首页 > 最新文献

2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)最新文献

英文 中文
Automated analysis of Gaze Patterns for Autism Screening- Density Approach 自闭症筛查凝视模式的自动分析-密度方法
P. Bhatia, A. Khosla, Gajendra Singh
“Visual scanning reflects a model of the world that exists inside the brain of each individual” – by Moshe Eizenman. Advancements in eye-tracking technology have led to some wide-ranging applications in fields of medical research, gaming, automation, Human- Computer Interaction(HCI) and many more. This paper presents an automated study of gaze patterns as an investigating tool to distinguish autism spectrum disorder from typical development. Gaze abnormality can be used to study the model of the world perceived by people with autism that is quite different from normal people.
“视觉扫描反映了存在于每个人大脑中的世界模型”——摩西·艾泽曼。眼动追踪技术的进步已经在医学研究、游戏、自动化、人机交互等领域得到了广泛的应用。本文提出了一种自动研究凝视模式的研究工具,以区分自闭症谱系障碍和典型发展。凝视异常可以用来研究自闭症患者与正常人截然不同的感知世界的模型。
{"title":"Automated analysis of Gaze Patterns for Autism Screening- Density Approach","authors":"P. Bhatia, A. Khosla, Gajendra Singh","doi":"10.1109/ICSCCC.2018.8703321","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703321","url":null,"abstract":"“Visual scanning reflects a model of the world that exists inside the brain of each individual” – by Moshe Eizenman. Advancements in eye-tracking technology have led to some wide-ranging applications in fields of medical research, gaming, automation, Human- Computer Interaction(HCI) and many more. This paper presents an automated study of gaze patterns as an investigating tool to distinguish autism spectrum disorder from typical development. Gaze abnormality can be used to study the model of the world perceived by people with autism that is quite different from normal people.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116242126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure QR-Code Based Message Sharing System Using Cryptography and Steganography 基于安全qr码的信息共享系统
A. Mendhe, D. Gupta, K. P. Sharma
Many cryptographic techniques are available for serving the purpose of information security over the web, servers and local systems. However, there is always demand of more security which may not be meet by such cryptographic algorithms alone because of known security attacks and mathematical complexity. Thus visualizing the strategic combination of cryptography and steganography techniques can provide a higher level of security. Quick Response (QR) codes are used extensively due to their beneficial characteristics. It includes robustness, readability, error correction capability, large data capacity than traditional barcodes etc. Thus, in this work, we propose a 3-layered architecture for securing message sharing mechanism by using QR code image in one layer. This architecture utilizes the empirical and strategic use of cryptography and steganography techniques. The proposed system provides the higher level of security on the basis of quantitative and qualitative results. Also, we evaluate our system against the performance evaluation criteria discussed in the paper.
许多加密技术可用于服务于web、服务器和本地系统上的信息安全目的。然而,由于已知的安全攻击和数学复杂性,这种加密算法可能无法满足对更高安全性的需求。因此,可视化密码学和隐写技术的战略组合可以提供更高级别的安全性。快速响应(QR)码由于其有益的特性而被广泛使用。它具有鲁棒性强、可读性强、纠错能力强、比传统条形码数据容量大等特点。因此,在这项工作中,我们提出了一个三层架构,通过在一层中使用QR码图像来保护消息共享机制。该体系结构利用了密码学和隐写技术的经验和战略使用。该系统在定量和定性结果的基础上提供了更高级别的安全性。并根据本文提出的性能评价标准对系统进行了评价。
{"title":"Secure QR-Code Based Message Sharing System Using Cryptography and Steganography","authors":"A. Mendhe, D. Gupta, K. P. Sharma","doi":"10.1109/ICSCCC.2018.8703311","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703311","url":null,"abstract":"Many cryptographic techniques are available for serving the purpose of information security over the web, servers and local systems. However, there is always demand of more security which may not be meet by such cryptographic algorithms alone because of known security attacks and mathematical complexity. Thus visualizing the strategic combination of cryptography and steganography techniques can provide a higher level of security. Quick Response (QR) codes are used extensively due to their beneficial characteristics. It includes robustness, readability, error correction capability, large data capacity than traditional barcodes etc. Thus, in this work, we propose a 3-layered architecture for securing message sharing mechanism by using QR code image in one layer. This architecture utilizes the empirical and strategic use of cryptography and steganography techniques. The proposed system provides the higher level of security on the basis of quantitative and qualitative results. Also, we evaluate our system against the performance evaluation criteria discussed in the paper.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Item-Based Collaborative Filtering in Movie Recommendation in Real time 基于项目的实时电影推荐协同过滤
Mukesh Kumar Kharita, Atul Kumar, Pardeep Singh
Collaborative filtering is one of the most effective and adequate technique used in recommendation. The fundamental aim of the recommendation is to provide prediction of the different items in which a user would be interested in based on their preferences. Recommendation systems based on collaborative filtering techniques are able to provide approximately accurate prediction when there is enough data. User based collaborative filtering taechniques have been very powerful and success in the past to recommend the items based on user’s preferences. But, there are also some certain challenges such as scalability and sparsity of data which increases as the number of users and items increases. In a large website, it is difficult to find the interested information in a certain time. But the recommendation system filter out information and items that are best suitable for us. Although there are different recommendation approaches, yet collaborative filtering technique is very popular because of the effectiveness. In this work, movie recommender system has been described, which basically uses item-based technique of collaborative filtering to provide the recommendations of items, which is dynamic and will learn from the positive feedback.
协同过滤是推荐中最有效、最充分的技术之一。推荐的基本目的是根据用户的偏好预测他们可能感兴趣的不同项目。当有足够的数据时,基于协同过滤技术的推荐系统能够提供近似准确的预测。基于用户的协同过滤技术在过去已经非常强大并且成功地根据用户的偏好来推荐商品。但是,也存在一些挑战,例如随着用户和项目数量的增加而增加的数据的可伸缩性和稀疏性。在大型网站中,很难在一定时间内找到感兴趣的信息。但是推荐系统会过滤出最适合我们的信息和项目。虽然推荐方法各不相同,但协同过滤技术因其有效性而广受欢迎。本文描述了电影推荐系统,该系统基本采用基于项目的协同过滤技术来提供项目推荐,该系统是动态的,将从正反馈中学习。
{"title":"Item-Based Collaborative Filtering in Movie Recommendation in Real time","authors":"Mukesh Kumar Kharita, Atul Kumar, Pardeep Singh","doi":"10.1109/ICSCCC.2018.8703362","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703362","url":null,"abstract":"Collaborative filtering is one of the most effective and adequate technique used in recommendation. The fundamental aim of the recommendation is to provide prediction of the different items in which a user would be interested in based on their preferences. Recommendation systems based on collaborative filtering techniques are able to provide approximately accurate prediction when there is enough data. User based collaborative filtering taechniques have been very powerful and success in the past to recommend the items based on user’s preferences. But, there are also some certain challenges such as scalability and sparsity of data which increases as the number of users and items increases. In a large website, it is difficult to find the interested information in a certain time. But the recommendation system filter out information and items that are best suitable for us. Although there are different recommendation approaches, yet collaborative filtering technique is very popular because of the effectiveness. In this work, movie recommender system has been described, which basically uses item-based technique of collaborative filtering to provide the recommendations of items, which is dynamic and will learn from the positive feedback.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125588800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Predictive Analysis of Medical Data using a Hybrid Machine Learning Technique 使用混合机器学习技术的医疗数据预测分析
Pushpendra Singh Rajawat, D. Gupta, S. Rathore, Avtar Singh
Diabetes is a chronic disease, which affects millions of people around the world. It causes serious damage to human health and even sometimes human lives. Various research is going on in this area to reduce its negative impact. In this paper, we propose a hybrid machine learning technique to classify people into patient and healthy classes, respectively. The patient class represents people with diabetes and the healthy class represents people with no diabetes. We evaluate the proposed model against various performance measures and found that it performs better than previously used techniques. We use Pima Indian Diabetes dataset, which has 768 instances and 9 attributes. Out of 768 instances, 268 are affected and 500 are not affected by diabetes.
糖尿病是一种慢性疾病,影响着全世界数百万人。它对人类健康造成严重损害,有时甚至危及生命。这个领域正在进行各种研究,以减少其负面影响。在本文中,我们提出了一种混合机器学习技术,将人分别分为患者和健康类。患者组代表糖尿病患者,健康组代表无糖尿病患者。我们根据各种性能指标评估了所提出的模型,发现它比以前使用的技术表现得更好。我们使用Pima Indian Diabetes数据集,它有768个实例和9个属性。在768例中,268例受糖尿病影响,500例未受糖尿病影响。
{"title":"Predictive Analysis of Medical Data using a Hybrid Machine Learning Technique","authors":"Pushpendra Singh Rajawat, D. Gupta, S. Rathore, Avtar Singh","doi":"10.1109/ICSCCC.2018.8703302","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703302","url":null,"abstract":"Diabetes is a chronic disease, which affects millions of people around the world. It causes serious damage to human health and even sometimes human lives. Various research is going on in this area to reduce its negative impact. In this paper, we propose a hybrid machine learning technique to classify people into patient and healthy classes, respectively. The patient class represents people with diabetes and the healthy class represents people with no diabetes. We evaluate the proposed model against various performance measures and found that it performs better than previously used techniques. We use Pima Indian Diabetes dataset, which has 768 instances and 9 attributes. Out of 768 instances, 268 are affected and 500 are not affected by diabetes.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126459057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and Implementation of Smart Wheelchair for Quadriplegia patients using IOT 基于物联网的四肢瘫痪患者智能轮椅的设计与实现
Umang Garg, K. Ghanshala, R. Joshi, Rahul Chauhan
Quadriplegia is a pathological condition identified through completely or partly paralysis of the limbs and torso. Smart wheelchair is an innovation that has an intention to create a difference for the activities of the people who are restricted by movement. This paper proposed an idea to ease those patients, who cannot perform hand movements in a way that can move a wheelchair. This paper peculiarly represents the working model of a smart wheelchair using Internet of things (IoT). Three different modes are proposed which assist the patient in free movement and information transmission to the person nearby and to the cloud. To provide movement of wheelchair in desired direction an accelerometer based hand glove is design. Patient can transmit the requirements to the nearer ones through hand gesture using RF transmission. Third mode provides the information on cloud which can be accessed by the doctor for diagnosis.
四肢瘫痪是一种通过四肢和躯干完全或部分瘫痪而确定的病理状态。智能轮椅是一种创新,旨在为行动不便的人的活动创造不同。这篇论文提出了一个想法,让那些不能以移动轮椅的方式进行手部运动的患者感到轻松。提出了一种基于物联网的智能轮椅的工作模型。提出了三种不同的模式,以帮助患者自由移动和信息传输到附近的人和云。为了使轮椅在期望的方向上运动,设计了一种基于手套的加速度计。患者可以使用射频传输,通过手势将需求传递给更近的人。第三种模式在云端提供信息,医生可以访问这些信息进行诊断。
{"title":"Design and Implementation of Smart Wheelchair for Quadriplegia patients using IOT","authors":"Umang Garg, K. Ghanshala, R. Joshi, Rahul Chauhan","doi":"10.1109/ICSCCC.2018.8703354","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703354","url":null,"abstract":"Quadriplegia is a pathological condition identified through completely or partly paralysis of the limbs and torso. Smart wheelchair is an innovation that has an intention to create a difference for the activities of the people who are restricted by movement. This paper proposed an idea to ease those patients, who cannot perform hand movements in a way that can move a wheelchair. This paper peculiarly represents the working model of a smart wheelchair using Internet of things (IoT). Three different modes are proposed which assist the patient in free movement and information transmission to the person nearby and to the cloud. To provide movement of wheelchair in desired direction an accelerometer based hand glove is design. Patient can transmit the requirements to the nearer ones through hand gesture using RF transmission. Third mode provides the information on cloud which can be accessed by the doctor for diagnosis.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127219315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Restoration of Image from Deterioration Using Image Inpainting 使用图像修复从退化图像
Varuni Garg, Dr. Renu Dhir
Inpainting is a technique used to reconstruct spoiled image or missing part of an image in original image in the way that look plausible according to human perception. This technique reconstructs the picture comes under inpainting. The rebuilding of damaged photos such as aged photos and films, elimination of superimposed text, elimination/replacement of not desired objects, red eye correction, image coding comes under the application of image inpainting. It is art which is used in the past years. In this paper, Convolutional Method has been used to inpaint the image. In proposed method the diffusion kernel has been modified and the number of kernel has been increased from both left and right direction and the kernels has been convolved upon the area needed to be inpaint.
修复是一种将被破坏的图像或原图像中缺失的部分按照人类感知的方式进行重建的技术。这种技术重建了绘画中的画面。老化照片、胶片等受损照片的重建、叠加文字的消除、不需要的物体的消除/替换、红眼校正、图像编码等都属于图像修复的应用范畴。这是过去几年使用的艺术。本文采用卷积法对图像进行着色。该方法对扩散核进行了改进,从左右两个方向增加了扩散核的数量,并对需要涂漆的区域进行了卷积。
{"title":"Restoration of Image from Deterioration Using Image Inpainting","authors":"Varuni Garg, Dr. Renu Dhir","doi":"10.1109/ICSCCC.2018.8703203","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703203","url":null,"abstract":"Inpainting is a technique used to reconstruct spoiled image or missing part of an image in original image in the way that look plausible according to human perception. This technique reconstructs the picture comes under inpainting. The rebuilding of damaged photos such as aged photos and films, elimination of superimposed text, elimination/replacement of not desired objects, red eye correction, image coding comes under the application of image inpainting. It is art which is used in the past years. In this paper, Convolutional Method has been used to inpaint the image. In proposed method the diffusion kernel has been modified and the number of kernel has been increased from both left and right direction and the kernels has been convolved upon the area needed to be inpaint.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132755336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensor Fusion Algorithm For Software Based Advanced Driver-Assistance Intelligent Systems 基于软件的高级驾驶员辅助智能系统传感器融合算法
P. Kaur, R. Sobti
The diversity of smart and cognitively intelligent features integrated into the modern contemporary cars is rising rapidly. Intelligent cooperative driving is one of the several applications of the IOT field in which cars interact with other vehicles on road and provide a streamlined flow of traffic smartly. The main ingredients for making this technology successful are the sensing devices mounted on every vehicle. The main purpose of this paper is to discuss the safety of future autonomous vehicles which will be sharing information of impending hazards on road with other cars. The paper provides an overview of several problems, uncertainties, and inaccuracies emerging from sensor data fusion during car-to-car interaction in autonomous vehicles. The rate at which some sensors update their information is different for different sensors which lead to incorrect scene comprehension. Several survey report results are provided showing evidence of future sensor usage in the automotive market which accounts for billions of dollars. Safety in smart cars can be guaranteed if they communicate information unambiguously to nearby cars in their vicinity.
集成到现代现代汽车中的智能和认知智能功能的多样性正在迅速上升。智能协同驾驶是物联网领域的几个应用之一,其中汽车与道路上的其他车辆交互,并智能地提供精简的交通流量。使这项技术成功的主要因素是安装在每辆车上的传感装置。本文的主要目的是讨论未来自动驾驶汽车的安全性,自动驾驶汽车将与其他汽车共享道路上即将发生的危险信息。本文概述了自动驾驶汽车在车对车交互过程中传感器数据融合出现的几个问题、不确定性和不准确性。不同传感器的信息更新速度不同,导致场景理解不正确。几份调查报告结果显示,未来传感器在汽车市场的使用将达到数十亿美元。如果智能汽车能向附近的汽车明确地传递信息,就能保证汽车的安全。
{"title":"Sensor Fusion Algorithm For Software Based Advanced Driver-Assistance Intelligent Systems","authors":"P. Kaur, R. Sobti","doi":"10.1109/ICSCCC.2018.8703269","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703269","url":null,"abstract":"The diversity of smart and cognitively intelligent features integrated into the modern contemporary cars is rising rapidly. Intelligent cooperative driving is one of the several applications of the IOT field in which cars interact with other vehicles on road and provide a streamlined flow of traffic smartly. The main ingredients for making this technology successful are the sensing devices mounted on every vehicle. The main purpose of this paper is to discuss the safety of future autonomous vehicles which will be sharing information of impending hazards on road with other cars. The paper provides an overview of several problems, uncertainties, and inaccuracies emerging from sensor data fusion during car-to-car interaction in autonomous vehicles. The rate at which some sensors update their information is different for different sensors which lead to incorrect scene comprehension. Several survey report results are provided showing evidence of future sensor usage in the automotive market which accounts for billions of dollars. Safety in smart cars can be guaranteed if they communicate information unambiguously to nearby cars in their vicinity.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133615493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ROI and Non-ROI based Medical Image Compression Techniques: A Survey and Comparative Review 基于ROI和非ROI的医学图像压缩技术:综述和比较综述
R. Kaur, Rajneesh Rani
Due to the advancement in the field of information technology, medical image processing has become the most eminent image processing field in this era. The medical image needs to be stored and transmitted for telemedicine purpose. Due to the huge size of medical images, it becomes very difficult to store and transmit it over the network. Image compression is a significant toolto reduce the redundancies and irrelevant informationof the image for efficient archival and fast transmission. The paper provides the state-of-the-art survey fornon-ROI (i.e. lossless) and ROI based (i.e. hybrid region of interest)techniques available in the area of medical image compression. The paper will provide help for researchers to understand the different techniques of medical image compression with theircomparative analysis for further research in this area.
由于信息技术领域的进步,医学图像处理已经成为这个时代最突出的图像处理领域。远程医疗需要对医学图像进行存储和传输。由于医学图像的巨大尺寸,使得其在网络上的存储和传输变得非常困难。图像压缩是减少图像冗余和不相关信息,实现高效归档和快速传输的重要手段。本文提供了医学图像压缩领域中可用的非ROI(即无损)和基于ROI(即混合感兴趣区域)技术的最新调查。本文将通过对不同医学图像压缩技术的比较分析,帮助研究人员了解不同的医学图像压缩技术,为进一步研究提供依据。
{"title":"ROI and Non-ROI based Medical Image Compression Techniques: A Survey and Comparative Review","authors":"R. Kaur, Rajneesh Rani","doi":"10.1109/ICSCCC.2018.8703337","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703337","url":null,"abstract":"Due to the advancement in the field of information technology, medical image processing has become the most eminent image processing field in this era. The medical image needs to be stored and transmitted for telemedicine purpose. Due to the huge size of medical images, it becomes very difficult to store and transmit it over the network. Image compression is a significant toolto reduce the redundancies and irrelevant informationof the image for efficient archival and fast transmission. The paper provides the state-of-the-art survey fornon-ROI (i.e. lossless) and ROI based (i.e. hybrid region of interest)techniques available in the area of medical image compression. The paper will provide help for researchers to understand the different techniques of medical image compression with theircomparative analysis for further research in this area.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134317597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-Layered Attack Recognition (MLAR) Model to Protect Cloud From EDOS Attacks 保护云免受dos攻击的多层攻击识别(MLAR)模型
Yashika Arora
In this paper, the work is carried upon the security of cloud computing environment from the economic denial of service (EDOS) attacks. The cloud computing environments have become popular in the past decade, as number of businesses has shifted their work online to the cloud. The cloud service providers offer the maximum uptime for their users, which is committed in the form of service level agreements (SLAs). The uptime is the term used to indicate the availability of the cloud computing resources for client’s application to run its processes. If at any point, the client application is not able to run its operations due to non-availability of resources, it is considered as the downtime, which is negative to the uptime and considered as SLA violation. The SLAs keep the information about the SLA violations and their settlements, which is considered as the loss of the cloud service providers. For example, the uptime of 99.99% is committed by cloud service provider, and due to any internal or external reason, achieved uptime is lower than committed value, the cloud service provider may face a penalty as per defined in the SLA, which is considered direct profit loss for the service provider. In order to reduce the financial losses due to the EDOS attacks, the proposed model is designed by combining the periodic authentication, pattern analysis and data flow control mechanisms to prevent the cloud from attacks. The proposed Multi-Layered Attack Recognition (MLAR) Model has outperformed the existing controlled access based EDOS (CA-EDOS) prevention model on the basis of resource utilization and response delay parameters.
本文针对经济拒绝服务攻击对云计算环境安全的影响进行了研究。云计算环境在过去十年中变得流行起来,因为许多企业已经将他们的在线工作转移到云上。云服务提供商为其用户提供最长的正常运行时间,这是以服务水平协议(sla)的形式提交的。正常运行时间是用于指示客户端应用程序运行其进程的云计算资源的可用性的术语。如果在任何时候,客户机应用程序由于资源不可用而无法运行其操作,则将其视为停机时间,这与正常运行时间是负的,并被视为违反SLA。SLA保留有关SLA违规及其解决的信息,这被认为是云服务提供商的损失。例如,99.99%的正常运行时间是由云服务提供商承诺的,并且由于任何内部或外部原因,实现的正常运行时间低于承诺值,云服务提供商可能面临SLA中定义的罚款,这被认为是服务提供商的直接利润损失。为了减少由于dos攻击造成的经济损失,该模型结合了周期认证、模式分析和数据流控制机制来防止云受到攻击。基于资源利用率和响应延迟参数,提出的多层攻击识别(MLAR)模型优于现有的基于受控访问的EDOS (CA-EDOS)预防模型。
{"title":"Multi-Layered Attack Recognition (MLAR) Model to Protect Cloud From EDOS Attacks","authors":"Yashika Arora","doi":"10.1109/ICSCCC.2018.8703328","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703328","url":null,"abstract":"In this paper, the work is carried upon the security of cloud computing environment from the economic denial of service (EDOS) attacks. The cloud computing environments have become popular in the past decade, as number of businesses has shifted their work online to the cloud. The cloud service providers offer the maximum uptime for their users, which is committed in the form of service level agreements (SLAs). The uptime is the term used to indicate the availability of the cloud computing resources for client’s application to run its processes. If at any point, the client application is not able to run its operations due to non-availability of resources, it is considered as the downtime, which is negative to the uptime and considered as SLA violation. The SLAs keep the information about the SLA violations and their settlements, which is considered as the loss of the cloud service providers. For example, the uptime of 99.99% is committed by cloud service provider, and due to any internal or external reason, achieved uptime is lower than committed value, the cloud service provider may face a penalty as per defined in the SLA, which is considered direct profit loss for the service provider. In order to reduce the financial losses due to the EDOS attacks, the proposed model is designed by combining the periodic authentication, pattern analysis and data flow control mechanisms to prevent the cloud from attacks. The proposed Multi-Layered Attack Recognition (MLAR) Model has outperformed the existing controlled access based EDOS (CA-EDOS) prevention model on the basis of resource utilization and response delay parameters.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121401530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breast Cancer Detection Through Gabor Filter Based Texture Features Using Thermograms Images 基于Gabor滤波的热像图纹理特征乳腺癌检测
A.A. Khan, A. Arora
The mortality rates in women is highest due to breast cancer among other all the cancers in developed as well as in developing countries. As evident from the facts that mortality rate of 12.7 among 1, 00, 000 in India [1] and whereas in USA, estimated deaths of 40,610 women i.e. 6.8% of all cancer deaths in 2017. Mammography is considered to be the most accepted technique for breast cancer detection. In this paper, thermography is explored as a viable alternative to the mammography. As mammography has its own drawbacks of being a painful procedure, exposure of the body to harmful Xrays. This necessitates in exploring the other modalities preferably non-contact and without using any harmful radiations. Thermography is coming out to be an alternative to the standard mammography with advantages of being noninvasive, safe, portability and cost effectiveness. The temperature pattern of the breasts changes as a result of the high increased blood flow into affected cells. This gives the way to asymmetry between normal and cancerous breast which can be detected using different techniques. In this paper, 35 normal and 35 abnormal thermograms are taken from on line DMRDatabase for Mastology Research having breast thermograms for early detection of breast cancer. The texture features of the left and right breasts are extracted using Gabor filters. The thermograms are then classified using support vector machine (SVM) based on the textural asymmetry between the breasts into normal and cancerous cases. The accuracy achieved using Gabor features and SVM classifier is 84.5% The early detection of cancer using thermography increases the survival chances of the patient considerably as it can detect the cancer in initial stages.
在发达国家和发展中国家的所有癌症中,妇女因乳腺癌的死亡率最高。从以下事实可以看出,印度每10万人中有12.7人的死亡率[1],而在美国,2017年估计有40610名女性死亡,占所有癌症死亡人数的6.8%。乳房x光摄影被认为是最被接受的乳腺癌检测技术。本文探讨了热成像作为乳房x线摄影的可行替代方法。乳房x光检查有其自身的缺点,它是一个痛苦的过程,将身体暴露在有害的x射线中。这需要探索其他方式,最好是非接触和不使用任何有害辐射。热成像技术正成为标准乳房x光检查的一种替代方法,具有无创、安全、便携和成本效益等优点。乳房的温度模式的变化是由于大量的血液流入受影响的细胞。这使得正常乳房和癌性乳房之间的不对称可以通过不同的技术来检测。本文从乳腺热像图在线DMRDatabase for Mastology Research中获取35张正常和35张异常的乳房热像图,用于早期发现乳腺癌。使用Gabor滤波器提取左右乳房的纹理特征。然后使用基于乳房纹理不对称的支持向量机(SVM)将热图分类为正常和癌病例。使用Gabor特征和SVM分类器获得的准确率为84.5%。使用热成像技术早期检测癌症,因为它可以在早期阶段检测到癌症,大大增加了患者的生存机会。
{"title":"Breast Cancer Detection Through Gabor Filter Based Texture Features Using Thermograms Images","authors":"A.A. Khan, A. Arora","doi":"10.1109/ICSCCC.2018.8703342","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703342","url":null,"abstract":"The mortality rates in women is highest due to breast cancer among other all the cancers in developed as well as in developing countries. As evident from the facts that mortality rate of 12.7 among 1, 00, 000 in India [1] and whereas in USA, estimated deaths of 40,610 women i.e. 6.8% of all cancer deaths in 2017. Mammography is considered to be the most accepted technique for breast cancer detection. In this paper, thermography is explored as a viable alternative to the mammography. As mammography has its own drawbacks of being a painful procedure, exposure of the body to harmful Xrays. This necessitates in exploring the other modalities preferably non-contact and without using any harmful radiations. Thermography is coming out to be an alternative to the standard mammography with advantages of being noninvasive, safe, portability and cost effectiveness. The temperature pattern of the breasts changes as a result of the high increased blood flow into affected cells. This gives the way to asymmetry between normal and cancerous breast which can be detected using different techniques. In this paper, 35 normal and 35 abnormal thermograms are taken from on line DMRDatabase for Mastology Research having breast thermograms for early detection of breast cancer. The texture features of the left and right breasts are extracted using Gabor filters. The thermograms are then classified using support vector machine (SVM) based on the textural asymmetry between the breasts into normal and cancerous cases. The accuracy achieved using Gabor features and SVM classifier is 84.5% The early detection of cancer using thermography increases the survival chances of the patient considerably as it can detect the cancer in initial stages.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128819576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1