首页 > 最新文献

2018 International Conference on Computer Communication and Informatics (ICCCI)最新文献

英文 中文
Intrusion Detection and Prevention Based on State Context and Hierarchical Trust in Wireless Sensor Networks 基于状态上下文和分层信任的无线传感器网络入侵检测与防御
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441415
R. Maidhili, G. Karthik
This Wireless sensor networks (WSN) comprises of sensor nodes, deployed in a way to gather the information of environmental conditions from the surroundings. The dispersed quality, forwarding nature and their open source communication medium makes the wireless sensor networks deeply vulnerable which paves a way to various security attacks. Intrusion Detection System (IDS) can be an exemplary interpretation to encounter security attacks at various levels if the network. In WSNs a vulnerability is possible in selecting cluster head among the sensor nodes. Once the compromised sensor node is selected as cluster head which will lead to false communication with Base Station. IDS can neither prevent it nor respond to it, but only can detect it. IDS informs the controller to take necessary action by raising alarms if any attack is detected which is good but also leads to resource wastage and time consumption in the detection process. Prevention should be done at the launching state of the attack in order to scale down the resource wastage and time consumption. Initially the attacker launches the attack to get into the selection of cluster heads (CH) by broadcasting the control messages with fake information such as high energy and neighbor count. The false control messages are effectively detected and the attack is prevented which leads to a massive reduction of overall resource overhead while improving network performance. The experimental simulation work outputs, to detect the attacks at the base level and improves the network performance, to prevent the attack in order to reduce the resource overhead and to perform attack resident routing and data aggregation in WSN
这种无线传感器网络(WSN)由传感器节点组成,其部署方式是从周围环境中收集环境状况信息。无线传感器网络的分散性、转发性和开源通信介质使其极易受到攻击,从而为各种安全攻击铺平了道路。入侵检测系统(IDS)可以作为一个典型的解释,说明如果网络遇到了各级安全攻击。在传感器网络中,在传感器节点中簇头的选择可能存在漏洞。一旦受损的传感器节点被选为簇头,就会导致与基站的误通信。IDS既不能阻止它,也不能响应它,只能检测它。如果检测到任何攻击,IDS通过发出警报通知控制器采取必要的行动,这是好的,但也会导致检测过程中的资源浪费和时间消耗。为了减少资源的浪费和时间的消耗,应该在攻击的启动状态进行预防。首先,攻击者通过广播带有虚假信息(如高能量和邻居数)的控制消息来进入簇头选择(CH)。有效检测虚假控制消息,防止攻击,在提高网络性能的同时,大幅降低了整体资源开销。实验仿真结果表明,在基础层面检测攻击,提高网络性能,防止攻击,减少资源开销,在WSN中进行攻击驻留路由和数据聚合
{"title":"Intrusion Detection and Prevention Based on State Context and Hierarchical Trust in Wireless Sensor Networks","authors":"R. Maidhili, G. Karthik","doi":"10.1109/ICCCI.2018.8441415","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441415","url":null,"abstract":"This Wireless sensor networks (WSN) comprises of sensor nodes, deployed in a way to gather the information of environmental conditions from the surroundings. The dispersed quality, forwarding nature and their open source communication medium makes the wireless sensor networks deeply vulnerable which paves a way to various security attacks. Intrusion Detection System (IDS) can be an exemplary interpretation to encounter security attacks at various levels if the network. In WSNs a vulnerability is possible in selecting cluster head among the sensor nodes. Once the compromised sensor node is selected as cluster head which will lead to false communication with Base Station. IDS can neither prevent it nor respond to it, but only can detect it. IDS informs the controller to take necessary action by raising alarms if any attack is detected which is good but also leads to resource wastage and time consumption in the detection process. Prevention should be done at the launching state of the attack in order to scale down the resource wastage and time consumption. Initially the attacker launches the attack to get into the selection of cluster heads (CH) by broadcasting the control messages with fake information such as high energy and neighbor count. The false control messages are effectively detected and the attack is prevented which leads to a massive reduction of overall resource overhead while improving network performance. The experimental simulation work outputs, to detect the attacks at the base level and improves the network performance, to prevent the attack in order to reduce the resource overhead and to perform attack resident routing and data aggregation in WSN","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116971253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of Novel Load Balancing Technique in Cloud Computing Environmen 新型负载均衡技术在云计算环境中的实现
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441212
N. Joshi, K. Kotecha, D. Choksi, Sharnil Pandya
Spectacular benefits of virtualization and cloud computing technologies have stimulated the Information and Communication Technology sector towards adopting cloud computing. Various ICT-enabled service providers also have either adopted cloud computing or started migrating services to cloud infrastructure. However, the increasing demand for cloud based infrastructure has resulted into severe problem of resource management and load balancing for cloud service providers and consumers. Researchers have suggested various load balancing techniques for efficient resource utilization in cloud. A novel load balancing technique representing relocation of workload from overloaded VM to lightly loaded VM in cloud computing environment is presented in this paper. An attempt is made to help the cloud stake holders to overcome the imbalanced resource utilization problem is presented in this paper. The approach presented here is also useful during disaster management for safeguarding end-user applications and thereby assisting upholding cloud services.
虚拟化和云计算技术的巨大优势刺激了信息和通信技术部门采用云计算。各种支持信息通信技术的服务提供商也要么采用了云计算,要么开始将服务迁移到云基础设施。然而,对基于云的基础设施日益增长的需求导致了云服务提供商和消费者在资源管理和负载平衡方面的严重问题。研究人员提出了各种负载平衡技术,以实现云计算中有效的资源利用。提出了一种在云计算环境下,将负载从负载过重的虚拟机转移到负载较轻的虚拟机的负载均衡技术。本文试图帮助云利益相关者克服资源利用不平衡的问题。本文介绍的方法在灾难管理期间也很有用,可用于保护最终用户应用程序,从而帮助维护云服务。
{"title":"Implementation of Novel Load Balancing Technique in Cloud Computing Environmen","authors":"N. Joshi, K. Kotecha, D. Choksi, Sharnil Pandya","doi":"10.1109/ICCCI.2018.8441212","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441212","url":null,"abstract":"Spectacular benefits of virtualization and cloud computing technologies have stimulated the Information and Communication Technology sector towards adopting cloud computing. Various ICT-enabled service providers also have either adopted cloud computing or started migrating services to cloud infrastructure. However, the increasing demand for cloud based infrastructure has resulted into severe problem of resource management and load balancing for cloud service providers and consumers. Researchers have suggested various load balancing techniques for efficient resource utilization in cloud. A novel load balancing technique representing relocation of workload from overloaded VM to lightly loaded VM in cloud computing environment is presented in this paper. An attempt is made to help the cloud stake holders to overcome the imbalanced resource utilization problem is presented in this paper. The approach presented here is also useful during disaster management for safeguarding end-user applications and thereby assisting upholding cloud services.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117022518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Management of power flow for DC Microgrid with Solar and Wind Energy Sources 太阳能和风能直流微电网潮流管理
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441324
K. Gowtham, C.V Sivaramadurai, P. Hariprasath, B. Indurani
Today there is a rapid proliferation of DC loads into the market and DC micro grid with renewable energy sources is emerging as a possible solution to meet growing energy demand. As different energy sources like solar, wind, fuel cell, and diesel generators can be integrated into the DC grid, Management of power flow among the sources is essential. In this paper, a control strategy for Management of power flow in DC micro grid with solar and wind energy sources is presented. As the regulation of voltage profile is important in a standalone system, a dedicated converter is to be employed for maintaining the DC link voltage. DC link voltage is regulated by the battery circuit while maximum power is extracted from Solar and Wind to feed the loads connected at the DC bus. A powerflow algorithm is developed to control among three sources in the DC Microgrid. The algorithm is tested for various load conditions and for fluctuations in solar and wind power in MATLAB/SIMULINK environment.
如今,市场上的直流负荷迅速扩散,具有可再生能源的直流微电网正在成为满足日益增长的能源需求的可能解决方案。由于太阳能、风能、燃料电池和柴油发电机等不同的能源可以集成到直流电网中,因此对这些能源之间的潮流进行管理是必不可少的。本文提出了一种基于太阳能和风能的直流微电网潮流管理的控制策略。由于电压分布的调节在独立系统中很重要,因此需要使用专用转换器来维持直流链路电压。直流链路电压由电池电路调节,同时从太阳能和风能中提取最大功率,以馈送连接在直流总线上的负载。提出了一种用于直流微电网三源间控制的潮流算法。在MATLAB/SIMULINK环境中对该算法进行了各种负载条件下的测试,并对太阳能和风能的波动进行了测试。
{"title":"A Management of power flow for DC Microgrid with Solar and Wind Energy Sources","authors":"K. Gowtham, C.V Sivaramadurai, P. Hariprasath, B. Indurani","doi":"10.1109/ICCCI.2018.8441324","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441324","url":null,"abstract":"Today there is a rapid proliferation of DC loads into the market and DC micro grid with renewable energy sources is emerging as a possible solution to meet growing energy demand. As different energy sources like solar, wind, fuel cell, and diesel generators can be integrated into the DC grid, Management of power flow among the sources is essential. In this paper, a control strategy for Management of power flow in DC micro grid with solar and wind energy sources is presented. As the regulation of voltage profile is important in a standalone system, a dedicated converter is to be employed for maintaining the DC link voltage. DC link voltage is regulated by the battery circuit while maximum power is extracted from Solar and Wind to feed the loads connected at the DC bus. A powerflow algorithm is developed to control among three sources in the DC Microgrid. The algorithm is tested for various load conditions and for fluctuations in solar and wind power in MATLAB/SIMULINK environment.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129159818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
FM Radio Antenna with Mobile Dish Antenna for Internet communication in Telemedicine 用于远程医疗网络通信的调频天线与移动碟形天线
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441314
S. Saravanan, P. Sudhakar
Telemedicine is a Health care service of ICT for Emergency treatment using internet communication between patients to specialist doctors. The internet communication is important transmission of large size medical data, videoconferencing between patients of doctors to specialist doctors. Some rural area has less mobile signal strength, so the down load and upload internet speed has low speed. In the Telemedicine service need to transmit large size of medical data and need internet speed up to 3 Mbps to 10 Mbps. The design of advanced mobile dish antenna with FM radio Antenna for increase the internet speed. This paper explains how to design mobile dish antenna with FM radio Antenna in Telemedicine service.
远程医疗是一种利用信息和通信技术进行急诊治疗的保健服务,病人与专科医生之间通过互联网进行通信。互联网通信是大型医疗数据的重要传输方式,是医生与专科医生之间的视频会议。部分农村地区由于移动信号强度较低,导致网络下载和上传速度较慢。在远程医疗服务中,需要传输大容量的医疗数据,网络速度需要达到3mbps ~ 10mbps。采用调频天线设计先进的移动碟形天线,提高上网速度。本文阐述了在远程医疗服务中如何利用调频无线电天线设计移动碟形天线。
{"title":"FM Radio Antenna with Mobile Dish Antenna for Internet communication in Telemedicine","authors":"S. Saravanan, P. Sudhakar","doi":"10.1109/ICCCI.2018.8441314","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441314","url":null,"abstract":"Telemedicine is a Health care service of ICT for Emergency treatment using internet communication between patients to specialist doctors. The internet communication is important transmission of large size medical data, videoconferencing between patients of doctors to specialist doctors. Some rural area has less mobile signal strength, so the down load and upload internet speed has low speed. In the Telemedicine service need to transmit large size of medical data and need internet speed up to 3 Mbps to 10 Mbps. The design of advanced mobile dish antenna with FM radio Antenna for increase the internet speed. This paper explains how to design mobile dish antenna with FM radio Antenna in Telemedicine service.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114392960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of Centre Antenna Element on Array Factor Properties of the Deterministic Triangular Fractal Array Antenna 中心天线单元对确定性三角形分形阵列天线阵列因子特性的影响
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441318
V. A. S. Ponnapalli, V. Y. J. Pappu
This research article explores the effect of centre antenna element on the array factor properties of the deterministic triangular fractal array antenna of expansion factor two. This sub-array based fractal array antenna is designed based on the concentric elliptical sub array geometric generator methodology. An alteration of the fractal array geometry is considered in which one of the antenna element is placed at the centre of the each sub-array of the deterministic triangular fractal array. Owing to the centre antenna element side lobe ratios are diminished from −25dB to −52dB and −30dB to −41dB in the triangular fractal array of second and third iterations simultaneously, with little variation in the side lobe level angle and beam width.
本文研究了中心天线单元对扩展因子2的确定性三角形分形阵列天线阵列因子特性的影响。基于同心椭圆子阵几何发生器方法,设计了分形子阵天线。考虑了分形阵列几何形状的改变,其中一个天线单元放置在确定三角形分形阵列的每个子阵列的中心。由于中心天线单元的存在,在二次和三次迭代的三角形分形阵列中,旁瓣比从- 25dB降至- 52dB,从- 30dB降至- 41dB,旁瓣电平角和波束宽度变化不大。
{"title":"Effect of Centre Antenna Element on Array Factor Properties of the Deterministic Triangular Fractal Array Antenna","authors":"V. A. S. Ponnapalli, V. Y. J. Pappu","doi":"10.1109/ICCCI.2018.8441318","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441318","url":null,"abstract":"This research article explores the effect of centre antenna element on the array factor properties of the deterministic triangular fractal array antenna of expansion factor two. This sub-array based fractal array antenna is designed based on the concentric elliptical sub array geometric generator methodology. An alteration of the fractal array geometry is considered in which one of the antenna element is placed at the centre of the each sub-array of the deterministic triangular fractal array. Owing to the centre antenna element side lobe ratios are diminished from −25dB to −52dB and −30dB to −41dB in the triangular fractal array of second and third iterations simultaneously, with little variation in the side lobe level angle and beam width.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114578896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image Encryption: A Random Selection Approach 图像加密:一种随机选择方法
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441267
Sundararaman Rajagopalan, L. Chandrasekaran, Amirtharajan Rengarajan, Sivaraman Rethinam, S. Arumugham, Mohan Kandhaiya
Digital data is a fundamental source of multimedia platform where image communication is a substantial part of it. Through image communication, information is transmitted and received on network in various fields like armed forces, military, healthcare, entertainment, and many more. To protect information, security architectures are necessary. This work proposes an enhanced method of gray scale image encryption where chaotic selection of encryption algorithm takes the priority. Confusion and diffusion is performed with four pseudo random sequence generators namely Chaotic logistic map, chaotic tent map, Linear Feedback Shift Register (LFSR) and combined chaotic map. Confusion phase is a constant operation in which logistic map generated random sequences are used to scramble the image. In diffusion phase, chaotic selection of random sequence generator is accomplished by a sum of four digits random number generated using logistic map. Then diffusion is performed by XORing the scrambled image with generated random sequences produced from respective generator. This image encryption scheme is designed using python 2.7 and validated by performing entropy, correlation, histogram, differential, encryption quality and NIST test analyses.
数字数据是多媒体平台的基本来源,图像通信是多媒体平台的重要组成部分。通过图像通信,军队、军事、医疗、娱乐等各个领域的信息在网络上传输和接收。为了保护信息,安全架构是必要的。本文提出了一种以混沌选择加密算法为重点的灰度图像加密增强方法。采用混沌逻辑映射、混沌帐篷映射、线性反馈移位寄存器(LFSR)和组合混沌映射四种伪随机序列发生器进行混淆和扩散。混淆阶段是使用逻辑映射生成的随机序列对图像进行搅乱的恒定操作。在扩散阶段,随机序列发生器的混沌选择是由逻辑映射生成的四位随机数和来完成的。然后将打乱后的图像与各自生成器生成的随机序列进行XORing进行扩散。该图像加密方案使用python 2.7进行设计,并通过熵、相关性、直方图、差分、加密质量和NIST测试分析进行验证。
{"title":"Image Encryption: A Random Selection Approach","authors":"Sundararaman Rajagopalan, L. Chandrasekaran, Amirtharajan Rengarajan, Sivaraman Rethinam, S. Arumugham, Mohan Kandhaiya","doi":"10.1109/ICCCI.2018.8441267","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441267","url":null,"abstract":"Digital data is a fundamental source of multimedia platform where image communication is a substantial part of it. Through image communication, information is transmitted and received on network in various fields like armed forces, military, healthcare, entertainment, and many more. To protect information, security architectures are necessary. This work proposes an enhanced method of gray scale image encryption where chaotic selection of encryption algorithm takes the priority. Confusion and diffusion is performed with four pseudo random sequence generators namely Chaotic logistic map, chaotic tent map, Linear Feedback Shift Register (LFSR) and combined chaotic map. Confusion phase is a constant operation in which logistic map generated random sequences are used to scramble the image. In diffusion phase, chaotic selection of random sequence generator is accomplished by a sum of four digits random number generated using logistic map. Then diffusion is performed by XORing the scrambled image with generated random sequences produced from respective generator. This image encryption scheme is designed using python 2.7 and validated by performing entropy, correlation, histogram, differential, encryption quality and NIST test analyses.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117324316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIFLC based control implementation of DSTATCOM 基于SIFLC的DSTATCOM控制实现
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441466
D. Suresh, K. Venkateswarlu, S. Singh
In this paper, five level distributed static compensator (DSTATCOM) is demonstrated to reduce harmonics efficiently. The topology of the DSTATCOM consists of the cascaded H-hridge multilevel inverter (CHBMLI), de link and interfacing inductor. The dc link voltage regulated with single input fuzzy logic controller. The concept of the SIFLC is derived from conventional FLC with signed distance. This simplification allows SIFLC control surface to approximated piece wise linear surface (PWL). The derived PWL surface is used for individual de capacitor voltage regulation. The instantaneous reactive power theory is used for reference current generation. The SIFLC for CHBMLI based DSTATCOM individual dc voltage regulation is proposed. The CHBMLI based DSTATCOM with SIFLC efficiently compensates the reactive current of the nonlinear load. The performance characteristics of the CHBMLI based DSTATCOM using SIFLC is compared with conventional fuzzy logic controller. The simulated response of DSTATCOM with the SIFLC shows effective compensation performance for a dynamic change in the load than the Conventional fuzzy logic controller.
本文论证了五电平分布式静态补偿器(DSTATCOM)能有效地降低谐波。DSTATCOM的拓扑结构由级联h桥多电平逆变器(CHBMLI)、脱链和接口电感组成。直流环节电压由单输入模糊控制器调节。SIFLC的概念来源于带符号距离的传统FLC。这种简化使得SIFLC控制面近似为分段线性面(PWL)。所得的PWL表面用于单独的去电容电压调节。参考电流产生采用瞬时无功功率理论。提出了一种基于DSTATCOM单直流电压调节的CHBMLI的SIFLC。基于CHBMLI和SIFLC的DSTATCOM有效地补偿了非线性负载的无功电流。比较了采用SIFLC控制的基于CHBMLI的DSTATCOM与传统模糊控制器的性能特点。与传统模糊控制器相比,SIFLC对负载动态变化的DSTATCOM仿真响应显示出有效的补偿性能。
{"title":"SIFLC based control implementation of DSTATCOM","authors":"D. Suresh, K. Venkateswarlu, S. Singh","doi":"10.1109/ICCCI.2018.8441466","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441466","url":null,"abstract":"In this paper, five level distributed static compensator (DSTATCOM) is demonstrated to reduce harmonics efficiently. The topology of the DSTATCOM consists of the cascaded H-hridge multilevel inverter (CHBMLI), de link and interfacing inductor. The dc link voltage regulated with single input fuzzy logic controller. The concept of the SIFLC is derived from conventional FLC with signed distance. This simplification allows SIFLC control surface to approximated piece wise linear surface (PWL). The derived PWL surface is used for individual de capacitor voltage regulation. The instantaneous reactive power theory is used for reference current generation. The SIFLC for CHBMLI based DSTATCOM individual dc voltage regulation is proposed. The CHBMLI based DSTATCOM with SIFLC efficiently compensates the reactive current of the nonlinear load. The performance characteristics of the CHBMLI based DSTATCOM using SIFLC is compared with conventional fuzzy logic controller. The simulated response of DSTATCOM with the SIFLC shows effective compensation performance for a dynamic change in the load than the Conventional fuzzy logic controller.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132455704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Machine Learning Approach to the Detection and Analysis of Android Malicious Apps Android恶意应用检测与分析的机器学习方法
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441472
K. Shibija, Raymond Joseph
Today, the use of mobile phone is growing in all the areas and unfortunately, it made the mobile phones a continuous target of cyber attackers. The main source of these kinds of attack is the malicious applications which a user will be downloading from trusted mediums such as Playstore, App store and all. Considering the millions of applications, the play store is having, it is impossible to identify which one is malicious and which one is not for a user. Even after the installation, the user will not be able to understand the activities the application will be performing in the mobile device. A lot of problems are arising nowadays because of this and a lot of confidential information is getting leaked from the mobile device. So, it is important to have a platform where it should be able to distinguish a malicious app from the set of benign app. This system is a mobile android application which will be working based on machine learning. The application will perform both static and dynamic analysis to identify the malicious activities of an application. The static analysis is mainly focused on the manifest.xml file of an Android application and the dynamic analysis will be based on the actions it will be triggering while running on a mobile device. The system is capable of combining both static and dynamic analysis results. The main aim of this project is to develop an efficient and effective android mobile application with a high success rate of distinguishing malicious from benign applications.
今天,手机的使用在各个领域都在增长,不幸的是,它使手机成为网络攻击者的持续目标。这类攻击的主要来源是用户从Playstore、App store等可信媒体下载的恶意应用程序。考虑到游戏商店拥有的数百万个应用程序,不可能确定哪些是恶意的,哪些不是针对用户的。即使在安装之后,用户也无法理解应用程序将在移动设备上执行的活动。因此,现在出现了很多问题,许多机密信息正在从移动设备泄露。因此,重要的是要有一个平台,它应该能够区分恶意应用程序和一组良性应用程序。这个系统是一个移动android应用程序,将基于机器学习工作。应用程序将执行静态和动态分析,以识别应用程序的恶意活动。静态分析主要关注Android应用程序的manifest.xml文件,动态分析将基于它在移动设备上运行时将触发的操作。该系统能够将静态和动态分析结果结合起来。本课题的主要目的是开发一个高效的android移动应用程序,具有较高的区分恶意和良性应用程序的成功率。
{"title":"A Machine Learning Approach to the Detection and Analysis of Android Malicious Apps","authors":"K. Shibija, Raymond Joseph","doi":"10.1109/ICCCI.2018.8441472","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441472","url":null,"abstract":"Today, the use of mobile phone is growing in all the areas and unfortunately, it made the mobile phones a continuous target of cyber attackers. The main source of these kinds of attack is the malicious applications which a user will be downloading from trusted mediums such as Playstore, App store and all. Considering the millions of applications, the play store is having, it is impossible to identify which one is malicious and which one is not for a user. Even after the installation, the user will not be able to understand the activities the application will be performing in the mobile device. A lot of problems are arising nowadays because of this and a lot of confidential information is getting leaked from the mobile device. So, it is important to have a platform where it should be able to distinguish a malicious app from the set of benign app. This system is a mobile android application which will be working based on machine learning. The application will perform both static and dynamic analysis to identify the malicious activities of an application. The static analysis is mainly focused on the manifest.xml file of an Android application and the dynamic analysis will be based on the actions it will be triggering while running on a mobile device. The system is capable of combining both static and dynamic analysis results. The main aim of this project is to develop an efficient and effective android mobile application with a high success rate of distinguishing malicious from benign applications.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132604195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RESTful Motion Detection and Notification using IoT 使用物联网的RESTful运动检测和通知
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441423
R. Kodali, Venkata Sundeep Kumar Gorantla
Individuals show immense interest in making the things around them smart by implementing new technologies. This paper mainly focuses on detection of motion in a particular area and if it is detected a notification will be sent to the person. In current implementation the PIR sensor is integrated to low-cost and Wi-Fi enabled NodeMCU Microcontroller in order to detect the motion. The NodeMCU posts the information to Thinger.io cloud which uses RESTful Programming Interface for easy integration of components. Pyroelectric Infrared (PIR) sensors are simple and most powerful people presence triggers. We also integrated IFTTT channel maker, a Web based service to thinger.io in order to get notifications when motion is detected. Here the PIR Sensor sends a signal to ESP 8266 if a motion is detected and now this information is uploaded on the thinger.io cloud and it is notified in IFTTT which is the HTTP Endpoint configuration to thinger.io cloud.
人们对通过实施新技术使周围的事物智能化表现出极大的兴趣。本文主要关注的是检测特定区域的运动,如果检测到运动,就会向人发送通知。在目前的实现中,PIR传感器集成到低成本和支持Wi-Fi的NodeMCU微控制器中,以检测运动。NodeMCU将信息发布给thing。io云,它使用RESTful编程接口来轻松集成组件。热释电红外(PIR)传感器是最简单和最强大的人的存在触发器。我们还整合了IFTTT频道制作,一个基于Web的服务。IO,以便在检测到运动时获得通知。如果检测到运动,PIR传感器会向ESP 8266发送信号,现在该信息上传到设备上。它在IFTTT中被通知,IFTTT是HTTP端点配置。io云。
{"title":"RESTful Motion Detection and Notification using IoT","authors":"R. Kodali, Venkata Sundeep Kumar Gorantla","doi":"10.1109/ICCCI.2018.8441423","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441423","url":null,"abstract":"Individuals show immense interest in making the things around them smart by implementing new technologies. This paper mainly focuses on detection of motion in a particular area and if it is detected a notification will be sent to the person. In current implementation the PIR sensor is integrated to low-cost and Wi-Fi enabled NodeMCU Microcontroller in order to detect the motion. The NodeMCU posts the information to Thinger.io cloud which uses RESTful Programming Interface for easy integration of components. Pyroelectric Infrared (PIR) sensors are simple and most powerful people presence triggers. We also integrated IFTTT channel maker, a Web based service to thinger.io in order to get notifications when motion is detected. Here the PIR Sensor sends a signal to ESP 8266 if a motion is detected and now this information is uploaded on the thinger.io cloud and it is notified in IFTTT which is the HTTP Endpoint configuration to thinger.io cloud.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132608648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Multi-Class Emotion Detection and Annotation in Malayalam Novels 马拉雅拉姆语小说中的多级情感探测与标注
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441492
R. Jayakrishnan, G. N. Gopal, M. S. Santhikrishna
Sentiment analysis or opinion mining has been used widely in various applications like market analysis. Usually during sentiment detection the polarity of the sentiment either positive or negative is detected. Basically there are multiple classes of emotions and so emotion detection is different from sentiment analysis. Reading a novel for a visually impaired person with the help of a text to speech synthesizer is still a challenging task, since it was not possible to modulate the sound with respect to the emotion in the text or dialogue. Text to speech softwares can synthesize the speech signal to embrace the emotions if the emotion of that particular text was already annotated. Multi-Class emotion detection aims analyse different emotions hidden in the text data. Multi-class emotion classification in Indian languages was not experimented before. In this paper, an SVM classifier is used for sentence level multi-class emotion detection in Malayalam. The proposed approach uses different syntactic features such as n-gram, POS related, negation related, level related features etc, for better classification. The classifier classifies the Malayalam sentences into different emotion classes like happy, sad, anger, fear or normal etc. with level information such as high, low etc. It also states whether the sentence is dialogue, question or not for better hearing experience from a speech synthesiser while reading the novel.
情感分析或观点挖掘在市场分析等各种应用中得到了广泛的应用。在情感检测过程中,通常会检测情感的极性,即积极极性或消极极性。基本上有多种情绪,所以情绪检测不同于情绪分析。在文本语音合成器的帮助下为视障人士阅读小说仍然是一项具有挑战性的任务,因为不可能根据文本或对话中的情感调节声音。如果特定文本的情感已经被注释,那么文本到语音软件可以合成语音信号来包含情感。多类情感检测的目的是分析文本数据中隐藏的不同情感。印度语言的多类情感分类以前没有进行过实验。本文将支持向量机分类器用于马拉雅拉姆语的句子级多类情感检测。该方法使用了不同的句法特征,如n-gram、词性相关特征、否定相关特征、等级相关特征等,以更好地进行分类。分类器将马拉雅拉姆语句子分为快乐、悲伤、愤怒、恐惧或正常等不同的情绪类别,并提供高、低等等级信息。它还会显示句子是对话还是问题,以便在阅读小说时通过语音合成器获得更好的听觉体验。
{"title":"Multi-Class Emotion Detection and Annotation in Malayalam Novels","authors":"R. Jayakrishnan, G. N. Gopal, M. S. Santhikrishna","doi":"10.1109/ICCCI.2018.8441492","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441492","url":null,"abstract":"Sentiment analysis or opinion mining has been used widely in various applications like market analysis. Usually during sentiment detection the polarity of the sentiment either positive or negative is detected. Basically there are multiple classes of emotions and so emotion detection is different from sentiment analysis. Reading a novel for a visually impaired person with the help of a text to speech synthesizer is still a challenging task, since it was not possible to modulate the sound with respect to the emotion in the text or dialogue. Text to speech softwares can synthesize the speech signal to embrace the emotions if the emotion of that particular text was already annotated. Multi-Class emotion detection aims analyse different emotions hidden in the text data. Multi-class emotion classification in Indian languages was not experimented before. In this paper, an SVM classifier is used for sentence level multi-class emotion detection in Malayalam. The proposed approach uses different syntactic features such as n-gram, POS related, negation related, level related features etc, for better classification. The classifier classifies the Malayalam sentences into different emotion classes like happy, sad, anger, fear or normal etc. with level information such as high, low etc. It also states whether the sentence is dialogue, question or not for better hearing experience from a speech synthesiser while reading the novel.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122204156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2018 International Conference on Computer Communication and Informatics (ICCCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1