首页 > 最新文献

2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)最新文献

英文 中文
IoT based Safety System for Coal Mines 基于物联网的煤矿安全系统
R. Kodali, S. Sahu
Coal is one of the most important fuel sources and is of paramount importance to many industries, often regarded by many as Black Diamond. It is the most important indigenous energy resource available in the world. Digging up more and more coal has become a national priority for India as it tries to meet its ever-increasing demand for electricity. But for the people who do this job, it is a dangerous and potentially lethal assignment. Workers in coal mines face many environment related problems such as high temperature, humidity, release of harmful gases to name a few. These factors create a rather dangerous environment for workers to work in and thus poses a serious risk to their very lives.As a means of reducing the intensity of the problem, we have developed a model which senses these environmental parameters from different locations in the mines and sends alerts to the mines control room so that appropriate actions can be taken whenever there seems to be a dangerous situation. Here NodeMCU is used as an MQTT publisher for these parameters sensed by the different sensors. The values of these parameters from different mine locations are sent via MQTT, by being subscribed by a Raspberry Pi which acts as an MQTT broker here. When these values exceed certain threshold values, an alert by email can be sent to the mine control office so that required actions can be taken. This also generates an alarm for the workers to evacuate the place. This published data can also be stored in files for data collection and big data analytics so that more efficient systems can be developed to improve the efficiency and reduce the risk of workers potentially losing their lives.
煤炭是最重要的燃料来源之一,对许多行业至关重要,通常被许多人视为黑钻石。它是世界上最重要的本土能源。为了满足不断增长的电力需求,挖掘越来越多的煤炭已成为印度的国家优先事项。但对于从事这项工作的人来说,这是一项危险的、可能致命的任务。煤矿工人面临着许多与环境有关的问题,如高温、高湿、有害气体的释放等等。这些因素为工人创造了一个相当危险的工作环境,从而对他们的生命构成严重威胁。为了减轻问题的严重程度,我们开发了一种模型,可以从矿井的不同位置感知这些环境参数,并向矿井控制室发出警报,以便在出现危险情况时采取适当的行动。这里,NodeMCU被用作不同传感器感知的这些参数的MQTT发布者。来自不同矿位的这些参数值通过MQTT发送,由树莓派订阅,树莓派在这里充当MQTT代理。当这些值超过一定的阈值时,可以通过电子邮件向矿控办公室发送警报,以便采取所需的行动。这也会产生警报,提醒工人撤离现场。这些发布的数据也可以存储在文件中,用于数据收集和大数据分析,以便开发更有效的系统,以提高效率并降低工人可能失去生命的风险。
{"title":"IoT based Safety System for Coal Mines","authors":"R. Kodali, S. Sahu","doi":"10.1109/IC3IOT.2018.8668184","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668184","url":null,"abstract":"Coal is one of the most important fuel sources and is of paramount importance to many industries, often regarded by many as Black Diamond. It is the most important indigenous energy resource available in the world. Digging up more and more coal has become a national priority for India as it tries to meet its ever-increasing demand for electricity. But for the people who do this job, it is a dangerous and potentially lethal assignment. Workers in coal mines face many environment related problems such as high temperature, humidity, release of harmful gases to name a few. These factors create a rather dangerous environment for workers to work in and thus poses a serious risk to their very lives.As a means of reducing the intensity of the problem, we have developed a model which senses these environmental parameters from different locations in the mines and sends alerts to the mines control room so that appropriate actions can be taken whenever there seems to be a dangerous situation. Here NodeMCU is used as an MQTT publisher for these parameters sensed by the different sensors. The values of these parameters from different mine locations are sent via MQTT, by being subscribed by a Raspberry Pi which acts as an MQTT broker here. When these values exceed certain threshold values, an alert by email can be sent to the mine control office so that required actions can be taken. This also generates an alarm for the workers to evacuate the place. This published data can also be stored in files for data collection and big data analytics so that more efficient systems can be developed to improve the efficiency and reduce the risk of workers potentially losing their lives.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126346683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification of Brain simulation using artificial intelligence, cognitive science and neuroscience 利用人工智能、认知科学和神经科学对大脑模拟进行分类
Mohit Sharma, R. Mittal, T. Choudhury, K. Vishnu
This paper renders a summary of the knowledge domain study of scientific discipline, specially the realm of the sector relating to Artificial intelligence. Additionally the paper can lucubrate on current analysis for scientific discipline computing, and brain simulation exploitation laptop run models. A human brain can be the best example of intelligence well-known, with associate degree best ability for advanced, period of time interaction with a real world. Artificial intelligence features a crucial role to play in analysis as a result of computing rivets on the mechanisms that generate intelligence and knowledge. Artificial intelligence also may like learning the neural mechanisms of knowledge as a result of this analysis can unveil vital info regarding the character of intelligence and knowledge itself.
本文对科学学科的知识领域研究,特别是人工智能领域的知识领域研究进行了综述。此外,本文还对科学学科计算的现状分析和计算机运行模型的大脑仿真开发进行了深入研究。人类的大脑可能是众所周知的智力的最好例子,拥有大专学历的人最有能力与现实世界进行高级、长期的互动。人工智能在分析中扮演着至关重要的角色,因为计算铆钉在产生智能和知识的机制上。人工智能也可能喜欢学习知识的神经机制,因为这种分析可以揭示关于智能和知识本身特征的重要信息。
{"title":"Classification of Brain simulation using artificial intelligence, cognitive science and neuroscience","authors":"Mohit Sharma, R. Mittal, T. Choudhury, K. Vishnu","doi":"10.1109/IC3IOT.2018.8668129","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668129","url":null,"abstract":"This paper renders a summary of the knowledge domain study of scientific discipline, specially the realm of the sector relating to Artificial intelligence. Additionally the paper can lucubrate on current analysis for scientific discipline computing, and brain simulation exploitation laptop run models. A human brain can be the best example of intelligence well-known, with associate degree best ability for advanced, period of time interaction with a real world. Artificial intelligence features a crucial role to play in analysis as a result of computing rivets on the mechanisms that generate intelligence and knowledge. Artificial intelligence also may like learning the neural mechanisms of knowledge as a result of this analysis can unveil vital info regarding the character of intelligence and knowledge itself.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"454 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124190543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting the Customer Behavior Through Web Page and Content Mining Techniques 基于网页和内容挖掘技术的客户行为预测
VM Sundharam, M.S. Sriramm, Priya Pachhaiammal
The ideology of the people has changed over the decades, with the people’s interest shifting towards a more closed environment, thinking about themselves, rather than their environment, consisting of their kith and kin and others. The result of this isolation is that the mental psychology of the people changes in accordance with the technological advancement. The major disadvantage is that the people’s mental psychology could not be identified to follow any specific pattern. But the root of the tree is clear, the technology. Hence the analysis of the behavior of the user is done by allowing them answer a series of questions.
几十年来,人们的意识形态发生了变化,人们的兴趣转向了一个更封闭的环境,他们考虑的是自己,而不是他们的环境,由他们的亲朋好友和其他人组成。这种隔离的结果是人们的心理随着技术的进步而变化。主要的缺点是人们的心理不能被确定为遵循任何特定的模式。但这棵树的根是明确的,那就是技术。因此,对用户行为的分析是通过让他们回答一系列问题来完成的。
{"title":"Predicting the Customer Behavior Through Web Page and Content Mining Techniques","authors":"VM Sundharam, M.S. Sriramm, Priya Pachhaiammal","doi":"10.1109/IC3IOT.2018.8668176","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668176","url":null,"abstract":"The ideology of the people has changed over the decades, with the people’s interest shifting towards a more closed environment, thinking about themselves, rather than their environment, consisting of their kith and kin and others. The result of this isolation is that the mental psychology of the people changes in accordance with the technological advancement. The major disadvantage is that the people’s mental psychology could not be identified to follow any specific pattern. But the root of the tree is clear, the technology. Hence the analysis of the behavior of the user is done by allowing them answer a series of questions.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124383984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Crash Detection and Emergency communication system for Two Wheelers 智能碰撞检测及两轮车应急通信系统
Rayasam Lakshmi Satya, R. Kaviya, R. Valarmathi
An Effective Vehicular on board accident detection system aimed at helping the injured on accident of the two-wheeler leading to a near fatal accident. The accident is detected and if fatal. the location of the accident is triangulated and emergency services are alerted either as a normal message or as an app notification. The usage of cloud technology provides further application as it can be used to identify accident hot spots by identifying it using machine learning.
一套有效的车载意外侦测系统,旨在帮助两轮车在意外中受伤的人士,而该两轮车在意外中酿成几乎致命的意外。事故被发现,如果是致命的。事故的位置是三角定位的,紧急服务会以正常消息或应用程序通知的形式发出警报。云技术的使用提供了进一步的应用,因为它可以通过使用机器学习识别事故热点来识别事故热点。
{"title":"Intelligent Crash Detection and Emergency communication system for Two Wheelers","authors":"Rayasam Lakshmi Satya, R. Kaviya, R. Valarmathi","doi":"10.1109/IC3IOT.2018.8668180","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668180","url":null,"abstract":"An Effective Vehicular on board accident detection system aimed at helping the injured on accident of the two-wheeler leading to a near fatal accident. The accident is detected and if fatal. the location of the accident is triangulated and emergency services are alerted either as a normal message or as an app notification. The usage of cloud technology provides further application as it can be used to identify accident hot spots by identifying it using machine learning.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124572513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Region Based Extensive Response Index Pattern for Facial Expression Recognition 基于区域的广义反应索引模式面部表情识别
Monu Verma, S. Vipparthi, Girdhari Singh
This paper presents a novel descriptor named Region based Extensive Response Index Pattern (RETRaIN) for facial expression recognition. The RETRaIN encodes the relation among the reference and neighboring pixels of facial active regions. These relations are computed by using directional compass mask on an input image and extract the high edge responses in foremost directions. Further extreme edge index positions are selected and encoded into six-bit compact code to reduce feature dimensionality and distinguish between the uniform and non-uniform patterns in the facial features. The performance of the proposed descriptor is tested and evaluated on three benchmark datasets Extended Cohn Kanade, JAFFE, and MUG. The RETRaIN achieves superior recognition accuracy in comparison to state-of-the-art techniques.
提出了一种基于区域的泛化反应索引模式(RETRaIN)的面部表情识别描述符。RETRaIN对面部活动区域的参考像素和相邻像素之间的关系进行编码。通过在输入图像上使用方向罗经掩模来计算这些关系,并在最重要的方向上提取高边缘响应。进一步选择极端边缘索引位置并编码为6位压缩码,以降低特征维数并区分面部特征中的均匀和非均匀模式。所提出的描述符的性能在三个基准数据集Extended Cohn Kanade、JAFFE和MUG上进行了测试和评估。与最先进的技术相比,RETRaIN实现了更高的识别精度。
{"title":"Region Based Extensive Response Index Pattern for Facial Expression Recognition","authors":"Monu Verma, S. Vipparthi, Girdhari Singh","doi":"10.1109/IC3IOT.2018.8668200","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668200","url":null,"abstract":"This paper presents a novel descriptor named Region based Extensive Response Index Pattern (RETRaIN) for facial expression recognition. The RETRaIN encodes the relation among the reference and neighboring pixels of facial active regions. These relations are computed by using directional compass mask on an input image and extract the high edge responses in foremost directions. Further extreme edge index positions are selected and encoded into six-bit compact code to reduce feature dimensionality and distinguish between the uniform and non-uniform patterns in the facial features. The performance of the proposed descriptor is tested and evaluated on three benchmark datasets Extended Cohn Kanade, JAFFE, and MUG. The RETRaIN achieves superior recognition accuracy in comparison to state-of-the-art techniques.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"21 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131574192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic Gas Controller 自动气体控制器
R. Dhianeswar, S. Sumathi, K. Joshitha
The main aim of this project is to make the life of the person (mainly elders) comfortable. They face many problems and the major one is the memory loss. Due to this problem, they are not able to remember things. So they are pulled to many drastic situations. This project is about the automatic gas cut off, when the person is not present at the environment. Now-a-days, many people are forgetting to turn off the gas stove. Due to this, many fire accidents and wastage of gas occurs. Now, this project is going to be a solution for the above problem.
该项目的主要目的是使人们(主要是老年人)的生活舒适。他们面临许多问题,其中最主要的是记忆力减退。由于这个问题,他们不能记住事情。所以他们被拉到许多激烈的情况。这个项目是关于自动燃气切断,当人不在场的环境。现在,很多人都忘了关煤气炉。因此,发生了许多火灾事故和燃气浪费。现在,这个项目将是上述问题的解决方案。
{"title":"Automatic Gas Controller","authors":"R. Dhianeswar, S. Sumathi, K. Joshitha","doi":"10.1109/IC3IOT.2018.8668178","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668178","url":null,"abstract":"The main aim of this project is to make the life of the person (mainly elders) comfortable. They face many problems and the major one is the memory loss. Due to this problem, they are not able to remember things. So they are pulled to many drastic situations. This project is about the automatic gas cut off, when the person is not present at the environment. Now-a-days, many people are forgetting to turn off the gas stove. Due to this, many fire accidents and wastage of gas occurs. Now, this project is going to be a solution for the above problem.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129551761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Next Generation Computing: Enabling Multilevel Centralized Access Control using UCON and CapBAC Model for securing IoT Networks 下一代计算:使用UCON和CapBAC模型实现多级集中访问控制,以保护物联网网络
Ankur Lohachab, Karambir
Internet of Things (IoT) with its advance processing, storage and communication approaches has become a prominent area of research to comply with the needs of various applications. Cloud computing and its extensively accepted services, are facilitating wide scale deployment of IoT devices through integration with edge or Fog computing, along with various others initiatives, such as Software Defined Networks (SDN) and Network Function Virtualization (NFV). In this paper, we utilize these technologies to propose hybrid access control architecture based on the integration of Usage and Capability based access model for authorizing the legitimate network entities to access resources and to ensure better security of these networks. We also specify, implement and test the correctness of our model using Access Control Policy Tool (ACPT).
物联网(IoT)以其先进的处理、存储和通信方式成为适应各种应用需求的一个突出研究领域。云计算及其广泛接受的服务,通过与边缘或雾计算的集成,以及其他各种计划,如软件定义网络(SDN)和网络功能虚拟化(NFV),正在促进物联网设备的大规模部署。在本文中,我们利用这些技术,提出了基于基于使用和基于能力的访问模型集成的混合访问控制体系结构,以授权合法的网络实体访问资源,以确保网络的更好的安全性。我们还使用访问控制策略工具(ACPT)指定、实现和测试我们模型的正确性。
{"title":"Next Generation Computing: Enabling Multilevel Centralized Access Control using UCON and CapBAC Model for securing IoT Networks","authors":"Ankur Lohachab, Karambir","doi":"10.1109/IC3IOT.2018.8668191","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668191","url":null,"abstract":"Internet of Things (IoT) with its advance processing, storage and communication approaches has become a prominent area of research to comply with the needs of various applications. Cloud computing and its extensively accepted services, are facilitating wide scale deployment of IoT devices through integration with edge or Fog computing, along with various others initiatives, such as Software Defined Networks (SDN) and Network Function Virtualization (NFV). In this paper, we utilize these technologies to propose hybrid access control architecture based on the integration of Usage and Capability based access model for authorizing the legitimate network entities to access resources and to ensure better security of these networks. We also specify, implement and test the correctness of our model using Access Control Policy Tool (ACPT).","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131983723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimization of SLL and FNBW in Linear Arrays Using PSO 基于粒子群算法的线性阵列SLL和FNBW优化
N. Rao, G. Ram
In many communication applications like radar and point to point micro wave links, narrow beamwidth and low side lobe level beams are required. Trying to generate narrow beams using conventional antenna synthesis methods results in higher side lobe levels and trying to generate low side lobe beams results in broader beams. Dolph chebychev linear array method is a compromise between SLL and FNBW. In this method, for a given SLL, the narrowest beam width is obtained and for a given beamwidth the smallest SLL is obtained. But the smallest SLL for the narrowest beamwidth is not obtained. In this paper an effort is made to get the narrowest main beamwidth without significantly increasing SLL and the smallest SLL is obtained without significantly broadening the beamwidth using random stochastic methods like Particle swarm optimization (PSO) and Genetic algorithm (GA). Results obtained with PSO and results obtained with GA are compared.
在许多通信应用中,如雷达和点对点微波链路,需要窄波束宽度和低旁瓣电平波束。试图用传统的天线合成方法产生窄波束会导致更高的旁瓣电平,而试图产生低旁瓣波束会导致更宽的波束。多尔夫切比切夫线性阵列方法是一种介于SLL和FNBW之间的折衷方法。在此方法中,对于给定的波束宽度,可以得到最窄的波束宽度,对于给定的波束宽度,可以得到最小的波束宽度。但在最窄的波束宽度下,没有得到最小的SLL。本文采用粒子群优化(PSO)和遗传算法(GA)等随机随机方法,在不显著增加波束宽度的情况下获得最窄的主波束宽度,在不显著拓宽波束宽度的情况下获得最小的主波束宽度。比较了粒子群算法和遗传算法得到的结果。
{"title":"Optimization of SLL and FNBW in Linear Arrays Using PSO","authors":"N. Rao, G. Ram","doi":"10.1109/ic3iot.2018.8668199","DOIUrl":"https://doi.org/10.1109/ic3iot.2018.8668199","url":null,"abstract":"In many communication applications like radar and point to point micro wave links, narrow beamwidth and low side lobe level beams are required. Trying to generate narrow beams using conventional antenna synthesis methods results in higher side lobe levels and trying to generate low side lobe beams results in broader beams. Dolph chebychev linear array method is a compromise between SLL and FNBW. In this method, for a given SLL, the narrowest beam width is obtained and for a given beamwidth the smallest SLL is obtained. But the smallest SLL for the narrowest beamwidth is not obtained. In this paper an effort is made to get the narrowest main beamwidth without significantly increasing SLL and the smallest SLL is obtained without significantly broadening the beamwidth using random stochastic methods like Particle swarm optimization (PSO) and Genetic algorithm (GA). Results obtained with PSO and results obtained with GA are compared.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133875979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting Malware & Analysing Using Sandbox Evasion 检测恶意软件和分析使用沙箱规避
Sajal Jain, T. Choudhury, Vivek Kumar, Praveen Kumar
Framework trustworthiness is a cardinal segment of info security. It guarantees that info frameworks work inside some attractive points of confinement. Web security dangers, for example, malicious piece of code what’s more, exceptionally malevolent projects are on the ascent, bringing about the need for broad research endeavours to create components that can counter different dangers. Malicious piece of code Sandbox investigation is a successful system having gotten recommendations as a potential arrangement. When utilizing Malicious piece of code Sandbox examination, tests of malicious piece of code are accomplished to decide their practices. The consequences of this activity are then recorded for ensuing examination. This paper initially will clarify the idea of malicious piece of code, at that point talk about the accessible techniques to distinguish and control different malicious piece of code exercises.Finally, it will investigate the general Sandbox course of action, with a vital importance on a novel directed malevolent bit of code area technique using Sandbox-evasion rehearses as a street to distinguishing, assuaging or altogether avoiding the malignant bit of code.
框架可信度是信息安全的重要组成部分。它保证了信息框架在一些有吸引力的限制点内工作。例如,网络安全危险,恶意代码,而且,异常恶意的项目正在上升,需要广泛的研究努力来创建可以对抗不同危险的组件。恶意代码沙箱调查是一个成功的系统,已经得到建议作为一个潜在的安排。在利用恶意代码沙箱检查时,通过对恶意代码的测试来确定其行为。然后记录该活动的结果,以供随后的检查。本文首先阐明了恶意代码的概念,然后讨论了区分和控制不同恶意代码的可行技术。最后,它将调查一般的沙盒行动过程,对一种新的定向恶意代码区域技术至关重要,该技术使用沙盒规避演练作为区分,缓和或完全避免恶意代码位的方法。
{"title":"Detecting Malware & Analysing Using Sandbox Evasion","authors":"Sajal Jain, T. Choudhury, Vivek Kumar, Praveen Kumar","doi":"10.1109/IC3IOT.2018.8668149","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668149","url":null,"abstract":"Framework trustworthiness is a cardinal segment of info security. It guarantees that info frameworks work inside some attractive points of confinement. Web security dangers, for example, malicious piece of code what’s more, exceptionally malevolent projects are on the ascent, bringing about the need for broad research endeavours to create components that can counter different dangers. Malicious piece of code Sandbox investigation is a successful system having gotten recommendations as a potential arrangement. When utilizing Malicious piece of code Sandbox examination, tests of malicious piece of code are accomplished to decide their practices. The consequences of this activity are then recorded for ensuing examination. This paper initially will clarify the idea of malicious piece of code, at that point talk about the accessible techniques to distinguish and control different malicious piece of code exercises.Finally, it will investigate the general Sandbox course of action, with a vital importance on a novel directed malevolent bit of code area technique using Sandbox-evasion rehearses as a street to distinguishing, assuaging or altogether avoiding the malignant bit of code.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127458660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A GPS Based Dengue Risk Index to Predict the Susceptibility of an Individual 基于GPS的登革热风险指数预测个体易感性
M. Akshaiya, M. Akshaya, G. Lakshmi, S. Sumathi
Dengue is the most important disastrous disease by which many number of people are affected. The incidence of dengue is associated particularly with the spread of the vector Aedes Aegypti and some of the environmental variables such as the trade, travel, climate change, inadequate water supplies, warming temperature etc. Therefore a mobile app that gives the reliable real time information stating when and where to expect the outbreak of dengue is essential which would use the GPS receiver embedded in the mobile phone and this also gives the dengue risk index in and around the exact location or at the remote location and the spread of the disease in the near future can also be estimated.
登革热是影响许多人的最重要的灾难性疾病。登革热的发病率特别与媒介埃及伊蚊的传播和一些环境变量有关,如贸易、旅行、气候变化、供水不足、温度变暖等。因此,一个移动应用程序至关重要,它可以提供可靠的实时信息,说明何时何地预计登革热会爆发,这将使用嵌入手机中的GPS接收器,这也可以提供确切地点或偏远地点及其周围的登革热风险指数,并可以估计疾病在不久的将来的传播。
{"title":"A GPS Based Dengue Risk Index to Predict the Susceptibility of an Individual","authors":"M. Akshaiya, M. Akshaya, G. Lakshmi, S. Sumathi","doi":"10.1109/IC3IOT.2018.8668111","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668111","url":null,"abstract":"Dengue is the most important disastrous disease by which many number of people are affected. The incidence of dengue is associated particularly with the spread of the vector Aedes Aegypti and some of the environmental variables such as the trade, travel, climate change, inadequate water supplies, warming temperature etc. Therefore a mobile app that gives the reliable real time information stating when and where to expect the outbreak of dengue is essential which would use the GPS receiver embedded in the mobile phone and this also gives the dengue risk index in and around the exact location or at the remote location and the spread of the disease in the near future can also be estimated.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124447274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1