首页 > 最新文献

2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)最新文献

英文 中文
Sentiment Analysis Approach Based on N-gram and KNN Classifier 基于N-gram和KNN分类器的情感分析方法
Sumandeep Kaur, Geeta Sikka, L. Awasthi
Sentiment analysis is the approach which is designed to analyze positive, negative and neutral aspects of any text unit. In the past years, many techniques were designed for the sentiment analysis of twitter data. Based on the previous study about sentiment analysis, a novel approach is presented in this research paper for the sentiment analysis of twitter data. The proposed approach is the combination of feature extraction and classification techniques. N-gram algorithm is applied for the feature extraction and KNN classifier is applied to classify input data into positive, negative and neutral classes. To validate the proposed system, performance is analyzed in terms of precision, recall and accuracy. The results of the experiment of proposed system show that it performs well as compared to the existing system which is based on SVM classifier.
情感分析是一种分析任何文本单元的积极、消极和中性方面的方法。在过去的几年里,许多技术被设计用于twitter数据的情感分析。本文在前人情感分析研究的基础上,提出了一种新的twitter数据情感分析方法。该方法是特征提取和分类技术的结合。采用N-gram算法进行特征提取,采用KNN分类器将输入数据分为正类、负类和中性类。为了验证该系统的有效性,从查全率、查全率和查准率三个方面进行了性能分析。实验结果表明,与现有的基于支持向量机分类器的系统相比,该系统具有良好的性能。
{"title":"Sentiment Analysis Approach Based on N-gram and KNN Classifier","authors":"Sumandeep Kaur, Geeta Sikka, L. Awasthi","doi":"10.1109/ICSCCC.2018.8703350","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703350","url":null,"abstract":"Sentiment analysis is the approach which is designed to analyze positive, negative and neutral aspects of any text unit. In the past years, many techniques were designed for the sentiment analysis of twitter data. Based on the previous study about sentiment analysis, a novel approach is presented in this research paper for the sentiment analysis of twitter data. The proposed approach is the combination of feature extraction and classification techniques. N-gram algorithm is applied for the feature extraction and KNN classifier is applied to classify input data into positive, negative and neutral classes. To validate the proposed system, performance is analyzed in terms of precision, recall and accuracy. The results of the experiment of proposed system show that it performs well as compared to the existing system which is based on SVM classifier.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129945569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Non-Saturated Heterogeneous Mobile Ad-hoc Network Throughput Analysis Considering Max Retry Limit and Max Contention Window Size 考虑最大重试限制和最大争用窗口大小的非饱和异构移动自组网吞吐量分析
Mukta, N. Gupta
Performance analysis of IEEE 802.11 wireless ad-hoc networks had attracted lots of analytical researches since last decade. A lot of analytical models have been designed considering homogeneous conditions. In the current work, we developed a mathematical model for analyzing the system throughput based on Markov’s chain incorporating the limit on contention window size and packet drop after short retry limit get exhausted. The approach is designed for non-saturated heterogeneous conditions, however could be easily adapted for saturated networks by considering probability of at least one packet waiting for transmission at the start of counter decrement as 1. Simulations are carried out in network simulator and are compared with other existing analytical approaches. The experimental outcomes verify the contribution in terms of more accurate prediction of network behavior.
近十年来,IEEE 802.11无线自组织网络的性能分析引起了大量的分析研究。许多分析模型都是在齐次条件下设计的。在当前的工作中,我们建立了一个基于马尔可夫链的数学模型来分析系统吞吐量,该模型考虑了竞争窗口大小的限制和短重试限制耗尽后的丢包。该方法是为非饱和异构条件设计的,但可以很容易地适应于饱和网络,通过考虑在计数器递减开始时至少有一个数据包等待传输的概率为1。在网络模拟器上进行了仿真,并与现有的分析方法进行了比较。实验结果验证了在更准确地预测网络行为方面的贡献。
{"title":"Non-Saturated Heterogeneous Mobile Ad-hoc Network Throughput Analysis Considering Max Retry Limit and Max Contention Window Size","authors":"Mukta, N. Gupta","doi":"10.1109/ICSCCC.2018.8703290","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703290","url":null,"abstract":"Performance analysis of IEEE 802.11 wireless ad-hoc networks had attracted lots of analytical researches since last decade. A lot of analytical models have been designed considering homogeneous conditions. In the current work, we developed a mathematical model for analyzing the system throughput based on Markov’s chain incorporating the limit on contention window size and packet drop after short retry limit get exhausted. The approach is designed for non-saturated heterogeneous conditions, however could be easily adapted for saturated networks by considering probability of at least one packet waiting for transmission at the start of counter decrement as 1. Simulations are carried out in network simulator and are compared with other existing analytical approaches. The experimental outcomes verify the contribution in terms of more accurate prediction of network behavior.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121413242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study of Data Deduplication Strategies 重复数据删除策略的比较研究
Nipun Chhabra, M. Bala
Data Deduplication is a new way of compressing data which is helpful in efficient use of storage space and proves to be a better technique to handle duplicate data. Deduplication allows unique data copy to be uploaded to the storage originally and successive copies are provided with connecting pointer to the authentic stored copy. In cloud computing, data privacy is a significant matter to be considered. This paper surveys the prevalent deduplication strategies and evaluates their methodologies. The survey thus conducted is organized in tabular form to bring out the crisp of progression in the deduplication and its types. We have observed during this survey that in deduplication, confidentiality of data is being compromised at many levels so, it paves a path for a more secure approach in data deduplication in cloud computing.
重复数据删除是一种新的数据压缩方法,它有助于有效地利用存储空间,是一种较好的处理重复数据的技术。重复数据删除允许将唯一的数据副本上传到原始存储,并为后续副本提供指向真实存储副本的连接指针。在云计算中,数据隐私是一个需要考虑的重要问题。本文综述了流行的重复数据删除策略,并对其方法进行了评价。这样进行的调查以表格形式组织,以显示重复数据删除及其类型的进展。我们在这次调查中发现,在重复数据删除中,数据的机密性在许多层面上受到了损害,因此,它为云计算中更安全的重复数据删除方法铺平了道路。
{"title":"A Comparative Study of Data Deduplication Strategies","authors":"Nipun Chhabra, M. Bala","doi":"10.1109/ICSCCC.2018.8703363","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703363","url":null,"abstract":"Data Deduplication is a new way of compressing data which is helpful in efficient use of storage space and proves to be a better technique to handle duplicate data. Deduplication allows unique data copy to be uploaded to the storage originally and successive copies are provided with connecting pointer to the authentic stored copy. In cloud computing, data privacy is a significant matter to be considered. This paper surveys the prevalent deduplication strategies and evaluates their methodologies. The survey thus conducted is organized in tabular form to bring out the crisp of progression in the deduplication and its types. We have observed during this survey that in deduplication, confidentiality of data is being compromised at many levels so, it paves a path for a more secure approach in data deduplication in cloud computing.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Second Order Statistics of SIR based Macro Diversity System for V2I Communications overComposite Fading Channels 基于SIR的V2I通信宏分集系统的二阶统计量
C. Stefanovic, S. Veljkovic, M. Stefanovic, S. Panic, S. Jovkovic
The paper analyses second order statistics of macro selection combining (SC) diversity system for radio-frequency (RF) vehicle-to-infrastructure (V2I) communications over interference limited fading channels. In particular, the macro diversity (mac-div) reception is proposed in order to diminish the impact of the composite fading(multipath and shadowing). Novel, second order statistical infinite series expressions with fast convergence,such as level crossing rate, lcrand average duration of fades, afdareobtained, analyzed and graphically presented for different RFV2I sets of parameters.
本文分析了车辆对基础设施(V2I)在干扰受限衰落信道下的宏观选择组合(SC)分集系统的二阶统计量。特别地,为了减少复合衰落(多径和阴影)的影响,提出了宏分集(mac-div)接收。针对不同的RFV2I参数集,得到了具有快速收敛性的平交率、渐近平均持续时间等新颖的二阶统计无穷级数表达式,并对其进行了分析和图解。
{"title":"Second Order Statistics of SIR based Macro Diversity System for V2I Communications overComposite Fading Channels","authors":"C. Stefanovic, S. Veljkovic, M. Stefanovic, S. Panic, S. Jovkovic","doi":"10.1109/ICSCCC.2018.8703293","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703293","url":null,"abstract":"The paper analyses second order statistics of macro selection combining (SC) diversity system for radio-frequency (RF) vehicle-to-infrastructure (V2I) communications over interference limited fading channels. In particular, the macro diversity (mac-div) reception is proposed in order to diminish the impact of the composite fading(multipath and shadowing). Novel, second order statistical infinite series expressions with fast convergence,such as level crossing rate, lcrand average duration of fades, afdareobtained, analyzed and graphically presented for different RFV2I sets of parameters.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126117055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Multiple Load Controllers for Industry Using Arm Cortex 使用Arm Cortex的工业多负载控制器
K. Kamble, Dipa N.Kokane, M. Ghute
In the present power system for load management the end of user help to minimize peak demands on the utility infrastructure as well as better utilization of power plant capacity. In this project we used ARM CORTEX. The load demand at every instant first calculated and then compared with the permissible maximum load value, and when the instantaneous maximum demand value is inferior than the permission limit then the operation to be considered in equilibrium state, but when the of instantaneous value of maximum demand crosses the limits of controller, ARM CORTEX comes into the picture and control the load by the phenomena of load shedding based on the priority set by the user. Multiple Demand Controller is a device design to control and meet the need of power management in industry in a conscious manner although device are on standby mode consume power so in this case if corrective action is not taken the controller switches off non-essential loads in a logical sequence.
在目前的电力系统负荷管理中,终端用户帮助减少对公用事业基础设施的高峰需求,并更好地利用发电厂的容量。在这个项目中,我们使用ARM CORTEX。首先计算每个时刻的负载需求,然后与允许的最大负载值进行比较,当瞬时最大需求值低于允许的最大负载值时,则考虑运行处于平衡状态,但当最大需求的瞬时值超过控制器的限制时,ARM CORTEX就会出现,并根据用户设置的优先级通过减载现象来控制负载。多需求控制器是一种以有意识的方式控制和满足工业电源管理需求的设备,尽管设备处于待机模式会消耗电力,因此在这种情况下,如果不采取纠正措施,控制器将按逻辑顺序关闭非必要的负载。
{"title":"Multiple Load Controllers for Industry Using Arm Cortex","authors":"K. Kamble, Dipa N.Kokane, M. Ghute","doi":"10.1109/ICSCCC.2018.8703318","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703318","url":null,"abstract":"In the present power system for load management the end of user help to minimize peak demands on the utility infrastructure as well as better utilization of power plant capacity. In this project we used ARM CORTEX. The load demand at every instant first calculated and then compared with the permissible maximum load value, and when the instantaneous maximum demand value is inferior than the permission limit then the operation to be considered in equilibrium state, but when the of instantaneous value of maximum demand crosses the limits of controller, ARM CORTEX comes into the picture and control the load by the phenomena of load shedding based on the priority set by the user. Multiple Demand Controller is a device design to control and meet the need of power management in industry in a conscious manner although device are on standby mode consume power so in this case if corrective action is not taken the controller switches off non-essential loads in a logical sequence.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125973245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BNID: A Behavior-based Network Intrusion Detection at Network-Layer in Cloud Environment 基于行为的云环境下网络层入侵检测方法
K. Ghanshala, P. Mishra, R. Joshi, Sachin Sharma
Security has become one of the crucial issues in today’s new technological environment such as cloud computing. In recent years, research work has been done to tackle various cloud security issues. This paper proposes a light weighted and adaptable intrusion detection approach named as Behavior-based Network Intrusion Detection (BNID) at network-layer in cloud.The behavior analysis of traffic is performed at Cloud Network Node (CNN) to detect the intrusions. A security framework is proposed for deployment of BNID in cloud. The need of placement of IDS in each and every tenant virtual machine (TVM) is eliminated. BNID uses statistical learning techniques with feature selection for traffic behavior analysis and does not require the extensive monitoring of memory writes. Information Technology Operations Center (ITOC) attack dataset is used to validate our approach. BNID achieves an accuracy of 98.88% with 1.57% false positives which seems to be promising.
在云计算等新技术环境下,安全已成为关键问题之一。近年来,针对各种云安全问题的研究工作已经完成。本文提出了一种轻量级、适应性强的云网络层入侵检测方法——基于行为的网络入侵检测(bid)。在云网络节点(CNN)上执行流量行为分析以检测入侵。提出了在云中部署bid的安全框架。无需在每个租户虚拟机(TVM)中放置IDS。bid使用统计学习技术和特征选择来进行流量行为分析,并且不需要对内存写入进行大量监控。使用信息技术运营中心(ITOC)攻击数据集验证我们的方法。bid的准确率为98.88%,假阳性率为1.57%,这似乎是有希望的。
{"title":"BNID: A Behavior-based Network Intrusion Detection at Network-Layer in Cloud Environment","authors":"K. Ghanshala, P. Mishra, R. Joshi, Sachin Sharma","doi":"10.1109/ICSCCC.2018.8703265","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703265","url":null,"abstract":"Security has become one of the crucial issues in today’s new technological environment such as cloud computing. In recent years, research work has been done to tackle various cloud security issues. This paper proposes a light weighted and adaptable intrusion detection approach named as Behavior-based Network Intrusion Detection (BNID) at network-layer in cloud.The behavior analysis of traffic is performed at Cloud Network Node (CNN) to detect the intrusions. A security framework is proposed for deployment of BNID in cloud. The need of placement of IDS in each and every tenant virtual machine (TVM) is eliminated. BNID uses statistical learning techniques with feature selection for traffic behavior analysis and does not require the extensive monitoring of memory writes. Information Technology Operations Center (ITOC) attack dataset is used to validate our approach. BNID achieves an accuracy of 98.88% with 1.57% false positives which seems to be promising.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126048993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Comparative Survey on Information Dissemination in Heterogeneous Vehicular Communication Networks 异构车载通信网络中信息传播的比较研究
Abhilasha Sharma, L. Awasthi
The integration of affordable wireless communication devices to vehicles have been a key component to enhance road safety. The connected vehicles aim to provide intelligent communication amongst vehicles as well as vehicles and roadside units to enhance safety. A self-organizing network of connected vehicles is termed as Vehicular Ad-Hoc NETworks (VANETs). VANETs can significantly improve road safety by sharing critical information amongst vehicles. Information dissemination plays a critical role in vehicular communication for sharing time critical safety information. In this paper, we have provided a comparative analysis of information dissemination approaches for vehicular communication. Also, we have presented the issues related to the heterogeneous vehicular communication environment.
将可负担得起的无线通信设备集成到车辆上已成为提高道路安全的关键组成部分。联网车辆旨在提供车辆之间以及车辆与路边单位之间的智能通信,以提高安全性。连接车辆的自组织网络称为车辆自组织网络(vanet)。VANETs可以通过在车辆之间共享关键信息来显著改善道路安全。信息传播在车辆通信中起着至关重要的作用,实现关键安全信息的共享。本文对车载通信的信息传播方式进行了比较分析。此外,我们还提出了与异构车辆通信环境相关的问题。
{"title":"A Comparative Survey on Information Dissemination in Heterogeneous Vehicular Communication Networks","authors":"Abhilasha Sharma, L. Awasthi","doi":"10.1109/ICSCCC.2018.8703294","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703294","url":null,"abstract":"The integration of affordable wireless communication devices to vehicles have been a key component to enhance road safety. The connected vehicles aim to provide intelligent communication amongst vehicles as well as vehicles and roadside units to enhance safety. A self-organizing network of connected vehicles is termed as Vehicular Ad-Hoc NETworks (VANETs). VANETs can significantly improve road safety by sharing critical information amongst vehicles. Information dissemination plays a critical role in vehicular communication for sharing time critical safety information. In this paper, we have provided a comparative analysis of information dissemination approaches for vehicular communication. Also, we have presented the issues related to the heterogeneous vehicular communication environment.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128255701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Encrypted Image based Reversible Data hiding using Invertible Image Conversion 基于加密图像的可逆数据隐藏使用可逆图像转换
Stanzin Namkha, Himansu Sekhar Pattanayak
In recent years, with the growing recognition of cloud computing, data outsourcing has become a widely used service. Also, to preserve privacy and security of sensitive data, it is important to encrypt the data before outsourcing it to the cloud. Due to such requirements, reversible data hiding in encrypted image (RDH-EI) has received significant interest from the researchers. In this paper, a new technique for RDH- EI is suggested based on invertible image conversion unlike the conventional RDH-EI techniques. In this method, instead of generating and storing the encrypted image in unintelligible form (cipher formed image) which may easily attract the attention of intruders or hackers, it allows the user to convert the semantical content of original image into the semantical content of a freely selected target image of the same size. Image block mapping is performed between original and target images using mean absolute deviation and a compression technique is applied for reducing the information of image block position by grouping the blocks into two uneven proportion i.e. 0 or 1 based on the sorted mean absolute deviation value for both original and target image blocks respectively. Comparison with the existing techniques shows that the proposed method yields better results.
近年来,随着人们对云计算的认识不断加深,数据外包已经成为一种被广泛使用的服务。此外,为了保护敏感数据的隐私和安全性,在将数据外包到云之前对其进行加密非常重要。由于这些需求,加密图像中的可逆数据隐藏(RDH-EI)受到了研究人员的极大兴趣。本文提出了一种与传统RDH-EI技术不同的基于可逆图像转换的RDH-EI新技术。该方法不生成和存储容易引起入侵者或黑客注意的难以理解的加密图像(密码生成图像),而是允许用户将原始图像的语义内容转换为自由选择的相同大小的目标图像的语义内容。利用平均绝对偏差在原始图像和目标图像之间进行图像块映射,并根据原始图像块和目标图像块的平均绝对偏差值排序后,分别将图像块分组为0或1两个不均匀比例,采用压缩技术减少图像块位置信息。与现有方法的比较表明,该方法具有较好的效果。
{"title":"Encrypted Image based Reversible Data hiding using Invertible Image Conversion","authors":"Stanzin Namkha, Himansu Sekhar Pattanayak","doi":"10.1109/ICSCCC.2018.8703352","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703352","url":null,"abstract":"In recent years, with the growing recognition of cloud computing, data outsourcing has become a widely used service. Also, to preserve privacy and security of sensitive data, it is important to encrypt the data before outsourcing it to the cloud. Due to such requirements, reversible data hiding in encrypted image (RDH-EI) has received significant interest from the researchers. In this paper, a new technique for RDH- EI is suggested based on invertible image conversion unlike the conventional RDH-EI techniques. In this method, instead of generating and storing the encrypted image in unintelligible form (cipher formed image) which may easily attract the attention of intruders or hackers, it allows the user to convert the semantical content of original image into the semantical content of a freely selected target image of the same size. Image block mapping is performed between original and target images using mean absolute deviation and a compression technique is applied for reducing the information of image block position by grouping the blocks into two uneven proportion i.e. 0 or 1 based on the sorted mean absolute deviation value for both original and target image blocks respectively. Comparison with the existing techniques shows that the proposed method yields better results.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1050 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133588441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study of Various Wireless Network Monitoring Tools 各种无线网络监控工具的比较研究
Rajinder Singh, Satish Kumar
Nowadays wireless networks are growing very rapidly. Similarly, number of users which are using wireless network are also growing daily. With the development and popularity of the wireless network, it is important for the network administrators to keep the network efficient and smooth. It is very important to monitor the network traffic. Packet sniffer tools help in network monitoring and troubleshooting the network problems. At present a number of packet sniffer tools are available in the market. In this paper a number of wireless network monitoring tools are discussed. It focuses on basics of various wireless sniffer tools and their working under different operating environment. This paper also focuses on the capability of these tools to troubleshoot wireless network problems.
现在无线网络发展非常迅速。同样,使用无线网络的用户数量也在与日俱增。随着无线网络的发展和普及,如何保证网络的高效和畅通对网络管理员来说是非常重要的。监控网络流量是非常重要的。包嗅探工具有助于网络监控和排除网络问题。目前市场上有许多数据包嗅探工具。本文讨论了一些无线网络监控工具。重点介绍了各种无线嗅探工具的基本原理及其在不同操作环境下的工作原理。本文还着重介绍了这些工具在解决无线网络问题方面的能力。
{"title":"A Comparative Study of Various Wireless Network Monitoring Tools","authors":"Rajinder Singh, Satish Kumar","doi":"10.1109/ICSCCC.2018.8703216","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703216","url":null,"abstract":"Nowadays wireless networks are growing very rapidly. Similarly, number of users which are using wireless network are also growing daily. With the development and popularity of the wireless network, it is important for the network administrators to keep the network efficient and smooth. It is very important to monitor the network traffic. Packet sniffer tools help in network monitoring and troubleshooting the network problems. At present a number of packet sniffer tools are available in the market. In this paper a number of wireless network monitoring tools are discussed. It focuses on basics of various wireless sniffer tools and their working under different operating environment. This paper also focuses on the capability of these tools to troubleshoot wireless network problems.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131316406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Predictive Analysis and Forecasting of S&P CNX NIFTY50 using Stochastic Models 基于随机模型的S&P CNX NIFTY50预测分析与预测
Himanshu Thapar, K. Shashvat
Stock price prediction plays an important role in finance and economics which has encouraged the interest of researchers over the years to develop better predictive models. While looking at the share market structure which involves lots of risk, time series forecasting is an effective area of research. It provides with simple and faster computations for enormous amount of data. This manuscript focuses on forecasting future values for S & P CNX NIFTY 50 using its history indices (January 2008-December 2016). The statistical methods are used to forecast future values in advance. The findings after applying several models on the data and comparing the error values, the mean error of Exponential Smoothing Model (EST) is found to be having the least error values and have a better prediction rate.
股票价格预测在金融和经济学中扮演着重要的角色,这激发了研究人员多年来对开发更好的预测模型的兴趣。对于涉及大量风险的股票市场结构,时间序列预测是一个有效的研究领域。它为海量数据提供了简单而快速的计算。本文着重于使用其历史指数(2008年1月至2016年12月)预测标普CNX NIFTY 50的未来价值。利用统计方法提前预测未来的价值。结果表明,指数平滑模型(Exponential Smoothing Model, EST)的平均误差值最小,预测率较好。
{"title":"Predictive Analysis and Forecasting of S&P CNX NIFTY50 using Stochastic Models","authors":"Himanshu Thapar, K. Shashvat","doi":"10.1109/ICSCCC.2018.8703331","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703331","url":null,"abstract":"Stock price prediction plays an important role in finance and economics which has encouraged the interest of researchers over the years to develop better predictive models. While looking at the share market structure which involves lots of risk, time series forecasting is an effective area of research. It provides with simple and faster computations for enormous amount of data. This manuscript focuses on forecasting future values for S & P CNX NIFTY 50 using its history indices (January 2008-December 2016). The statistical methods are used to forecast future values in advance. The findings after applying several models on the data and comparing the error values, the mean error of Exponential Smoothing Model (EST) is found to be having the least error values and have a better prediction rate.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133243437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1