Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703350
Sumandeep Kaur, Geeta Sikka, L. Awasthi
Sentiment analysis is the approach which is designed to analyze positive, negative and neutral aspects of any text unit. In the past years, many techniques were designed for the sentiment analysis of twitter data. Based on the previous study about sentiment analysis, a novel approach is presented in this research paper for the sentiment analysis of twitter data. The proposed approach is the combination of feature extraction and classification techniques. N-gram algorithm is applied for the feature extraction and KNN classifier is applied to classify input data into positive, negative and neutral classes. To validate the proposed system, performance is analyzed in terms of precision, recall and accuracy. The results of the experiment of proposed system show that it performs well as compared to the existing system which is based on SVM classifier.
{"title":"Sentiment Analysis Approach Based on N-gram and KNN Classifier","authors":"Sumandeep Kaur, Geeta Sikka, L. Awasthi","doi":"10.1109/ICSCCC.2018.8703350","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703350","url":null,"abstract":"Sentiment analysis is the approach which is designed to analyze positive, negative and neutral aspects of any text unit. In the past years, many techniques were designed for the sentiment analysis of twitter data. Based on the previous study about sentiment analysis, a novel approach is presented in this research paper for the sentiment analysis of twitter data. The proposed approach is the combination of feature extraction and classification techniques. N-gram algorithm is applied for the feature extraction and KNN classifier is applied to classify input data into positive, negative and neutral classes. To validate the proposed system, performance is analyzed in terms of precision, recall and accuracy. The results of the experiment of proposed system show that it performs well as compared to the existing system which is based on SVM classifier.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129945569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703290
Mukta, N. Gupta
Performance analysis of IEEE 802.11 wireless ad-hoc networks had attracted lots of analytical researches since last decade. A lot of analytical models have been designed considering homogeneous conditions. In the current work, we developed a mathematical model for analyzing the system throughput based on Markov’s chain incorporating the limit on contention window size and packet drop after short retry limit get exhausted. The approach is designed for non-saturated heterogeneous conditions, however could be easily adapted for saturated networks by considering probability of at least one packet waiting for transmission at the start of counter decrement as 1. Simulations are carried out in network simulator and are compared with other existing analytical approaches. The experimental outcomes verify the contribution in terms of more accurate prediction of network behavior.
{"title":"Non-Saturated Heterogeneous Mobile Ad-hoc Network Throughput Analysis Considering Max Retry Limit and Max Contention Window Size","authors":"Mukta, N. Gupta","doi":"10.1109/ICSCCC.2018.8703290","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703290","url":null,"abstract":"Performance analysis of IEEE 802.11 wireless ad-hoc networks had attracted lots of analytical researches since last decade. A lot of analytical models have been designed considering homogeneous conditions. In the current work, we developed a mathematical model for analyzing the system throughput based on Markov’s chain incorporating the limit on contention window size and packet drop after short retry limit get exhausted. The approach is designed for non-saturated heterogeneous conditions, however could be easily adapted for saturated networks by considering probability of at least one packet waiting for transmission at the start of counter decrement as 1. Simulations are carried out in network simulator and are compared with other existing analytical approaches. The experimental outcomes verify the contribution in terms of more accurate prediction of network behavior.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121413242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703363
Nipun Chhabra, M. Bala
Data Deduplication is a new way of compressing data which is helpful in efficient use of storage space and proves to be a better technique to handle duplicate data. Deduplication allows unique data copy to be uploaded to the storage originally and successive copies are provided with connecting pointer to the authentic stored copy. In cloud computing, data privacy is a significant matter to be considered. This paper surveys the prevalent deduplication strategies and evaluates their methodologies. The survey thus conducted is organized in tabular form to bring out the crisp of progression in the deduplication and its types. We have observed during this survey that in deduplication, confidentiality of data is being compromised at many levels so, it paves a path for a more secure approach in data deduplication in cloud computing.
{"title":"A Comparative Study of Data Deduplication Strategies","authors":"Nipun Chhabra, M. Bala","doi":"10.1109/ICSCCC.2018.8703363","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703363","url":null,"abstract":"Data Deduplication is a new way of compressing data which is helpful in efficient use of storage space and proves to be a better technique to handle duplicate data. Deduplication allows unique data copy to be uploaded to the storage originally and successive copies are provided with connecting pointer to the authentic stored copy. In cloud computing, data privacy is a significant matter to be considered. This paper surveys the prevalent deduplication strategies and evaluates their methodologies. The survey thus conducted is organized in tabular form to bring out the crisp of progression in the deduplication and its types. We have observed during this survey that in deduplication, confidentiality of data is being compromised at many levels so, it paves a path for a more secure approach in data deduplication in cloud computing.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703293
C. Stefanovic, S. Veljkovic, M. Stefanovic, S. Panic, S. Jovkovic
The paper analyses second order statistics of macro selection combining (SC) diversity system for radio-frequency (RF) vehicle-to-infrastructure (V2I) communications over interference limited fading channels. In particular, the macro diversity (mac-div) reception is proposed in order to diminish the impact of the composite fading(multipath and shadowing). Novel, second order statistical infinite series expressions with fast convergence,such as level crossing rate, lcrand average duration of fades, afdareobtained, analyzed and graphically presented for different RFV2I sets of parameters.
{"title":"Second Order Statistics of SIR based Macro Diversity System for V2I Communications overComposite Fading Channels","authors":"C. Stefanovic, S. Veljkovic, M. Stefanovic, S. Panic, S. Jovkovic","doi":"10.1109/ICSCCC.2018.8703293","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703293","url":null,"abstract":"The paper analyses second order statistics of macro selection combining (SC) diversity system for radio-frequency (RF) vehicle-to-infrastructure (V2I) communications over interference limited fading channels. In particular, the macro diversity (mac-div) reception is proposed in order to diminish the impact of the composite fading(multipath and shadowing). Novel, second order statistical infinite series expressions with fast convergence,such as level crossing rate, lcrand average duration of fades, afdareobtained, analyzed and graphically presented for different RFV2I sets of parameters.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126117055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703318
K. Kamble, Dipa N.Kokane, M. Ghute
In the present power system for load management the end of user help to minimize peak demands on the utility infrastructure as well as better utilization of power plant capacity. In this project we used ARM CORTEX. The load demand at every instant first calculated and then compared with the permissible maximum load value, and when the instantaneous maximum demand value is inferior than the permission limit then the operation to be considered in equilibrium state, but when the of instantaneous value of maximum demand crosses the limits of controller, ARM CORTEX comes into the picture and control the load by the phenomena of load shedding based on the priority set by the user. Multiple Demand Controller is a device design to control and meet the need of power management in industry in a conscious manner although device are on standby mode consume power so in this case if corrective action is not taken the controller switches off non-essential loads in a logical sequence.
{"title":"Multiple Load Controllers for Industry Using Arm Cortex","authors":"K. Kamble, Dipa N.Kokane, M. Ghute","doi":"10.1109/ICSCCC.2018.8703318","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703318","url":null,"abstract":"In the present power system for load management the end of user help to minimize peak demands on the utility infrastructure as well as better utilization of power plant capacity. In this project we used ARM CORTEX. The load demand at every instant first calculated and then compared with the permissible maximum load value, and when the instantaneous maximum demand value is inferior than the permission limit then the operation to be considered in equilibrium state, but when the of instantaneous value of maximum demand crosses the limits of controller, ARM CORTEX comes into the picture and control the load by the phenomena of load shedding based on the priority set by the user. Multiple Demand Controller is a device design to control and meet the need of power management in industry in a conscious manner although device are on standby mode consume power so in this case if corrective action is not taken the controller switches off non-essential loads in a logical sequence.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125973245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703265
K. Ghanshala, P. Mishra, R. Joshi, Sachin Sharma
Security has become one of the crucial issues in today’s new technological environment such as cloud computing. In recent years, research work has been done to tackle various cloud security issues. This paper proposes a light weighted and adaptable intrusion detection approach named as Behavior-based Network Intrusion Detection (BNID) at network-layer in cloud.The behavior analysis of traffic is performed at Cloud Network Node (CNN) to detect the intrusions. A security framework is proposed for deployment of BNID in cloud. The need of placement of IDS in each and every tenant virtual machine (TVM) is eliminated. BNID uses statistical learning techniques with feature selection for traffic behavior analysis and does not require the extensive monitoring of memory writes. Information Technology Operations Center (ITOC) attack dataset is used to validate our approach. BNID achieves an accuracy of 98.88% with 1.57% false positives which seems to be promising.
{"title":"BNID: A Behavior-based Network Intrusion Detection at Network-Layer in Cloud Environment","authors":"K. Ghanshala, P. Mishra, R. Joshi, Sachin Sharma","doi":"10.1109/ICSCCC.2018.8703265","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703265","url":null,"abstract":"Security has become one of the crucial issues in today’s new technological environment such as cloud computing. In recent years, research work has been done to tackle various cloud security issues. This paper proposes a light weighted and adaptable intrusion detection approach named as Behavior-based Network Intrusion Detection (BNID) at network-layer in cloud.The behavior analysis of traffic is performed at Cloud Network Node (CNN) to detect the intrusions. A security framework is proposed for deployment of BNID in cloud. The need of placement of IDS in each and every tenant virtual machine (TVM) is eliminated. BNID uses statistical learning techniques with feature selection for traffic behavior analysis and does not require the extensive monitoring of memory writes. Information Technology Operations Center (ITOC) attack dataset is used to validate our approach. BNID achieves an accuracy of 98.88% with 1.57% false positives which seems to be promising.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126048993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703294
Abhilasha Sharma, L. Awasthi
The integration of affordable wireless communication devices to vehicles have been a key component to enhance road safety. The connected vehicles aim to provide intelligent communication amongst vehicles as well as vehicles and roadside units to enhance safety. A self-organizing network of connected vehicles is termed as Vehicular Ad-Hoc NETworks (VANETs). VANETs can significantly improve road safety by sharing critical information amongst vehicles. Information dissemination plays a critical role in vehicular communication for sharing time critical safety information. In this paper, we have provided a comparative analysis of information dissemination approaches for vehicular communication. Also, we have presented the issues related to the heterogeneous vehicular communication environment.
{"title":"A Comparative Survey on Information Dissemination in Heterogeneous Vehicular Communication Networks","authors":"Abhilasha Sharma, L. Awasthi","doi":"10.1109/ICSCCC.2018.8703294","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703294","url":null,"abstract":"The integration of affordable wireless communication devices to vehicles have been a key component to enhance road safety. The connected vehicles aim to provide intelligent communication amongst vehicles as well as vehicles and roadside units to enhance safety. A self-organizing network of connected vehicles is termed as Vehicular Ad-Hoc NETworks (VANETs). VANETs can significantly improve road safety by sharing critical information amongst vehicles. Information dissemination plays a critical role in vehicular communication for sharing time critical safety information. In this paper, we have provided a comparative analysis of information dissemination approaches for vehicular communication. Also, we have presented the issues related to the heterogeneous vehicular communication environment.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128255701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703352
Stanzin Namkha, Himansu Sekhar Pattanayak
In recent years, with the growing recognition of cloud computing, data outsourcing has become a widely used service. Also, to preserve privacy and security of sensitive data, it is important to encrypt the data before outsourcing it to the cloud. Due to such requirements, reversible data hiding in encrypted image (RDH-EI) has received significant interest from the researchers. In this paper, a new technique for RDH- EI is suggested based on invertible image conversion unlike the conventional RDH-EI techniques. In this method, instead of generating and storing the encrypted image in unintelligible form (cipher formed image) which may easily attract the attention of intruders or hackers, it allows the user to convert the semantical content of original image into the semantical content of a freely selected target image of the same size. Image block mapping is performed between original and target images using mean absolute deviation and a compression technique is applied for reducing the information of image block position by grouping the blocks into two uneven proportion i.e. 0 or 1 based on the sorted mean absolute deviation value for both original and target image blocks respectively. Comparison with the existing techniques shows that the proposed method yields better results.
{"title":"Encrypted Image based Reversible Data hiding using Invertible Image Conversion","authors":"Stanzin Namkha, Himansu Sekhar Pattanayak","doi":"10.1109/ICSCCC.2018.8703352","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703352","url":null,"abstract":"In recent years, with the growing recognition of cloud computing, data outsourcing has become a widely used service. Also, to preserve privacy and security of sensitive data, it is important to encrypt the data before outsourcing it to the cloud. Due to such requirements, reversible data hiding in encrypted image (RDH-EI) has received significant interest from the researchers. In this paper, a new technique for RDH- EI is suggested based on invertible image conversion unlike the conventional RDH-EI techniques. In this method, instead of generating and storing the encrypted image in unintelligible form (cipher formed image) which may easily attract the attention of intruders or hackers, it allows the user to convert the semantical content of original image into the semantical content of a freely selected target image of the same size. Image block mapping is performed between original and target images using mean absolute deviation and a compression technique is applied for reducing the information of image block position by grouping the blocks into two uneven proportion i.e. 0 or 1 based on the sorted mean absolute deviation value for both original and target image blocks respectively. Comparison with the existing techniques shows that the proposed method yields better results.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1050 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133588441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703216
Rajinder Singh, Satish Kumar
Nowadays wireless networks are growing very rapidly. Similarly, number of users which are using wireless network are also growing daily. With the development and popularity of the wireless network, it is important for the network administrators to keep the network efficient and smooth. It is very important to monitor the network traffic. Packet sniffer tools help in network monitoring and troubleshooting the network problems. At present a number of packet sniffer tools are available in the market. In this paper a number of wireless network monitoring tools are discussed. It focuses on basics of various wireless sniffer tools and their working under different operating environment. This paper also focuses on the capability of these tools to troubleshoot wireless network problems.
{"title":"A Comparative Study of Various Wireless Network Monitoring Tools","authors":"Rajinder Singh, Satish Kumar","doi":"10.1109/ICSCCC.2018.8703216","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703216","url":null,"abstract":"Nowadays wireless networks are growing very rapidly. Similarly, number of users which are using wireless network are also growing daily. With the development and popularity of the wireless network, it is important for the network administrators to keep the network efficient and smooth. It is very important to monitor the network traffic. Packet sniffer tools help in network monitoring and troubleshooting the network problems. At present a number of packet sniffer tools are available in the market. In this paper a number of wireless network monitoring tools are discussed. It focuses on basics of various wireless sniffer tools and their working under different operating environment. This paper also focuses on the capability of these tools to troubleshoot wireless network problems.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131316406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703331
Himanshu Thapar, K. Shashvat
Stock price prediction plays an important role in finance and economics which has encouraged the interest of researchers over the years to develop better predictive models. While looking at the share market structure which involves lots of risk, time series forecasting is an effective area of research. It provides with simple and faster computations for enormous amount of data. This manuscript focuses on forecasting future values for S & P CNX NIFTY 50 using its history indices (January 2008-December 2016). The statistical methods are used to forecast future values in advance. The findings after applying several models on the data and comparing the error values, the mean error of Exponential Smoothing Model (EST) is found to be having the least error values and have a better prediction rate.
{"title":"Predictive Analysis and Forecasting of S&P CNX NIFTY50 using Stochastic Models","authors":"Himanshu Thapar, K. Shashvat","doi":"10.1109/ICSCCC.2018.8703331","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703331","url":null,"abstract":"Stock price prediction plays an important role in finance and economics which has encouraged the interest of researchers over the years to develop better predictive models. While looking at the share market structure which involves lots of risk, time series forecasting is an effective area of research. It provides with simple and faster computations for enormous amount of data. This manuscript focuses on forecasting future values for S & P CNX NIFTY 50 using its history indices (January 2008-December 2016). The statistical methods are used to forecast future values in advance. The findings after applying several models on the data and comparing the error values, the mean error of Exponential Smoothing Model (EST) is found to be having the least error values and have a better prediction rate.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133243437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}