Rule Post Pruning in Data M ining

S. S. VijayaSri, P. Jaganathan and V Alagarsamy

Im age Processing

Performance Study on Segmentation of Mammogram Image Using

GLRL Texture Features

C. Veiayutham and K. Thangavel

Design and Implementation of Noisy Image Restoration System:

A Neuro Fuzzy Approach

C. Samraj D aniel, V. Seenivasagam and K. Ramar

Image Restoration Using Radial Basis Function Networks

A K Kumaresh and M. Marudai

A Modified Block Truncation Coding for Image Compression

K. Somasundaram and I. Kaspar Raj

Enhancement of Digital M ammogram Using Hybrid Filtering Techniques

K Thangavel, M. Karnan and R. Sivakumar

Performance Analysis of Haralick Features

R Rose!in and K Thangavel

Comparative Study of Clustering Algorithms Using Statistical Features Extracted

from Mammograms by Spatial Grey Level Dependency Matrix

D Ashok Kumar, C. Velayutham and K. Thangavel

EfTect of Window Size and Weight of Median Filters in Removing Impulse Noise

K. Somasundaram and P. Shanmugavadivu

Design and Implementation of Image Restoration: A Neural Network Based

Comparative Study

S. Prakash, V. Seenivasagam and K Ramar

Mathematical M odeling

Short Term Software Failure Predictions Using Time Series Analysis with

Weightage for Recent Failures

S. Venkateswaran, B Sam, K Ekambavanan, P. Vivekanandan and R Ahmed

A Study on Plasma Confinement by a Computational Model

H.B. Ramalingam and V. Selvarajan

Solutions of a Specific Integral Equation Arising out of

C ertain Classes of Point Processes

A.G. Srinivasan

Optimal Control for Bilinear Singular System with a Generalised Cost

P. Balasubramaniam and N. Kumaresan

Advanced Properties of Brownian Paths in Stochastic Modeling

R Sasikumar and V.S. Sampath Kumar

Expected Time to Recruitment in Man Power Planning-A Shock Model Approach

A Srinivasan and S. Sendhamizhselvi

Expected Time to Recruitment in an Organization with ‘n’ Parallel Branches

A. Srinivasan and V. Saavithri

Facial Expression Recognition through Model Based Face Tracking

R. Bhavani, R. Krishnamoorlhy and P. Gajalakshmi

viii Table o f Contents

93

103

112

121

128

137

139

146

157

163

171

182

189

197

Table o f Contents ix

A Synchronous M ethod of Stream Ciphers Using Genetic Algorithm

N. Nalini and G. Raghavendra Rao

Neural Network

Computational Authorship Using Neural Network

G Manimannan, W. Abdul H am eed and M Bagavandas

Solution of Systems of Linear Equations :A Neural Network Approach Using M atlab

W. Abdul Hameed and M. Bagavandas

Optim al Stabilising Q uadratic Control of an Inverted Pendulum Using Neural Networks

P Balasubramaniam and J Abdul Samath

Operations Research

Algorithm to Solve Separable Non-Linear Fractional Program m ing Problems

R Mohanraj, S. Saravanan and R M. Chandrasekaran

Genetic Algorithm A pproach to the Axial Multidimensional Assignment Problem

K. Thangavel and G. Velammal

An Approximative Solution to Unconstrained Multi-Objective

Stochastic Optimization Problem

V. Charles, D S Bharadwaj and N. Abdul Ali

Transient Analysis of a System with Queue Dependent Servers and

Controllable Arrivals

K Udaya Chandrika and K. P. Uma

Theory of Computation

A rray Contextual G ram m ar and its Relevance in DN A Computing

A Murugan and K S. Easwarakumar

Gram m ar, DFA for and from DTL (Decision Tree Learning)

Dinesh B. Hanchate, Sanjay R. Sutar, Indrabhan S. Borse and S M. Choudhari

Simple Contextual A rray G ram m ars and Languages

P Helen Chandra and K G. Subramanian

On Inference of Uniquely Term inating Linear Languages

S. Kannamma, D.G. Thomas and K. Rangarajan

204

211

213

222

231

239

241

248

253

261

269

271

278

282

291

x Table o f Contents

A rray Token Petri Nets

S. Kannamma, K Rangarajan, D G. Thomas and N. G David

Reliable Design Approach for Communication Networks to

Avoid Denial of Service Attacks

S. Behin Sam, S. Venkateswaran, P. Vivekanandan and A. Kannan

Cryptography

C o m p u tin g and M a th em a tica l M o d elin g

Editors: K. Thangavel and P. Balasubramaniam

Copyright© 2006, Narosa Publishing House, New Delhi, India

Information Security and Threshold Cryptography

M .K . V isw anath and K.P. V idya

Department of Mathematics, Madras Christian College (Autonomous)

Affiliated to University of Madras, Chennai 600 059, Tamil Nadu

ABSTRACT

Secret sharing schemes are multi-party protocols that facilitate shared control o f critical activities.

Threshold schemes are a special class of these schemes, where, only / o f a total of n participants o f the

scheme (t £ n), need to pool in their shares, to trigger the critical action. In this paper, we suggest a

web application of the (I, n) threshold scheme based on the Chinese Remainder Theorem. Our

application offers an efficient solution for online submission o f research papers at Conferences, which

insist on Author anonymity at the time o f submission and the results o f the acceptance/non-acceptance

o f the papers need to be published without compromising on the identity o f the referees.

Keywords Secret Sharing, Threshold Scheme, Chinese Remainder Theorem

1. INTRODUCTION

A Secret sharing scheme is a multi-party protocol where two or more parties derive a shared secret

from information contributed by, or associated with each o f them, such that, no party can predetermine

the resulting value. That is, a dealer D divides a secret 5 into n pieces called shares or shadows and

distributes them to the n participants Ph i= I,...,« of the scheme. Later, the secret S is reconstructed by

pooling in the shares of authorized sets of participants. This reconstruction may be carried out with the

help of a combiner C. Moreover, if <t> denotes the group o f participants and T and A respectively

denote the set o f authorized and unauthorized participants where r and A are assumed to be mutually

disjoint then the collection (/", A) is called the access structure o f the secret sharing scheme. The

access structure is called a monotone access structure if a set P containing r is also a set o f authorized

participants.

A perfect secret sharing scheme is one in which the shares corresponding to each

unauthorized subset provides absolutely no information about the shared secret. In fact, they have a

monotone access structure. The efficiency o f any secret sharing scheme is measured by its information

rate (defined as the minimum such rate over all the participants where information rate fo r a

3

Tải ngay đi em, còn do dự, trời tối mất!