首页 > 最新文献

2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)最新文献

英文 中文
3E-VMC: An Experimental Energy Efficient Model for VMs scheduling over Cloud 3E-VMC:一种基于云的虚拟机调度节能实验模型
Pushkar Pete, Kunal Patange, M. Wankhade, Arpitrama Chatterjee, M. Kurhekar, Krishan Kumar
In Cloud computing era, computing resources are being used on-demand via network. It consumes a huge amount of energy, which does not measure easily with computational use of resources. Therefore, energy consumption in data centers becomes the most essential concern to address. Thus, this model highlights an efficient energy technique to address the concern by migrating the Virtual Machines (VMs) onto the servers appropriately. An algorithm has been proposed to satisfy the user requests by launching the VMs efficiently. A experimental study is made on the total amount of energy saved by our proposed 3E-VMC model against the state-of-the-art techniques. Theoretically, the maximum amount of saved energy estimated by the proposed 3E-VMC model is 75%, while it has been experimentally verified as 54%.
在云计算时代,计算资源通过网络按需使用。它消耗了大量的能量,这是不容易测量的计算使用资源。因此,数据中心的能源消耗成为最需要解决的问题。因此,该模型强调了一种有效的能源技术,通过将虚拟机(vm)适当地迁移到服务器上来解决这个问题。提出了一种通过高效启动虚拟机来满足用户请求的算法。我们提出的3E-VMC模型与最先进的技术进行了节能总量的实验研究。理论上,所提出的3E-VMC模型估计的最大节能量为75%,实验验证的最大节能量为54%。
{"title":"3E-VMC: An Experimental Energy Efficient Model for VMs scheduling over Cloud","authors":"Pushkar Pete, Kunal Patange, M. Wankhade, Arpitrama Chatterjee, M. Kurhekar, Krishan Kumar","doi":"10.1109/ICSCCC.2018.8703358","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703358","url":null,"abstract":"In Cloud computing era, computing resources are being used on-demand via network. It consumes a huge amount of energy, which does not measure easily with computational use of resources. Therefore, energy consumption in data centers becomes the most essential concern to address. Thus, this model highlights an efficient energy technique to address the concern by migrating the Virtual Machines (VMs) onto the servers appropriately. An algorithm has been proposed to satisfy the user requests by launching the VMs efficiently. A experimental study is made on the total amount of energy saved by our proposed 3E-VMC model against the state-of-the-art techniques. Theoretically, the maximum amount of saved energy estimated by the proposed 3E-VMC model is 75%, while it has been experimentally verified as 54%.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115900281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Assessment of Message Queue Telemetry and Transport (MQTT) protocol with Symmetric Encryption 具有对称加密的消息队列遥测和传输(MQTT)协议的评估
Atul Oak, R. Daruwala
Internet of Things - IoT is a data communication network used to share information between two devices. IoT is considered as a layered system with different protocols used to communicate information than the traditional internet. Message Queue Telemetry and Transport (MQTT) is one of the most common application layer protocols used for sharing information in IoT applications. MQTT protocol does not have any inbuilt mechanism to secure the information that is communicated between the two devices. MQTT protocol depends on lower layers for the security of information that is communicated. Our research aims at improving the security feature of MQTT protocol. Some experimental part of our research is been presented in this paper to measure the performance of MQTT protocol with standard encryption algorithms.
物联网- IoT是一种用于在两个设备之间共享信息的数据通信网络。物联网被认为是一个具有不同协议的分层系统,用于与传统互联网通信信息。消息队列遥测和传输(MQTT)是物联网应用中用于共享信息的最常见应用层协议之一。MQTT协议没有任何内置机制来保护两个设备之间通信的信息。MQTT协议依赖于较低的层来保证通信信息的安全性。我们的研究旨在改进MQTT协议的安全特性。本文介绍了采用标准加密算法对MQTT协议进行性能测试的实验研究。
{"title":"Assessment of Message Queue Telemetry and Transport (MQTT) protocol with Symmetric Encryption","authors":"Atul Oak, R. Daruwala","doi":"10.1109/ICSCCC.2018.8703314","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703314","url":null,"abstract":"Internet of Things - IoT is a data communication network used to share information between two devices. IoT is considered as a layered system with different protocols used to communicate information than the traditional internet. Message Queue Telemetry and Transport (MQTT) is one of the most common application layer protocols used for sharing information in IoT applications. MQTT protocol does not have any inbuilt mechanism to secure the information that is communicated between the two devices. MQTT protocol depends on lower layers for the security of information that is communicated. Our research aims at improving the security feature of MQTT protocol. Some experimental part of our research is been presented in this paper to measure the performance of MQTT protocol with standard encryption algorithms.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116436405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Jaya algorithm using weighted sum approach for the multi-objective next release problem Jaya算法采用加权和法求解多目标下一个放行问题
Pavitdeep Singh, M. Bhamrah, Jatinder Kaur
Software requirements gathering and selection is primarily the first and most important step during in the development of a software product. These new set of requirements drives the next set of functionalities/ features for the product. However, there is always a necessity to select the right set of requirement which fulfills the customer satisfaction and deliver these changes within the defined budget limits. The complexity of selecting the new requirements increases with the inter-dependency of various requirements defined. In this paper, we use a Jaya based optimization technique using weighted sum approach to solve the multi-objective next release problem (MONRP). In this approach, classic bi-objective NRP comprising the conflicting objectives e.g. maximizing global satisfaction and minimizing the cost (total development effort) are reduced to single objective by assigning different weights to each objective. The proposed technique has been successfully applied to a public dataset instance provided in various literature of NRP. The simulation results are compared with various well known variants of GDE3 algorithm for solution accuracy.
软件需求的收集和选择主要是软件产品开发过程中第一步也是最重要的一步。这些新的需求集驱动了产品的下一组功能/特性。然而,总是有必要选择满足客户满意度的正确需求集,并在定义的预算限制内交付这些更改。选择新需求的复杂性随着定义的各种需求的相互依赖性而增加。本文采用一种基于Jaya的优化技术,利用加权和方法求解多目标下一个发布问题。在这种方法中,经典的双目标NRP包括冲突的目标,例如最大化整体满意度和最小化成本(总开发工作量),通过为每个目标分配不同的权重,减少到单个目标。所提出的技术已成功应用于NRP的各种文献中提供的公共数据集实例。仿真结果与各种已知的GDE3算法的解精度进行了比较。
{"title":"Jaya algorithm using weighted sum approach for the multi-objective next release problem","authors":"Pavitdeep Singh, M. Bhamrah, Jatinder Kaur","doi":"10.1109/ICSCCC.2018.8703315","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703315","url":null,"abstract":"Software requirements gathering and selection is primarily the first and most important step during in the development of a software product. These new set of requirements drives the next set of functionalities/ features for the product. However, there is always a necessity to select the right set of requirement which fulfills the customer satisfaction and deliver these changes within the defined budget limits. The complexity of selecting the new requirements increases with the inter-dependency of various requirements defined. In this paper, we use a Jaya based optimization technique using weighted sum approach to solve the multi-objective next release problem (MONRP). In this approach, classic bi-objective NRP comprising the conflicting objectives e.g. maximizing global satisfaction and minimizing the cost (total development effort) are reduced to single objective by assigning different weights to each objective. The proposed technique has been successfully applied to a public dataset instance provided in various literature of NRP. The simulation results are compared with various well known variants of GDE3 algorithm for solution accuracy.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131599553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analyzing the Structures of Clusters in Multi-layer Biological Networks 多层生物网络中簇的结构分析
R. Mittal, M. Bhatia
Nowadays many biological problems are structured in the form of networks called biological networks. Formation of such large networks helps us in analyzing biological systems extensively and effectively. Although the size and structure of biological networks are very complex and it is difficult to interpret such networks without further processing. In this paper, we discuss the analysis of such systems by forming clusters and analyze the whole arrangement using different types of clusters formed in the network. A cluster is a highly connected group of nodes of the net and cluster analysis is one of the prominent features used for the analysis of the biological systems. Here, we present our study by applying some popular clustering algorithms on multi-layer biological networks to see the changes in the shape, size, and structure of the clusters when multiple interactions among biological entities are included and the behavior of objects in such networks.
现在,许多生物学问题都以网络的形式被组织起来,称为生物网络。这种大型网络的形成有助于我们广泛有效地分析生物系统。尽管生物网络的大小和结构非常复杂,如果不进行进一步的处理,很难对这些网络进行解释。本文讨论了通过形成集群来分析这类系统,并利用网络中形成的不同类型的集群来分析整个系统的排列。聚类是网络中高度连接的一组节点,聚类分析是用于分析生物系统的突出特征之一。在这里,我们通过在多层生物网络上应用一些流行的聚类算法来展示我们的研究,以观察当包含生物实体之间的多种相互作用以及此类网络中对象的行为时,聚类的形状,大小和结构的变化。
{"title":"Analyzing the Structures of Clusters in Multi-layer Biological Networks","authors":"R. Mittal, M. Bhatia","doi":"10.1109/ICSCCC.2018.8703271","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703271","url":null,"abstract":"Nowadays many biological problems are structured in the form of networks called biological networks. Formation of such large networks helps us in analyzing biological systems extensively and effectively. Although the size and structure of biological networks are very complex and it is difficult to interpret such networks without further processing. In this paper, we discuss the analysis of such systems by forming clusters and analyze the whole arrangement using different types of clusters formed in the network. A cluster is a highly connected group of nodes of the net and cluster analysis is one of the prominent features used for the analysis of the biological systems. Here, we present our study by applying some popular clustering algorithms on multi-layer biological networks to see the changes in the shape, size, and structure of the clusters when multiple interactions among biological entities are included and the behavior of objects in such networks.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128785789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Significant Machine Learning and Statistical Concepts and their Applications in Social Computing 重要的机器学习和统计概念及其在社会计算中的应用
Nishtha Arora, G. Gabrani
The field of Social Computing has tremendous potential to explore the value within the data generated from various social media platforms like Facebook, Instagram, Twitter, Snapchat, LinkedIn etc. Due to the growing volume of this data, it has become difficult to gain insights with the help of traditional techniques. So machine learning techniques have become the bread and butter of researchers working in this area as they can be used to analyze large volumes of data. The purpose of this paper is to get introduced to some important research problems in the area of social computing, the machine learning and statistical methods adopted by the researchers worldwide to address those problems and the research gaps that still need to be addressed. It also emphasizes on an important problem on Twitter platform: The classification of a tweet as fake or real.
社交计算领域具有巨大的潜力,可以探索各种社交媒体平台(如Facebook、Instagram、Twitter、Snapchat、LinkedIn等)产生的数据的价值。由于这些数据的数量不断增长,通过传统技术的帮助很难获得洞察力。因此,机器学习技术已经成为研究人员在这个领域工作的面包和黄油,因为它们可以用来分析大量数据。本文的目的是介绍社会计算领域的一些重要研究问题,世界范围内研究人员采用的机器学习和统计方法来解决这些问题,以及仍然需要解决的研究差距。它还强调了推特平台上的一个重要问题:推文的真假分类。
{"title":"Significant Machine Learning and Statistical Concepts and their Applications in Social Computing","authors":"Nishtha Arora, G. Gabrani","doi":"10.1109/ICSCCC.2018.8703329","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703329","url":null,"abstract":"The field of Social Computing has tremendous potential to explore the value within the data generated from various social media platforms like Facebook, Instagram, Twitter, Snapchat, LinkedIn etc. Due to the growing volume of this data, it has become difficult to gain insights with the help of traditional techniques. So machine learning techniques have become the bread and butter of researchers working in this area as they can be used to analyze large volumes of data. The purpose of this paper is to get introduced to some important research problems in the area of social computing, the machine learning and statistical methods adopted by the researchers worldwide to address those problems and the research gaps that still need to be addressed. It also emphasizes on an important problem on Twitter platform: The classification of a tweet as fake or real.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125525313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Morphologically Robust Discrete Cosine Transform based Lossless ECG Compression with Access Control Quality 基于形态学鲁棒离散余弦变换的访问控制质量无损心电压缩
Neetika Soni, I. Saini, Butta Singh
In the era of e-healthcare paradigm, the demand of storage memory has increased manifolds. In order to combat with the bourgeoning memory and bandwidth requirements, compression techniques are employed. In this paper, Discrete Cosine Transform based lossless ECG compression approach is proposed. The method exploits only the non-QRS regions of ECG signal for compression and hence avoids any distortion in its clinically significant features. Moreover, in this approach the chaotically selected DCT coefficients are employed for compression. Therefore at receiver, only the users having the correct key can decompress the signal. The proposed method is applied on all 48 records of MIT-BIH arrhythmia database of 2 mins duration with different compression rates and evaluated the performance in terms of PRD and CR. The comparison is made with the state of the art techniques in terms of quality score and found that the proposed method yields excellent results.
在电子医疗范式时代,存储存储器的需求成倍增加。为了应对不断增长的内存和带宽需求,采用了压缩技术。提出了一种基于离散余弦变换的心电无损压缩方法。该方法仅利用心电信号的非qrs区域进行压缩,从而避免了其临床重要特征的任何失真。此外,该方法采用混沌选择的离散余弦变换系数进行压缩。因此,在接收端,只有拥有正确密钥的用户才能解压缩信号。将所提出的方法应用于MIT-BIH心律失常数据库中48条不同压缩率的2分钟记录,并对PRD和CR进行了评价,并与目前最先进的技术在质量评分方面进行了比较,发现所提出的方法取得了很好的效果。
{"title":"Morphologically Robust Discrete Cosine Transform based Lossless ECG Compression with Access Control Quality","authors":"Neetika Soni, I. Saini, Butta Singh","doi":"10.1109/ICSCCC.2018.8703306","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703306","url":null,"abstract":"In the era of e-healthcare paradigm, the demand of storage memory has increased manifolds. In order to combat with the bourgeoning memory and bandwidth requirements, compression techniques are employed. In this paper, Discrete Cosine Transform based lossless ECG compression approach is proposed. The method exploits only the non-QRS regions of ECG signal for compression and hence avoids any distortion in its clinically significant features. Moreover, in this approach the chaotically selected DCT coefficients are employed for compression. Therefore at receiver, only the users having the correct key can decompress the signal. The proposed method is applied on all 48 records of MIT-BIH arrhythmia database of 2 mins duration with different compression rates and evaluated the performance in terms of PRD and CR. The comparison is made with the state of the art techniques in terms of quality score and found that the proposed method yields excellent results.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129577239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ICSCCC 2018 Copyright Page ICSCCC 2018版权专页
{"title":"ICSCCC 2018 Copyright Page","authors":"","doi":"10.1109/icsccc.2018.8703288","DOIUrl":"https://doi.org/10.1109/icsccc.2018.8703288","url":null,"abstract":"","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126047354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1