Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703283
Mintu, Gursharan Singh, Pooja Gupta
The portable Ad-hoc network is simply the decentralized and arranging kind of system in which versatile hubs join or leave the system whenever. Because of decentralized nature of the network security, routing and quality of service are the three noteworthy issues. To establish the path from source to destination reactive routing protocol can be implemented. The AODV is the reactive routing protocol in which source hub flood route request packets in the network. The hubs which are adjoining goal will react back to the route replay packets. The way which has minimum hop count and maximum sequence number will be choosen as the best way from source to goal. The versatile hubs can join or leave the system and at some point, malevolent hubs enter the system, which is dependable to trigger different active and passive attacks. The flooding assault is the active kind of assault in which malevolent hubs send raw packets on the channel. Because of this, channel gets over-burden and packet-loss may happen inside the system. This prompts lessening in network throughput and increment network packet-loss. In this research, the technique of advanced monitor mode will be proposed which detects and isolates malicious nodes from the network which are responsible to trigger flooding attack.
{"title":"To Alleviate The Flooding Attack and Intensify Efficiency in MANET","authors":"Mintu, Gursharan Singh, Pooja Gupta","doi":"10.1109/ICSCCC.2018.8703283","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703283","url":null,"abstract":"The portable Ad-hoc network is simply the decentralized and arranging kind of system in which versatile hubs join or leave the system whenever. Because of decentralized nature of the network security, routing and quality of service are the three noteworthy issues. To establish the path from source to destination reactive routing protocol can be implemented. The AODV is the reactive routing protocol in which source hub flood route request packets in the network. The hubs which are adjoining goal will react back to the route replay packets. The way which has minimum hop count and maximum sequence number will be choosen as the best way from source to goal. The versatile hubs can join or leave the system and at some point, malevolent hubs enter the system, which is dependable to trigger different active and passive attacks. The flooding assault is the active kind of assault in which malevolent hubs send raw packets on the channel. Because of this, channel gets over-burden and packet-loss may happen inside the system. This prompts lessening in network throughput and increment network packet-loss. In this research, the technique of advanced monitor mode will be proposed which detects and isolates malicious nodes from the network which are responsible to trigger flooding attack.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114428166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703202
A. Kamboj, Rajneesh Rani, Jiten Chaudhary
Brain tumor has been a cause of concern for the medical fraternity. The manual segmentation of brain tumor by medical expert is a time-consuming process and this needs to be automated. The Computer-aided diagnosis (CAD) system, help to improve the diagnosis and reduces the overall time required to identify the tumor. Researchers have proposed methods that can diagnose brain tumor based on machine learning and deep learning techniques. But the methods based on deep learning have proven much better than the traditional machine learning methods. In this paper we have discussed the state-of-the-art methods for brain tumor segmentation based on deep learning.
{"title":"Deep Leaming Approaches for Brain Tumor Segmentation: A Review","authors":"A. Kamboj, Rajneesh Rani, Jiten Chaudhary","doi":"10.1109/ICSCCC.2018.8703202","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703202","url":null,"abstract":"Brain tumor has been a cause of concern for the medical fraternity. The manual segmentation of brain tumor by medical expert is a time-consuming process and this needs to be automated. The Computer-aided diagnosis (CAD) system, help to improve the diagnosis and reduces the overall time required to identify the tumor. Researchers have proposed methods that can diagnose brain tumor based on machine learning and deep learning techniques. But the methods based on deep learning have proven much better than the traditional machine learning methods. In this paper we have discussed the state-of-the-art methods for brain tumor segmentation based on deep learning.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114536019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a Neural based Energy-Efficient Stable Clustering (NESC) for Multilevel Heterogeneous wireless sensor networks (MHWSNs). In NESC protocol, the sensor nodes are selected as cluster heads (CHs) by employing the multi-layer back propagation model of neural network. The training of neurons is done on the basis of normalized energy and distance factors which helps in the selection of proper CHs which increases the network lifetime, throughput and reliability. Simulation results justified that NESC protocol achieves better network performance in terms of network lifetime, energy consumption, and throughput than existing routing protocols (i.e., LEACH, SEP, DEEC, and EDCS) for MHWSNs.
{"title":"Neural based Energy-Efficient Stable Clustering for Multilevel Heterogeneous WSNs","authors":"Akshay Verma, Rajkrishna Mondal, Prateek Gupta, Arvind Kumar","doi":"10.1109/ICSCCC.2018.8703353","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703353","url":null,"abstract":"This paper presents a Neural based Energy-Efficient Stable Clustering (NESC) for Multilevel Heterogeneous wireless sensor networks (MHWSNs). In NESC protocol, the sensor nodes are selected as cluster heads (CHs) by employing the multi-layer back propagation model of neural network. The training of neurons is done on the basis of normalized energy and distance factors which helps in the selection of proper CHs which increases the network lifetime, throughput and reliability. Simulation results justified that NESC protocol achieves better network performance in terms of network lifetime, energy consumption, and throughput than existing routing protocols (i.e., LEACH, SEP, DEEC, and EDCS) for MHWSNs.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127767363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703356
Swapnil Hattarge, Akshay M. Kekre, A. Kothari
The increasing level of air-pollution due to vehicular emissions is an imminent threat to our environment. In order to tackle this situation, we need to promote and adapt public transport. Making the existing city-bus system smarter by tracking the buses is the step that can be taken immediately for making public vehicles more accessible. The main hurdle in deploying traditional GPS trackers is the maintenance cost which can significantly be reduced by using LoRaWAN instead of GSM/GPRS modules. In this paper, an end-to-end wireless tracking system based on LoRaWAN is proposed. The gateway is set up along with server and data is stored in a cloud database. Android application is built to show the current location of the transmitter to the user. The main contribution of this paper is in building a custom gateway and server which provides more flexibility in designing the network parameters when compared to the commonly used third-party gateway or server applications.
{"title":"LoRaWAN based GPS tracking of city-buses for smart public transport system","authors":"Swapnil Hattarge, Akshay M. Kekre, A. Kothari","doi":"10.1109/ICSCCC.2018.8703356","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703356","url":null,"abstract":"The increasing level of air-pollution due to vehicular emissions is an imminent threat to our environment. In order to tackle this situation, we need to promote and adapt public transport. Making the existing city-bus system smarter by tracking the buses is the step that can be taken immediately for making public vehicles more accessible. The main hurdle in deploying traditional GPS trackers is the maintenance cost which can significantly be reduced by using LoRaWAN instead of GSM/GPRS modules. In this paper, an end-to-end wireless tracking system based on LoRaWAN is proposed. The gateway is set up along with server and data is stored in a cloud database. Android application is built to show the current location of the transmitter to the user. The main contribution of this paper is in building a custom gateway and server which provides more flexibility in designing the network parameters when compared to the commonly used third-party gateway or server applications.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127501108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703267
Akanksha Sharma, N. Jindal, A. Thakur
Various new deep learning models have been invented, among which generative adversarial networks have gained exceptional prominence in last four years due to its property of image synthesis. GANs have been utilized in diverse fields ranging from conventional areas like image processing, biomedical signal processing, remote sensing, video generation to even off beat areas like sound and music generation. In this paper, we provide an overview of GANs along with its comparison with other networks, as well as different versions of Generative Adversarial Networks.
{"title":"Comparison on Generative Adversarial Networks –A Study","authors":"Akanksha Sharma, N. Jindal, A. Thakur","doi":"10.1109/ICSCCC.2018.8703267","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703267","url":null,"abstract":"Various new deep learning models have been invented, among which generative adversarial networks have gained exceptional prominence in last four years due to its property of image synthesis. GANs have been utilized in diverse fields ranging from conventional areas like image processing, biomedical signal processing, remote sensing, video generation to even off beat areas like sound and music generation. In this paper, we provide an overview of GANs along with its comparison with other networks, as well as different versions of Generative Adversarial Networks.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124189781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A wide spread in the count of people’s temporary or permanent disabilities led to an increase in the demand for wheelchairs. Wheelchairs are used by the people who cannot walk due to physical illness, injury or other disability. Now-a-days development promises a wide scope in developing smart wheelchair. Wheelchair now comes in diverse selection of styles which makes it exceedingly difficult for a person to select one that properly fits their lifestyle. Our project is to implement a home navigation system, which comprises of a wheelchair which will be monitored using an android phone. Android phones being easily accessible to every household, our project will focus to operate the wheelchair that works on the inputs such as voice, touch and gesture via an android phone and navigates according to the commands provided. It is common that the elders and physically challenged people find it hard to move the wheelchair without external aid. By making use of HNS, elderly and the physically challenged can move to different location in a house just by pronouncing the direction name or by making the movement on the android phones or just by selecting the move direction they will be provided with. This will be a boon for many disabled people to operate the wheelchair on their own.
{"title":"Android Controlled Wheelchair","authors":"Beverlly Borges, A. Chandra, Rakhi Kalantri, Shubham Gupta, Gavin Dsilva, Shagufta Rajguru","doi":"10.1109/ICSCCC.2018.8703345","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703345","url":null,"abstract":"A wide spread in the count of people’s temporary or permanent disabilities led to an increase in the demand for wheelchairs. Wheelchairs are used by the people who cannot walk due to physical illness, injury or other disability. Now-a-days development promises a wide scope in developing smart wheelchair. Wheelchair now comes in diverse selection of styles which makes it exceedingly difficult for a person to select one that properly fits their lifestyle. Our project is to implement a home navigation system, which comprises of a wheelchair which will be monitored using an android phone. Android phones being easily accessible to every household, our project will focus to operate the wheelchair that works on the inputs such as voice, touch and gesture via an android phone and navigates according to the commands provided. It is common that the elders and physically challenged people find it hard to move the wheelchair without external aid. By making use of HNS, elderly and the physically challenged can move to different location in a house just by pronouncing the direction name or by making the movement on the android phones or just by selecting the move direction they will be provided with. This will be a boon for many disabled people to operate the wheelchair on their own.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131217416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703214
Pankaj Kumar, Lokesh Chouhan
In wireless sensor network (WSN) nodes relay data, which maintains consistency in the sensor network. If cut vertex nodes failed it leads to partitioning in network, which disrupts the communication. It requires an autonomous technique that finds the fail node and provides recovery to them. In this paper the proposed approach provides recovery from network partitioning in distribute WSN. The proposed approach increases the lifetime of network.
{"title":"Distributed Recovery in Moveable Wireless Sensor Networks","authors":"Pankaj Kumar, Lokesh Chouhan","doi":"10.1109/ICSCCC.2018.8703214","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703214","url":null,"abstract":"In wireless sensor network (WSN) nodes relay data, which maintains consistency in the sensor network. If cut vertex nodes failed it leads to partitioning in network, which disrupts the communication. It requires an autonomous technique that finds the fail node and provides recovery to them. In this paper the proposed approach provides recovery from network partitioning in distribute WSN. The proposed approach increases the lifetime of network.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132689745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703204
Simarjot Kaur Randhawa, R. K. Sunkaria, Anterpreet Kaur Bedi
Liver diseases are one of the significant public health issues in present scenario. Liver cirrhosis is one of the leading causes of deaths due to liver related diseases. In this work, classification of normal and cirrhotic liver is done using texture analysis. Various texture features are extracted for classification. Out of all the extracted features, seven best features are identified using fisher discriminant ratio. Further, weighted fisher discriminant ratio algorithm is designed using the selected features, such that maximum accuracy and sensitivity is achieved.
{"title":"Prediction of Liver Cirrhosis Using Weighted Fisher Discriminant Ratio Algorithm","authors":"Simarjot Kaur Randhawa, R. K. Sunkaria, Anterpreet Kaur Bedi","doi":"10.1109/ICSCCC.2018.8703204","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703204","url":null,"abstract":"Liver diseases are one of the significant public health issues in present scenario. Liver cirrhosis is one of the leading causes of deaths due to liver related diseases. In this work, classification of normal and cirrhotic liver is done using texture analysis. Various texture features are extracted for classification. Out of all the extracted features, seven best features are identified using fisher discriminant ratio. Further, weighted fisher discriminant ratio algorithm is designed using the selected features, such that maximum accuracy and sensitivity is achieved.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703364
D. K. Gupta, R. Singh, Vikalp Ravi Jain
Financial forecasting is one of the trending research going on in the current market. Researchers are mainly focused on the parameters that are affecting share market. Presently researchers are able to discover the relation between macroeconomic variables and different indices. We are driving our research by discovering the relationship between macroeconomic variables and individual share prices, but before proceeding for the prediction, we firstly analyze each individual company and their dependence on raw products for the improvement in predicting the individual share prices. Each individual companies produce different units used by consumers. To compose those elements companies necessitate raw materials and because of those materials their share prices are being affected. We did an analysis that how strongly they need those raw materials in their production and how these companies are related. From that relation, we are able to parameterize our neural network for the prediction of different individual companies share prices.
{"title":"Analysis and Forecasting of Individual Stock Prices of Various Constituents in NIFTY 50","authors":"D. K. Gupta, R. Singh, Vikalp Ravi Jain","doi":"10.1109/ICSCCC.2018.8703364","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703364","url":null,"abstract":"Financial forecasting is one of the trending research going on in the current market. Researchers are mainly focused on the parameters that are affecting share market. Presently researchers are able to discover the relation between macroeconomic variables and different indices. We are driving our research by discovering the relationship between macroeconomic variables and individual share prices, but before proceeding for the prediction, we firstly analyze each individual company and their dependence on raw products for the improvement in predicting the individual share prices. Each individual companies produce different units used by consumers. To compose those elements companies necessitate raw materials and because of those materials their share prices are being affected. We did an analysis that how strongly they need those raw materials in their production and how these companies are related. From that relation, we are able to parameterize our neural network for the prediction of different individual companies share prices.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133052798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703211
Amit Nayyer, A. Sharma, L. Awasthi
Software Defined Networking is a novel paradigm for researchers. This field has sub-domains with different issues which need to be worked on and provide solutions, as in other fields of research. Simulation is one of the most commonly used methods by researchers to study and evaluate new theories as well as the behavior of any existing network. In this paper, an attempt has been made to provide a comprehensive study and analysis of different open source simulators and emulators freely available for Software Defined Networks. Various merits have been discussed along with limitation they possess in simulating the Software Defined Networks. The goal is to introduce newbie to different software available for evaluating the network for the purpose of research in this emerging field. Selection of a network simulator is a crucial task for researchers. This article provides help to the scholars to choose the software that suits their requirement of performance evaluation in the area. The idea is to compare these performance evaluators by first simulating a topology and then some specific parameters, to find the optimal one.
{"title":"A Study of Performance Evaluators for Software Defined Networking","authors":"Amit Nayyer, A. Sharma, L. Awasthi","doi":"10.1109/ICSCCC.2018.8703211","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703211","url":null,"abstract":"Software Defined Networking is a novel paradigm for researchers. This field has sub-domains with different issues which need to be worked on and provide solutions, as in other fields of research. Simulation is one of the most commonly used methods by researchers to study and evaluate new theories as well as the behavior of any existing network. In this paper, an attempt has been made to provide a comprehensive study and analysis of different open source simulators and emulators freely available for Software Defined Networks. Various merits have been discussed along with limitation they possess in simulating the Software Defined Networks. The goal is to introduce newbie to different software available for evaluating the network for the purpose of research in this emerging field. Selection of a network simulator is a crucial task for researchers. This article provides help to the scholars to choose the software that suits their requirement of performance evaluation in the area. The idea is to compare these performance evaluators by first simulating a topology and then some specific parameters, to find the optimal one.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133209516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}