首页 > 最新文献

2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)最新文献

英文 中文
Web usage mining tool by integrating sequential pattern mining with graph theory 将顺序模式挖掘与图论相结合的Web使用挖掘工具
V. Musale, D. Chaudhari
In this era, the web usage mining plays one of the important role in analyzing and improving performance of web applications. Initially in this paper, the concept of web usage mining has been introduced along with Improved AprioriAll algorithm which is the base algorithm for the proposed tool along with its limitation. The improved approach is discussed which integrates sequential pattern mining with graph theory. In the next part, design of web usage mining tool with improved approach is discussed. Implementation details of the tool are discussed along with the results. The last part covers how the raw result from the proposed tool can be further visualized and analyzed using new technologies like D3.js and Neo4j. The future scope of the proposed tool is mentioned at the end of the paper.
在这个时代,web使用挖掘是分析和提高web应用性能的重要手段之一。本文首先介绍了web使用挖掘的概念,以及改进的AprioriAll算法,该算法是所提出工具的基础算法,以及它的局限性。讨论了将序列模式挖掘与图论相结合的改进方法。接下来,讨论了基于改进方法的web使用挖掘工具的设计。讨论了该工具的实现细节以及结果。最后一部分介绍了如何使用D3.js和Neo4j等新技术进一步可视化和分析该工具的原始结果。在论文的最后提到了所提出的工具的未来范围。
{"title":"Web usage mining tool by integrating sequential pattern mining with graph theory","authors":"V. Musale, D. Chaudhari","doi":"10.1109/ICISIM.2017.8122167","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122167","url":null,"abstract":"In this era, the web usage mining plays one of the important role in analyzing and improving performance of web applications. Initially in this paper, the concept of web usage mining has been introduced along with Improved AprioriAll algorithm which is the base algorithm for the proposed tool along with its limitation. The improved approach is discussed which integrates sequential pattern mining with graph theory. In the next part, design of web usage mining tool with improved approach is discussed. Implementation details of the tool are discussed along with the results. The last part covers how the raw result from the proposed tool can be further visualized and analyzed using new technologies like D3.js and Neo4j. The future scope of the proposed tool is mentioned at the end of the paper.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127867677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
NGIPS: The road map of next generation intrusion prevention system for wireless LAN NGIPS:下一代无线局域网入侵防御系统路线图
M. Pund, S. Athawale
The rapid growth of WLAN over past few years has increased immensely in academia as well as in every industry, but many weaknesses are there in ad hoc network, due to this many attackers are really passionate towards authorization. For the authentication defense mechanism and wireless monitoring has become a vital component of computer security to predict and prevent attacks. In this paper, we explain the practical intrusion prevention system which measures threat and take decision. Inline IPS and Passive IDS Model, we presented road map of next generation intrusion prevention system which satisfies need for future computing. At the end, we presented experimental results on the basis of real data setup which confirms the investigation on the basis of IP, MAC, SK.
在过去的几年里,无线局域网的快速发展在学术界和每个行业都得到了极大的发展,但是在自组织网络中存在许多弱点,因此许多攻击者对授权非常感兴趣。由于认证防御机制和无线监控已经成为计算机安全预测和防范攻击的重要组成部分。本文介绍了一种实用的入侵防御系统,该系统具有检测威胁和决策的功能。在内联入侵防御和被动入侵防御模型的基础上,提出了满足未来计算需求的下一代入侵防御系统的路线图。最后给出了基于实际数据设置的实验结果,验证了基于IP、MAC、SK的研究结果。
{"title":"NGIPS: The road map of next generation intrusion prevention system for wireless LAN","authors":"M. Pund, S. Athawale","doi":"10.1109/ICISIM.2017.8122185","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122185","url":null,"abstract":"The rapid growth of WLAN over past few years has increased immensely in academia as well as in every industry, but many weaknesses are there in ad hoc network, due to this many attackers are really passionate towards authorization. For the authentication defense mechanism and wireless monitoring has become a vital component of computer security to predict and prevent attacks. In this paper, we explain the practical intrusion prevention system which measures threat and take decision. Inline IPS and Passive IDS Model, we presented road map of next generation intrusion prevention system which satisfies need for future computing. At the end, we presented experimental results on the basis of real data setup which confirms the investigation on the basis of IP, MAC, SK.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123467376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information fusion for images on FPGA: Pixel level with pseudo color FPGA图像信息融合:像素级伪彩色
Gandhi Priya Prashant, S. M. Jagdale
Image is a visual representation of object, or a scene which can be seen by human eyes. Image can be created and stored in electronic form. Image is a two dimensional function f(x, y) where, x and y are spatial co-ordinates and amplitude of images is defined in intensity level of each pixel. Image fusion means merging relevant information from different images to create one new image which is more informative. Field programmable Gate Array (FPGA) is most widespread technology with special features like low power consumption, real time application. FPGA is used to implement Image Fusion (IF).
图像是人的眼睛所能看到的物体或场景的视觉表现。图像可以创建并以电子形式存储。图像是一个二维函数f(x, y),其中,x和y是空间坐标,图像的振幅以每个像素的强度级别定义。图像融合是指将不同图像中的相关信息合并在一起,形成一个信息量更大的新图像。现场可编程门阵列(FPGA)是目前应用最为广泛的一种技术,具有低功耗、实时性等特点。采用FPGA实现图像融合(IF)。
{"title":"Information fusion for images on FPGA: Pixel level with pseudo color","authors":"Gandhi Priya Prashant, S. M. Jagdale","doi":"10.1109/ICISIM.2017.8122171","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122171","url":null,"abstract":"Image is a visual representation of object, or a scene which can be seen by human eyes. Image can be created and stored in electronic form. Image is a two dimensional function f(x, y) where, x and y are spatial co-ordinates and amplitude of images is defined in intensity level of each pixel. Image fusion means merging relevant information from different images to create one new image which is more informative. Field programmable Gate Array (FPGA) is most widespread technology with special features like low power consumption, real time application. FPGA is used to implement Image Fusion (IF).","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114233133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review of random forest classification techniques to resolve data imbalance 解决数据不平衡的随机森林分类技术综述
A. More, Dipti P Rana
In this current age, numerous ranges of real word applications with imbalanced dataset is one of the foremost focal point of researcher's inattention. There is the enormous increment of data generation and imbalance within dataset. Processing and knowledge extraction of huge amount of imbalanced data becomes a challenge related with space and time necessities. Generally there is a list of an assortment of factual humanity applications which deals with unequal data sample division in to number of classes. Due to this division of data either of class goes into majority or minority with comparably less data count. This outnumbering of data sample in either of one class directs towards the handling of minority class and target on remarkable reduction in error rate. The standard learning methods do not directly focus on this type of classes. Random Forest Classification (RFC) is an ensemble approach that utilizes a number of classifiers to work together in order to identify the class label for unlabeled instances. This approach has proved its high accuracy and superiority with imbalanced datasets. This classifier provides various techniques to resolve class imbalance problem. This paper summarizes, the literature survey from 2000 to 2016 of various techniques related to RFC to resolve class imbalance. Specifically Weighted Random Forest (WRF), Balanced Random Forest (BRF), Sampling (Under Sampling (US)) and Down Sampling (DS), Cost Sensitive Methods have been adapted more to till date. The limitation of this numerous literature is researchers can focus on dynamic integration techniques to resolve class imbalance and increase robustness and versatility of classification.
在当前这个时代,大量不平衡数据集的真实世界应用是研究人员关注的焦点之一。数据量的巨大增长和数据集内部的不平衡。大量不平衡数据的处理和知识提取成为一项具有空间和时间要求的挑战。一般来说,有一个列表的分类的事实人文应用程序处理不等的数据样本划分到类的数量。由于数据的这种划分,每一类都分为多数或少数,数据数量相对较少。这种在一个类中的数据样本数量的超过,直接指向了对少数类的处理,并以显著降低错误率为目标。标准的学习方法并不直接关注这类课程。随机森林分类(RFC)是一种集成方法,它利用许多分类器一起工作,以识别未标记实例的类标签。该方法在不平衡数据集上具有较高的准确性和优越性。这个分类器提供了各种技术来解决类不平衡问题。本文总结了2000 - 2016年与RFC相关的各种解决类不平衡技术的文献综述。特别是加权随机森林(WRF)、平衡随机森林(BRF)、欠采样(US)和下采样(DS),成本敏感方法已经得到了更多的应用。这些大量文献的局限性在于,研究人员可以将重点放在动态集成技术上,以解决类别不平衡问题,提高分类的鲁棒性和通用性。
{"title":"Review of random forest classification techniques to resolve data imbalance","authors":"A. More, Dipti P Rana","doi":"10.1109/ICISIM.2017.8122151","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122151","url":null,"abstract":"In this current age, numerous ranges of real word applications with imbalanced dataset is one of the foremost focal point of researcher's inattention. There is the enormous increment of data generation and imbalance within dataset. Processing and knowledge extraction of huge amount of imbalanced data becomes a challenge related with space and time necessities. Generally there is a list of an assortment of factual humanity applications which deals with unequal data sample division in to number of classes. Due to this division of data either of class goes into majority or minority with comparably less data count. This outnumbering of data sample in either of one class directs towards the handling of minority class and target on remarkable reduction in error rate. The standard learning methods do not directly focus on this type of classes. Random Forest Classification (RFC) is an ensemble approach that utilizes a number of classifiers to work together in order to identify the class label for unlabeled instances. This approach has proved its high accuracy and superiority with imbalanced datasets. This classifier provides various techniques to resolve class imbalance problem. This paper summarizes, the literature survey from 2000 to 2016 of various techniques related to RFC to resolve class imbalance. Specifically Weighted Random Forest (WRF), Balanced Random Forest (BRF), Sampling (Under Sampling (US)) and Down Sampling (DS), Cost Sensitive Methods have been adapted more to till date. The limitation of this numerous literature is researchers can focus on dynamic integration techniques to resolve class imbalance and increase robustness and versatility of classification.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122473548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Named entity recognition and tweet sentiment derived from tweet segmentation using hadoop 基于hadoop的微博分段的命名实体识别和微博情感
S. Powar, S. Shinde
Twitter is well known website famous for micro blogging where millions of users exchanging their opinions and thoughts. The tweets users are sharing has a error sum nature. The information available in tweets is insufficient. Because of character limitation tweets are short in nature many applications like Information Retrieval has problems in information retrieval. Here we are proposing a batch processing framework for tweet fragmentation called TweetSeg. TweetSeg combines information from Confined context with information from Universal context for achieving better results for Named Entity identification. Tweeter is used largely so we want to find public sentiment of tweet by segmenting the tweet into fragments where each fragment can be a named entity, we can find meaningful information from the part and analyzing the sentiments expressed in the tweets by using these fragments in Hadoop framework.
推特是一个著名的网站,以微博而闻名,数百万用户在这里交换意见和想法。用户分享的推文具有错误和性质。推文提供的信息是不够的。由于字符的限制,推文本质上是短的,许多应用如信息检索在信息检索方面存在问题。在这里,我们提出了一个名为TweetSeg的tweet碎片批处理框架。TweetSeg将来自受限上下文的信息与来自通用上下文的信息结合起来,以获得更好的命名实体识别结果。Tweeter被大量使用,所以我们想通过将tweet分割成片段来找到tweet的公众情绪,每个片段可以是一个命名的实体,我们可以从部分中找到有意义的信息,并通过在Hadoop框架中使用这些片段来分析tweet中表达的情绪。
{"title":"Named entity recognition and tweet sentiment derived from tweet segmentation using hadoop","authors":"S. Powar, S. Shinde","doi":"10.1109/ICISIM.2017.8122173","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122173","url":null,"abstract":"Twitter is well known website famous for micro blogging where millions of users exchanging their opinions and thoughts. The tweets users are sharing has a error sum nature. The information available in tweets is insufficient. Because of character limitation tweets are short in nature many applications like Information Retrieval has problems in information retrieval. Here we are proposing a batch processing framework for tweet fragmentation called TweetSeg. TweetSeg combines information from Confined context with information from Universal context for achieving better results for Named Entity identification. Tweeter is used largely so we want to find public sentiment of tweet by segmenting the tweet into fragments where each fragment can be a named entity, we can find meaningful information from the part and analyzing the sentiments expressed in the tweets by using these fragments in Hadoop framework.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115153880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Scrambled database with encrypted query processing: CryptDB a computational analysis 加扰数据库与加密查询处理:CryptDB计算分析
J. S. Rauthan, K S Vaisla
These days each data moves toward becoming hard-ware and put away as Databases, which thusly may encase most levered private, monetary, and administration truths. As the information have important resources for the clients, it additionally most extreme foreseen to the mean adversaries and in this way, to secure in inconsistency of every single potential adversary activities is basic. These days the most recent provoke development in the convenience and engaging quality of cloud offices, various private and business and administration measurements are currently put away to the Cloud. Because of the capacity this various information which incorporate private and touchy information over cloud, the protection and security of those sort of information turn into a basic issue. For saving and giving classification of client's delicate information over cloud administrations and getting to productively and in secure way, a few techniques have been offered to understand these situations. For giving the defensive information classification while defensive secrecy and achievement of a run of the mill usual of SQL inquiries in a well-organized technique another approach CryptDB was proposed. CryptDB gives off an impression of being hands-on contrasted with different endeavors at taking care of the issue of putting away the information in distributed storage in encoded frame, that is the reason even the database director can't see the information and again the preparing of information is as scrambled, so center assailant additionally can't distinguish the information amid handling. So, this paper, exhibits a cryptographically examination of the CryptDB demonstrate. For that we first, describe the model CryptDB in supplementary fine focuses for solace of comprehension lastly, we highlighted the confinements of CryptDB concerning security and viability perspectives.
如今,每个数据都趋向于成为硬件,并作为数据库保存起来,这样就可以包含最重要的私人、货币和管理信息。由于这些信息对客户具有重要的资源,因此它还可以最极端地预测到平均对手,因此,确保每个潜在对手活动的不一致性是基本的。近来,云办公的便利性和引人入胜的质量得到了最新的发展,各种私人、商业和管理措施目前都被放到了云上。由于云上包含私人和敏感信息的各种信息的容量,这些信息的保护和安全变成了一个基本问题。为了在云管理中保存和分类客户的敏感信息,并以高效和安全的方式进行分类,已经提供了一些技术来理解这些情况。为了在提供防御性信息分类的同时进行防御性保密,并在组织良好的技术中实现常规的SQL查询,提出了另一种方法CryptDB。CryptDB在处理以编码帧形式存放分布式存储中的信息的问题上给人一种实干的印象,这就是为什么即使是数据库管理员也看不到信息,而且信息的准备也被打乱了,因此中心攻击者也无法在处理过程中区分信息。因此,本文展示了对CryptDB演示的密码学检查。为此,我们首先在补充重点中描述了CryptDB模型,以帮助理解。最后,我们强调了CryptDB在安全性和可行性方面的局限性。
{"title":"Scrambled database with encrypted query processing: CryptDB a computational analysis","authors":"J. S. Rauthan, K S Vaisla","doi":"10.1109/ICISIM.2017.8122174","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122174","url":null,"abstract":"These days each data moves toward becoming hard-ware and put away as Databases, which thusly may encase most levered private, monetary, and administration truths. As the information have important resources for the clients, it additionally most extreme foreseen to the mean adversaries and in this way, to secure in inconsistency of every single potential adversary activities is basic. These days the most recent provoke development in the convenience and engaging quality of cloud offices, various private and business and administration measurements are currently put away to the Cloud. Because of the capacity this various information which incorporate private and touchy information over cloud, the protection and security of those sort of information turn into a basic issue. For saving and giving classification of client's delicate information over cloud administrations and getting to productively and in secure way, a few techniques have been offered to understand these situations. For giving the defensive information classification while defensive secrecy and achievement of a run of the mill usual of SQL inquiries in a well-organized technique another approach CryptDB was proposed. CryptDB gives off an impression of being hands-on contrasted with different endeavors at taking care of the issue of putting away the information in distributed storage in encoded frame, that is the reason even the database director can't see the information and again the preparing of information is as scrambled, so center assailant additionally can't distinguish the information amid handling. So, this paper, exhibits a cryptographically examination of the CryptDB demonstrate. For that we first, describe the model CryptDB in supplementary fine focuses for solace of comprehension lastly, we highlighted the confinements of CryptDB concerning security and viability perspectives.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129795737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi objective DG and RPC planning of radial type distribution network considering economic ViewPoints 考虑经济角度的辐射型配电网多目标DG和RPC规划
Jaydeepsinh Sarvaiya, M. Chudasama
DG penetration is continuously increased across distribution network not only to reduce carbon emission, but also to enhanced performance of the distribution network. In a restructured environment any distribution utility need to address DG placement and sizing problem to find a cost effective solution for the specific investment. Most of the authors have attempted to solve the problem based on real power loss reduction across the network. Some authors consider voltage stability based analysis for increased loadability of network with real power loss. However, optimal reactive power compensation also need to be incorporated for a cost effective solution. In this paper an attempt has been made to address various types of DG and RPC units citing and sizing problem with multi-objectives consists real power loss reduction, voltage stability improvement. A new approaches includes development of cost function to find cost-effective solution for distribution network. Evolutionary based Genetic Algorithm used to optimize objective function. Proposed algorithm is tested on IEEE-33 bus radial distribution system.
在配电网中不断提高DG渗透率,不仅可以减少碳排放,还可以提高配电网的性能。在重组的环境中,任何配电公用事业公司都需要解决DG的放置和规模问题,以找到适合特定投资的经济有效的解决方案。大多数作者都试图通过降低整个网络的实际功率损耗来解决这个问题。一些作者考虑基于电压稳定的分析来提高实际电网的负载性。然而,最优无功补偿也需要纳入成本效益的解决方案。本文试图以降低实际功率损耗、提高电压稳定性为多目标来解决各种类型的DG和RPC机组的引用和选型问题。一种新的方法是开发成本函数来寻找配网的成本效益解决方案。基于进化的遗传算法用于优化目标函数。该算法在IEEE-33总线径向配电系统上进行了测试。
{"title":"Multi objective DG and RPC planning of radial type distribution network considering economic ViewPoints","authors":"Jaydeepsinh Sarvaiya, M. Chudasama","doi":"10.1109/ICISIM.2017.8122184","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122184","url":null,"abstract":"DG penetration is continuously increased across distribution network not only to reduce carbon emission, but also to enhanced performance of the distribution network. In a restructured environment any distribution utility need to address DG placement and sizing problem to find a cost effective solution for the specific investment. Most of the authors have attempted to solve the problem based on real power loss reduction across the network. Some authors consider voltage stability based analysis for increased loadability of network with real power loss. However, optimal reactive power compensation also need to be incorporated for a cost effective solution. In this paper an attempt has been made to address various types of DG and RPC units citing and sizing problem with multi-objectives consists real power loss reduction, voltage stability improvement. A new approaches includes development of cost function to find cost-effective solution for distribution network. Evolutionary based Genetic Algorithm used to optimize objective function. Proposed algorithm is tested on IEEE-33 bus radial distribution system.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121963947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart home safety device using frequency hopping approach based on GSM generation 智能家居安全装置采用基于GSM的跳频方法生成
Neha R. Ghate, K. Kale
The Smart domestic protection monitoring gadget has been designed developed, examined and validated. It makes use of the RF (radio frequency) generation to monitor the reputation and security of the electrical device. The gadget has been used to store energy. The clever home is a complex era, on the equal time it is growing, the era that used in this research are Global System for virtual cellular verbal exchange (GSM), Frequency Hopping Method and PIC18F452 Microcontroller. The One Time Password (OTP) concept of clever houses offers reliable, efficient and safe surroundings for occupants. An OTP is applied as the communication tool among the hardware and the software. A GUI is developed and configured which permits the characteristic of generated OTP provider. The auto generated OTP is delivered to the house owners and if he tries to break security then OTP session time out will expire. We can outline Frequency Hopping as a communication scheme among a transmitter and a receiver. Frequency Hopping is the mechanism where in the machine adjustments the frequency (uplink and downlink) at some stage in transmission at normal periods. It allows the RF channel used for signaling channel (SDCCH) time slot or traffic channel (TCH) time slots, to trade frequency each TDMA frame (four.615 ms). The frequency is modified on an in line with burst basis, because of this that all the bits in a burst are transmitted on the equal frequency.
对智能家居保护监控装置进行了设计、开发、检测和验证。它利用射频(RF)的产生来监控电气设备的信誉和安全性。这个小装置被用来储存能量。智能家居是一个复杂的时代,在它不断发展的同时,本研究中所使用的时代是全球虚拟蜂窝语音交换系统(GSM)、跳频法和PIC18F452单片机。智能住宅的一次性密码(OTP)概念为居住者提供了可靠、高效和安全的环境。采用OTP作为硬件和软件之间的通信工具。开发并配置了一个GUI,该GUI允许生成OTP提供者的特性。自动生成的OTP被传递给房屋所有者,如果他试图破坏安全性,那么OTP会话超时将过期。我们可以将跳频概述为发射器和接收器之间的通信方案。跳频是机器在正常传输的某个阶段调整频率(上行链路和下行链路)的机制。它允许射频信道用于信令信道(SDCCH)时隙或业务信道(TCH)时隙,每个TDMA帧(4个)交换频率。615 ms)。频率的修改是在与突发一致的基础上进行的,因此突发中的所有比特都以相同的频率传输。
{"title":"Smart home safety device using frequency hopping approach based on GSM generation","authors":"Neha R. Ghate, K. Kale","doi":"10.1109/ICISIM.2017.8122196","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122196","url":null,"abstract":"The Smart domestic protection monitoring gadget has been designed developed, examined and validated. It makes use of the RF (radio frequency) generation to monitor the reputation and security of the electrical device. The gadget has been used to store energy. The clever home is a complex era, on the equal time it is growing, the era that used in this research are Global System for virtual cellular verbal exchange (GSM), Frequency Hopping Method and PIC18F452 Microcontroller. The One Time Password (OTP) concept of clever houses offers reliable, efficient and safe surroundings for occupants. An OTP is applied as the communication tool among the hardware and the software. A GUI is developed and configured which permits the characteristic of generated OTP provider. The auto generated OTP is delivered to the house owners and if he tries to break security then OTP session time out will expire. We can outline Frequency Hopping as a communication scheme among a transmitter and a receiver. Frequency Hopping is the mechanism where in the machine adjustments the frequency (uplink and downlink) at some stage in transmission at normal periods. It allows the RF channel used for signaling channel (SDCCH) time slot or traffic channel (TCH) time slots, to trade frequency each TDMA frame (four.615 ms). The frequency is modified on an in line with burst basis, because of this that all the bits in a burst are transmitted on the equal frequency.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125999775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intrusion detection systems (IDS) & future challenges in cloud based environment 入侵检测系统(IDS) &基于云环境的未来挑战
M. Bharati, S. Tamane
Cloud computing is an attention grabbing service model as a result of it reduces investment as its prices are in guide corresponding to use and request. Due to economic and technical edges it offers, Cloud computing has recently obtained major acceptance. However, as a result of the conveyed nature of distributed computing situations, its significant asset total, wide client get to, conservative and customized sharing of assets change gatecrashers to utilize cloud for his or her benefit. Crucial applications are getting additional associated with the web for cost-effectiveness and quantifiable causes; however this leaves them receptive attack. Most systems these days don't seem to be designed in contact up subtle attacks; an attacker who is ready to compromise one machine usually gains the facility to require down the complete system. To fight intruders, variety of security solution for cloud situations executes Intrusion Detection Systems (IDS). Be that as it may, most IDS arrangements are wrong for cloud conditions, because of numerous issues. During this paper, Intrusion Detection Systems (IDS) and also the varied associated difficulties of threats is given which supplies direction for future researchers in terms of IDS for Cloud computing setting.
云计算是一种引人注目的服务模式,因为它的价格与使用和需求相对应,从而减少了投资。由于其提供的经济和技术优势,云计算最近获得了广泛的认可。然而,由于分布式计算情况的传递性质,其巨大的资产总量、广泛的客户端访问、保守和自定义的资产共享改变了“入侵者”利用云来获取自己的利益。由于成本效益和可量化的原因,关键应用程序正越来越多地与网络联系在一起;然而,这会让它们接受攻击。如今,大多数系统似乎都没有设计成能够抵御微妙的攻击;准备攻击一台机器的攻击者通常会获得瘫痪整个系统的能力。为了对抗入侵者,各种云环境的安全解决方案都执行入侵检测系统(IDS)。尽管如此,由于许多问题,大多数IDS安排在云条件下是错误的。本文介绍了入侵检测系统(IDS)及其相关的各种威胁难点,为未来云计算环境下入侵检测的研究提供了方向。
{"title":"Intrusion detection systems (IDS) & future challenges in cloud based environment","authors":"M. Bharati, S. Tamane","doi":"10.1109/ICISIM.2017.8122180","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122180","url":null,"abstract":"Cloud computing is an attention grabbing service model as a result of it reduces investment as its prices are in guide corresponding to use and request. Due to economic and technical edges it offers, Cloud computing has recently obtained major acceptance. However, as a result of the conveyed nature of distributed computing situations, its significant asset total, wide client get to, conservative and customized sharing of assets change gatecrashers to utilize cloud for his or her benefit. Crucial applications are getting additional associated with the web for cost-effectiveness and quantifiable causes; however this leaves them receptive attack. Most systems these days don't seem to be designed in contact up subtle attacks; an attacker who is ready to compromise one machine usually gains the facility to require down the complete system. To fight intruders, variety of security solution for cloud situations executes Intrusion Detection Systems (IDS). Be that as it may, most IDS arrangements are wrong for cloud conditions, because of numerous issues. During this paper, Intrusion Detection Systems (IDS) and also the varied associated difficulties of threats is given which supplies direction for future researchers in terms of IDS for Cloud computing setting.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"1996 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117026341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Extraction of whole and torn meniscus in M.R.I. images and detection of meniscal tears 完整半月板和撕裂半月板的mri提取及半月板撕裂的检测
R. P. Dudhmande, A. Rajurkar, V. G. Kottawar
Osteoarthritis has become a very rapidly spreading disorder of bones and joints among old people and young athletes indulging in sports such as soccer, hockey, etc. Injuries of the knee like tears in the meniscus can be seen very commonly in young athletes as well as the aged people. The Computer-Aided Diagnosis (CAD) systems help to a large extent and can play a major role in their detection. In this paper, we deal with the automatic region-of-interest location, extraction of the meniscus from the M.R.I. images of the knee joint and then assigning scores to the tears, if any, which can be used for quantification of the severity of tear. The proposed system was evaluated on a database of 34 individuals; and sensitivity and specificity were found to be 88% and 96% respectively. The results are encouraging and this system may prove to be a stepping stone in development of more sophisticated algorithms for detailed classification of the tears.
骨关节炎已成为一种非常迅速蔓延的骨骼和关节疾病,在老年人和年轻运动员沉迷于体育运动,如足球,曲棍球等。像半月板撕裂这样的膝盖损伤在年轻运动员和老年人中都很常见。计算机辅助诊断(CAD)系统在很大程度上起着重要的作用。在本文中,我们处理自动兴趣区域定位,从膝关节的mri图像中提取半月板,然后对撕裂进行评分,如果有的话,可以用于撕裂严重程度的量化。在34个人的数据库上对拟议的系统进行了评估;灵敏度为88%,特异度为96%。结果令人鼓舞,该系统可能被证明是开发更复杂的泪液详细分类算法的垫脚石。
{"title":"Extraction of whole and torn meniscus in M.R.I. images and detection of meniscal tears","authors":"R. P. Dudhmande, A. Rajurkar, V. G. Kottawar","doi":"10.1109/ICISIM.2017.8122139","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122139","url":null,"abstract":"Osteoarthritis has become a very rapidly spreading disorder of bones and joints among old people and young athletes indulging in sports such as soccer, hockey, etc. Injuries of the knee like tears in the meniscus can be seen very commonly in young athletes as well as the aged people. The Computer-Aided Diagnosis (CAD) systems help to a large extent and can play a major role in their detection. In this paper, we deal with the automatic region-of-interest location, extraction of the meniscus from the M.R.I. images of the knee joint and then assigning scores to the tears, if any, which can be used for quantification of the severity of tear. The proposed system was evaluated on a database of 34 individuals; and sensitivity and specificity were found to be 88% and 96% respectively. The results are encouraging and this system may prove to be a stepping stone in development of more sophisticated algorithms for detailed classification of the tears.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"17 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1