首页 > 最新文献

2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)最新文献

英文 中文
Implementation of optical OFDM based system for optical networks 基于光OFDM的光网络系统实现
B. Rindhe, J. Digge, S. K. Narayankhedkar
Orthogonal frequency division multiplexing (OFDM), a frequency division multiplexing scheme utilized as a digital multi-carrier modulation technique, implemented using optical fiber link for practical applications thereby developing optical OFDM using OptSim simulation. OFDM has many advantages over other modulation techniques such as a high resistance to inter-symbol interference (ISI) and it is robust against fading caused by multipath propagation. Optical fiber cable (OFC) as a transmission media is used for distortion less transmission of data at a very higher data speed. OFC cable has a lot of advantages over other media. And OFDM over OFC cable will provide data speeds at a very high speed and with very less losses. In this work optical transmitter and receiver for OFDM based optical network has designed for high speed data transmission over optical fiber. While modeling the system we have also used post, pre and symmetric compensation technique to reconfigure the bandwidth along with add drop multiplexer, tunable filters and optical amplifiers to achieve high performance with minimum distortion and low bit error rate (BER).
正交频分复用(OFDM)是一种频分复用方案,作为一种数字多载波调制技术,在实际应用中采用光纤链路实现,从而利用OptSim仿真开发了光OFDM。与其他调制技术相比,OFDM具有许多优点,如对码间干扰(ISI)的高抵抗能力和对多径传播引起的衰落的鲁棒性。光纤电缆(OFC)作为一种传输介质,用于以非常高的数据速度进行无失真的数据传输。OFC电缆与其他介质相比有很多优点。OFDM通过OFC电缆将以非常高的速度和非常小的损耗提供数据传输速度。本文设计了基于OFDM的光网络的光发送端和光接收端,以实现光纤上的高速数据传输。在对系统建模时,我们还使用了后置、预置和对称补偿技术来重新配置带宽,以及加丢多路复用器、可调谐滤波器和光放大器,以最小的失真和低误码率(BER)实现高性能。
{"title":"Implementation of optical OFDM based system for optical networks","authors":"B. Rindhe, J. Digge, S. K. Narayankhedkar","doi":"10.1109/EIC.2015.7230706","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230706","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM), a frequency division multiplexing scheme utilized as a digital multi-carrier modulation technique, implemented using optical fiber link for practical applications thereby developing optical OFDM using OptSim simulation. OFDM has many advantages over other modulation techniques such as a high resistance to inter-symbol interference (ISI) and it is robust against fading caused by multipath propagation. Optical fiber cable (OFC) as a transmission media is used for distortion less transmission of data at a very higher data speed. OFC cable has a lot of advantages over other media. And OFDM over OFC cable will provide data speeds at a very high speed and with very less losses. In this work optical transmitter and receiver for OFDM based optical network has designed for high speed data transmission over optical fiber. While modeling the system we have also used post, pre and symmetric compensation technique to reconfigure the bandwidth along with add drop multiplexer, tunable filters and optical amplifiers to achieve high performance with minimum distortion and low bit error rate (BER).","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126318754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Analysisof Photonic bandgap structure in 2-D hexagonal and square lattice structure of photonic crystal 光子晶体二维六边形和方形晶格结构的光子带隙结构分析
M. Waghmare, K. Reddy
This paper revels a defected 2-D hexagonal lattice structure for large frequency range. The 2-D Plane wave expansion (PWE) method is used to investigate large frequency range. It has been shown theoretically that it is possible to obtain large frequency range by adjusting filling factor and absolute frequency.
提出了一种适用于大频率范围的缺陷二维六边形晶格结构。采用二维平面波展开(PWE)方法对大频率范围进行了研究。理论证明,通过调整填充系数和绝对频率,可以获得较大的频率范围。
{"title":"Analysisof Photonic bandgap structure in 2-D hexagonal and square lattice structure of photonic crystal","authors":"M. Waghmare, K. Reddy","doi":"10.1109/EIC.2015.7230704","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230704","url":null,"abstract":"This paper revels a defected 2-D hexagonal lattice structure for large frequency range. The 2-D Plane wave expansion (PWE) method is used to investigate large frequency range. It has been shown theoretically that it is possible to obtain large frequency range by adjusting filling factor and absolute frequency.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126507782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Private cloud security: Secured user authentication by using enhanced hybrid algorithm 私有云安全:通过使用增强的混合算法保护用户身份验证
Nikhil Gajra, S. Khan, Pradnya B. Rane
Using cloud computing, users store their data remotely to third party owners and enjoy the on-demand applications, services and storage from a shared pool of configurable computing resources, without the burden of data storage and maintenance and costs. However, we must provide security guarantees not only on authentication but also on files over the cloud for the outsourced data, which is now maintained by third parties such as cloud providers. This research focuses on mechanism, the hybrid of AES and Blowfish for encryption. For key management and key exchange, Key is generated by the ECC key generator and then Key agreement can be done by Diffie-Hellman. Combining the concept of ECC and DH is called Elliptic Curve Diffie-Hellman (ECDH) key exchange. Authentication should be done by Using Elliptic Curve Digital Signature Algorithm (ECDSA). This provides security protection for outsourced data, while introducing only minimal performance and monetary cost overhead.
使用云计算,用户可以将数据远程存储给第三方所有者,并从共享的可配置计算资源池中享受按需应用程序、服务和存储,而无需承担数据存储和维护的负担以及成本。但是,我们必须不仅在身份验证上提供安全保证,而且在外包数据的云上文件上提供安全保证,这些外包数据现在由云提供商等第三方维护。本文主要研究AES和Blowfish的混合加密机制。对于密钥管理和密钥交换,密钥由ECC密钥生成器生成,然后由Diffie-Hellman进行密钥协议。将ECC和DH的概念结合起来称为椭圆曲线Diffie-Hellman (ECDH)密钥交换。采用椭圆曲线数字签名算法(ECDSA)进行认证。这为外包数据提供了安全保护,同时只引入了最小的性能和货币成本开销。
{"title":"Private cloud security: Secured user authentication by using enhanced hybrid algorithm","authors":"Nikhil Gajra, S. Khan, Pradnya B. Rane","doi":"10.1109/EIC.2015.7230712","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230712","url":null,"abstract":"Using cloud computing, users store their data remotely to third party owners and enjoy the on-demand applications, services and storage from a shared pool of configurable computing resources, without the burden of data storage and maintenance and costs. However, we must provide security guarantees not only on authentication but also on files over the cloud for the outsourced data, which is now maintained by third parties such as cloud providers. This research focuses on mechanism, the hybrid of AES and Blowfish for encryption. For key management and key exchange, Key is generated by the ECC key generator and then Key agreement can be done by Diffie-Hellman. Combining the concept of ECC and DH is called Elliptic Curve Diffie-Hellman (ECDH) key exchange. Authentication should be done by Using Elliptic Curve Digital Signature Algorithm (ECDSA). This provides security protection for outsourced data, while introducing only minimal performance and monetary cost overhead.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132063719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
CAPTCHA: A robust approach to resist online password guessing attacks 验证码:一种抵御在线密码猜测攻击的强大方法
Rohini B. Varne, R. Mane
Brute force and Dictionary attacks have become an inevitable security threat to web applications today. Common measures taken to prevent online password guessing attacks like account locking mechanism are ineffective if an attacker has access to a number of compromised machines from a botnet. The main goal is to design a web application that restricts such attacks and at the same time enable convenient login to valid users. CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is an effective challengeresponse test to achieve this goal because of its usability and robustness. These are the tests that cannot be solved by current computer programs or bots, but are easily solvable by humans. This ensures that the account is being accessed by a human and not by an automated program. The proposed system implements a secure CAPTCHA that withstands segmentation attacks and also provides various difficulty levels in CAPTCHA design. Classification of CAPTCHA and its robustness is discussed
暴力破解和字典攻击已经成为当今web应用程序不可避免的安全威胁。如果攻击者可以从僵尸网络访问许多受感染的机器,通常采取的防止在线密码猜测攻击(如帐户锁定机制)的措施是无效的。主要目标是设计一个限制此类攻击的web应用程序,同时使有效用户能够方便地登录。CAPTCHA(完全自动化的公共图灵测试来区分计算机和人类)是一个有效的挑战响应测试,以实现这一目标,因为它的可用性和鲁棒性。这些测试是目前的计算机程序或机器人无法解决的,但人类很容易解决。这确保了该帐户是由人工而不是由自动程序访问的。该系统实现了一种安全的验证码,可以抵御分段攻击,并提供了不同难度的验证码设计。讨论了验证码的分类及其鲁棒性
{"title":"CAPTCHA: A robust approach to resist online password guessing attacks","authors":"Rohini B. Varne, R. Mane","doi":"10.1109/EIC.2015.7230731","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230731","url":null,"abstract":"Brute force and Dictionary attacks have become an inevitable security threat to web applications today. Common measures taken to prevent online password guessing attacks like account locking mechanism are ineffective if an attacker has access to a number of compromised machines from a botnet. The main goal is to design a web application that restricts such attacks and at the same time enable convenient login to valid users. CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is an effective challengeresponse test to achieve this goal because of its usability and robustness. These are the tests that cannot be solved by current computer programs or bots, but are easily solvable by humans. This ensures that the account is being accessed by a human and not by an automated program. The proposed system implements a secure CAPTCHA that withstands segmentation attacks and also provides various difficulty levels in CAPTCHA design. Classification of CAPTCHA and its robustness is discussed","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130024167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new avatar dynamic image based CAPTCHA service on cloud for Mobile devices 一种新的基于移动设备云上头像动态图像的验证码服务
Prasad V. Kalne, V. Kolhe
Use of Mobile devices and internet developed gradually into a ubiquitous network and web has taken an increasingly central role in our communication. Recently the emergence of intelligent, sophisticated attacks like DOS (Denial of Service) makes web services more vulnerable than ever. To handle the DOS attacks, CAPTCHAs are used as one of the standard security technology. CAPTCHAs generate grade tests that most humans can pass but current computer programs can't. Human users and automated scripts can be classified and CAPTCHA is one of the possible ways to classify them. Text based CAPTCHAs are used in many applications but they face a challenge due to language dependency. Dynamic image based CAPTCHAs can strength the robustness of CAPTCHAs. It improves the human success rate. The probability of a BOT hacking the system is considerably low as compared to existing text based CAPTCHA. In this paper, an image-based Avatar CAPTCHA for mobile devices has been proposed as a potential solution. The solution of CAPTCHA is that users must correctly identify visually distorted human faces embedded in a complex background without selecting any non-human Avatar face. With this proposed work, CAPTCHA service is hosted on cloud that will generate CAPTCHA on cloud, so it improves efficiency of CAPTCHA generation also reduces response time for the use to authenticate as human. The need for usability and presentation that is required for a mobile device is considered during implementation. The proposed algorithm generates a CAPTCHA that offers better accuracy and lower machine attack rates compared to existing approaches.
移动设备和互联网的使用逐渐发展成为无处不在的网络,网络在我们的交流中发挥着越来越重要的作用。最近出现了像DOS(拒绝服务)这样的智能、复杂的攻击,使得web服务比以往任何时候都更加脆弱。为了应对DOS攻击,验证码被用作标准的安全技术之一。验证码生成的等级测试大多数人都能通过,但目前的计算机程序无法通过。可以对人类用户和自动脚本进行分类,CAPTCHA是对它们进行分类的可能方法之一。基于文本的captcha在许多应用程序中使用,但由于语言依赖性而面临挑战。基于动态图像的验证码可以增强验证码的鲁棒性。它提高了人类的成功率。与现有的基于文本的CAPTCHA相比,BOT入侵系统的可能性相当低。本文提出了一种基于图像的移动设备头像验证码的潜在解决方案。CAPTCHA的解决方案是,用户必须在不选择任何非人类头像的情况下,正确识别嵌入在复杂背景中的视觉扭曲的人脸。通过本文提出的工作,将验证码服务托管在云中,并在云中生成验证码,从而提高了验证码生成的效率,也减少了用户身份验证的响应时间。在实现过程中考虑移动设备所需的可用性和表示需求。与现有方法相比,该算法生成的验证码具有更高的准确性和更低的机器攻击率。
{"title":"A new avatar dynamic image based CAPTCHA service on cloud for Mobile devices","authors":"Prasad V. Kalne, V. Kolhe","doi":"10.1109/EIC.2015.7230732","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230732","url":null,"abstract":"Use of Mobile devices and internet developed gradually into a ubiquitous network and web has taken an increasingly central role in our communication. Recently the emergence of intelligent, sophisticated attacks like DOS (Denial of Service) makes web services more vulnerable than ever. To handle the DOS attacks, CAPTCHAs are used as one of the standard security technology. CAPTCHAs generate grade tests that most humans can pass but current computer programs can't. Human users and automated scripts can be classified and CAPTCHA is one of the possible ways to classify them. Text based CAPTCHAs are used in many applications but they face a challenge due to language dependency. Dynamic image based CAPTCHAs can strength the robustness of CAPTCHAs. It improves the human success rate. The probability of a BOT hacking the system is considerably low as compared to existing text based CAPTCHA. In this paper, an image-based Avatar CAPTCHA for mobile devices has been proposed as a potential solution. The solution of CAPTCHA is that users must correctly identify visually distorted human faces embedded in a complex background without selecting any non-human Avatar face. With this proposed work, CAPTCHA service is hosted on cloud that will generate CAPTCHA on cloud, so it improves efficiency of CAPTCHA generation also reduces response time for the use to authenticate as human. The need for usability and presentation that is required for a mobile device is considered during implementation. The proposed algorithm generates a CAPTCHA that offers better accuracy and lower machine attack rates compared to existing approaches.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132044573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applications of Rafid operator to analytic and multivalent functions with negative coefficient Rafid算子在负系数解析函数和多价函数中的应用
J. Jain, S. Khairnar
The aim of this paper is to introduce and investigate the class P(p,α,β,μ,λ) which consist of analytic and multivalent functions with negative coefficient in the unit disc, defined by hadamard product with Rafid operator. To obtain Coefficient bounds, extreme points, hadamard product, radius of starlikeness, convexity and close to convexity. Also to determine the distortion theorem using fractional techniques of this class.
本文的目的是引入和研究由hadamard积和Rafid算子定义的单位圆盘上的具有负系数的解析函数和多价函数组成的P(P,α,β,μ,λ)类。求得系数界、极值点、哈达玛积、星形半径、凸性和接近凸性。同时用分数式技巧来确定失真定理。
{"title":"Applications of Rafid operator to analytic and multivalent functions with negative coefficient","authors":"J. Jain, S. Khairnar","doi":"10.1109/EIC.2015.7230713","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230713","url":null,"abstract":"The aim of this paper is to introduce and investigate the class P(p,α,β,μ,λ) which consist of analytic and multivalent functions with negative coefficient in the unit disc, defined by hadamard product with Rafid operator. To obtain Coefficient bounds, extreme points, hadamard product, radius of starlikeness, convexity and close to convexity. Also to determine the distortion theorem using fractional techniques of this class.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128524449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of Fountain Coded OFDM system over Rician fading channel 喷泉编码OFDM系统在专家衰落信道下的性能分析
K. Sharma, Ambika Verma, J. Kaur
Fountain Codes belongs to the class of rateless codes[4] which effectively improves the performance of systems used for wireless data transmission. In this paper, we present a quantitative analysis of Fountain Coded Orthogonal Frequency Division Multiplexing (OFDM) systems over Rician faded channel. Bit Error Rate (BER) performance evaluation and comparison is carried out for Fountain Coded and Convolution Coded OFDM systems. Utilizing this model we investigated the merits of Fountain Codes over OFDM and Convolution Codes, resulting in better system performance. The simulated results of OFDM system in terms of BER shows that Fountain Coded OFDM system has a coding gain of 3.25 dB as compared to Convolution Coded OFDM system.
喷泉码属于无速率码[4],它有效地提高了用于无线数据传输的系统的性能。本文对喷泉编码正交频分复用(Fountain Coded Orthogonal Frequency Division Multiplexing, OFDM)系统进行了定量分析。对喷泉编码和卷积编码OFDM系统的误码率性能进行了评价和比较。利用该模型研究了喷泉码相对于OFDM和卷积码的优点,从而获得更好的系统性能。对OFDM系统的误码率进行了仿真,结果表明:喷泉编码OFDM系统比卷积编码OFDM系统具有3.25 dB的编码增益。
{"title":"Performance analysis of Fountain Coded OFDM system over Rician fading channel","authors":"K. Sharma, Ambika Verma, J. Kaur","doi":"10.1109/EIC.2015.7230702","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230702","url":null,"abstract":"Fountain Codes belongs to the class of rateless codes[4] which effectively improves the performance of systems used for wireless data transmission. In this paper, we present a quantitative analysis of Fountain Coded Orthogonal Frequency Division Multiplexing (OFDM) systems over Rician faded channel. Bit Error Rate (BER) performance evaluation and comparison is carried out for Fountain Coded and Convolution Coded OFDM systems. Utilizing this model we investigated the merits of Fountain Codes over OFDM and Convolution Codes, resulting in better system performance. The simulated results of OFDM system in terms of BER shows that Fountain Coded OFDM system has a coding gain of 3.25 dB as compared to Convolution Coded OFDM system.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security issues related to web services in e-commerce 电子商务中与web服务相关的安全问题
P. Chandratre, U. Kulkarni
E-commerce web sites how to use web mining technology for providing security on e-commerce web sites. The connection between web mining security and ecommerce analyzed based on user behavior on web. Different web mining algorithms and security algorithm are used to provided security on e-commerce web sites. Based on customer behavior different web mining algorithms like page rank algorithm and trust rank algorithm is used for developing web mining framework in e-commerce web sites. This application will develop false hit database algorithm and nearest neighbor algorithm to provide security on e-commerce web site.
电子商务网站如何利用web挖掘技术为电子商务网站提供安全保障。基于用户在网络上的行为,分析了网络挖掘安全与电子商务之间的联系。利用不同的web挖掘算法和安全算法为电子商务网站提供安全保障。基于客户行为,利用页面排名算法和信任排名算法等不同的web挖掘算法开发电子商务网站web挖掘框架。本应用程序将开发假命中数据库算法和最近邻算法,为电子商务网站提供安全保障。
{"title":"Security issues related to web services in e-commerce","authors":"P. Chandratre, U. Kulkarni","doi":"10.1109/EIC.2015.7230735","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230735","url":null,"abstract":"E-commerce web sites how to use web mining technology for providing security on e-commerce web sites. The connection between web mining security and ecommerce analyzed based on user behavior on web. Different web mining algorithms and security algorithm are used to provided security on e-commerce web sites. Based on customer behavior different web mining algorithms like page rank algorithm and trust rank algorithm is used for developing web mining framework in e-commerce web sites. This application will develop false hit database algorithm and nearest neighbor algorithm to provide security on e-commerce web site.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121252474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud workload management and utilization measurement using Host Controller and even distribution criterion 基于主机控制器和均匀分布准则的云工作负载管理和利用率测量
Nikita Haryani, Nishi Tikku, Dhanamma Jagli
The up-and-coming cloud computing model endeavors to deal with the explosive growth of web-connected devices and manage colossal amount of data and patron demands. Thereby, giving rise to the query whether this escalating load can be managed by this cloud model or not. Cloud workload management is one of the primary challenges which must be addressed in the cloud computing paradigm. Instantaneous and concurrent requests from various clients to access the cloud application over the internet can generate bottlenecks moreover delay in response. This Paper presents an efficient dynamic technique along with the system architecture to solve this issue and also utilization function is given to measure the cloud server utilization. It allocates the client requests systematically and uniformly with the help of Host Controller by checking certain parameters such as request rate and server utilization. An even distribution criterion is defined in order to check whether any server is overloaded or underloaded. Thus, the utilization and performance of the system will improve and response will be given quicker.
崭露头角的云计算模型致力于处理网络连接设备的爆炸式增长,并管理大量数据和用户需求。因此,就会产生这样的疑问:这种不断升级的负载是否可以由该云模型管理。云工作负载管理是云计算范式必须解决的主要挑战之一。来自各种客户端通过互联网访问云应用程序的即时和并发请求可能会产生瓶颈,而且会导致响应延迟。本文提出了一种有效的动态技术和系统架构来解决这一问题,并给出了利用函数来衡量云服务器的利用率。它通过检查请求率、服务器利用率等参数,借助主机控制器系统、统一地分配客户端请求。为了检查服务器是否过载或负载不足,定义了均匀分布标准。从而提高系统的利用率和性能,并更快地给出响应。
{"title":"Cloud workload management and utilization measurement using Host Controller and even distribution criterion","authors":"Nikita Haryani, Nishi Tikku, Dhanamma Jagli","doi":"10.1109/EIC.2015.7230737","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230737","url":null,"abstract":"The up-and-coming cloud computing model endeavors to deal with the explosive growth of web-connected devices and manage colossal amount of data and patron demands. Thereby, giving rise to the query whether this escalating load can be managed by this cloud model or not. Cloud workload management is one of the primary challenges which must be addressed in the cloud computing paradigm. Instantaneous and concurrent requests from various clients to access the cloud application over the internet can generate bottlenecks moreover delay in response. This Paper presents an efficient dynamic technique along with the system architecture to solve this issue and also utilization function is given to measure the cloud server utilization. It allocates the client requests systematically and uniformly with the help of Host Controller by checking certain parameters such as request rate and server utilization. An even distribution criterion is defined in order to check whether any server is overloaded or underloaded. Thus, the utilization and performance of the system will improve and response will be given quicker.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122807604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Green Technology for avoiding E-waste with the help of GIS 利用地理信息系统避免电子废物的绿色科技
Nikhita Mangaonkar, Pooja Sabhani, S. Sirsat
Electronic waste or e-waste is one of the fast growing problems of the world. E-waste consists of variety of components, containing toxic substances which lead to environment and health hazards if not handled properly. It is important to find out what is the main source of this e-waste with the help of GIS and how we can minimize the e-wastage through green technology. This paper provides a concise overview of Mumbai's current e-waste scenario, namely to locate the source of e-wastage, environmental and health hazards, green technology methods to reduce the e-wastage.
电子垃圾或电子垃圾是世界上快速增长的问题之一。电子废物由多种成分组成,含有有毒物质,如果处理不当,会对环境和健康造成危害。利用地理资讯系统找出电子废物的主要来源,以及如何透过环保科技减少电子废物,是十分重要的。本文简要概述了孟买目前的电子废物情况,即定位电子废物的来源,环境和健康危害,绿色技术方法,以减少电子废物。
{"title":"Green Technology for avoiding E-waste with the help of GIS","authors":"Nikhita Mangaonkar, Pooja Sabhani, S. Sirsat","doi":"10.1109/EIC.2015.7230750","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230750","url":null,"abstract":"Electronic waste or e-waste is one of the fast growing problems of the world. E-waste consists of variety of components, containing toxic substances which lead to environment and health hazards if not handled properly. It is important to find out what is the main source of this e-waste with the help of GIS and how we can minimize the e-wastage through green technology. This paper provides a concise overview of Mumbai's current e-waste scenario, namely to locate the source of e-wastage, environmental and health hazards, green technology methods to reduce the e-wastage.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122861378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1