Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819695
Jayashri Hosur, R. Rashmi, M. Dakshayini
In the current traffic system, there is a wastage of power consumption during non-peak hour as current traffic signal shows green light even though there is no vehicles on the road and also in some cases user has to wait for the signal to become green even though there is no vehicles on other roads of the junction which causes the irritation for the driver. In the proposed system, we are considering some threshold distance when the sensor finds any object within this distance using IOT technologies and when other roads are empty then it will switch on the green light otherwise it will switch off the light. This proposed system is helpful for the users during the non-peak hours and also saves the power during non-peak hours as in India most of the vehicles will be there during peak hours so there is lot of power wastage happens because of the current signal system.
{"title":"Smart Traffic light control in the junction using Raspberry PI","authors":"Jayashri Hosur, R. Rashmi, M. Dakshayini","doi":"10.1109/ICCMC.2019.8819695","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819695","url":null,"abstract":"In the current traffic system, there is a wastage of power consumption during non-peak hour as current traffic signal shows green light even though there is no vehicles on the road and also in some cases user has to wait for the signal to become green even though there is no vehicles on other roads of the junction which causes the irritation for the driver. In the proposed system, we are considering some threshold distance when the sensor finds any object within this distance using IOT technologies and when other roads are empty then it will switch on the green light otherwise it will switch off the light. This proposed system is helpful for the users during the non-peak hours and also saves the power during non-peak hours as in India most of the vehicles will be there during peak hours so there is lot of power wastage happens because of the current signal system.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134383304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819774
K. Ramesh, M. Anto Bennet, Arathy T Mari, V. Kavia, S. Preetha, G. Nivedha
Web based life are impacting people inclinations by forming their demeanours and behaviours. Social media have developed more consideration nowadays. Public and Private assessment about a wide assortment of subjects are communicated and spread persistently by means of various social media. Instagram is one of the web-based life that is picking up notoriety and legitimate marketing. Instagram rules the computerized showcasing space, followed intently by Facebook. Sentiment examination identifies with the issue of mining the feelings from online accessible information and classifying the notion communicated by a specific substance into at most three present categories: positive, negative and neutral. This Paper focus on Instagram presentations, explore the feelings of Instagram life and make positive things a reality. First, a subjective to tests related to human feelings. Individuals have diverse sorts of emotions. we compute just the four kind of feelings like Happy, Sad, Anger, Fear, Surprise, Beauty and Excitement. To arrange posts reflecting Instagrammers feelings through multilevel order calculations is actualized. N Linear Support Vector Machine Learning calculations are utilized. The performance of this calculation is analysed for accuracy, reliability, validation and measurement of F1. Calculations of vector modelling machines are more accurate than the Naïve Bayes algorithm.
{"title":"Analysis of the Attitude of Social Network Analysis using R3 Tool","authors":"K. Ramesh, M. Anto Bennet, Arathy T Mari, V. Kavia, S. Preetha, G. Nivedha","doi":"10.1109/ICCMC.2019.8819774","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819774","url":null,"abstract":"Web based life are impacting people inclinations by forming their demeanours and behaviours. Social media have developed more consideration nowadays. Public and Private assessment about a wide assortment of subjects are communicated and spread persistently by means of various social media. Instagram is one of the web-based life that is picking up notoriety and legitimate marketing. Instagram rules the computerized showcasing space, followed intently by Facebook. Sentiment examination identifies with the issue of mining the feelings from online accessible information and classifying the notion communicated by a specific substance into at most three present categories: positive, negative and neutral. This Paper focus on Instagram presentations, explore the feelings of Instagram life and make positive things a reality. First, a subjective to tests related to human feelings. Individuals have diverse sorts of emotions. we compute just the four kind of feelings like Happy, Sad, Anger, Fear, Surprise, Beauty and Excitement. To arrange posts reflecting Instagrammers feelings through multilevel order calculations is actualized. N Linear Support Vector Machine Learning calculations are utilized. The performance of this calculation is analysed for accuracy, reliability, validation and measurement of F1. Calculations of vector modelling machines are more accurate than the Naïve Bayes algorithm.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132822218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819633
S. Delfín, N.P Sivasanker., N. Raj, A. Anand
In cloud computing, the word cloud (additionally stated as "the cloud") is utilized as an allegory for "the Internet," so the state cloud computing signifies "a sort of Internet based computing". It can likewise be characterized as a gathering of PCs and servers that are associated together over the Internet to structure a system. In spite of the fact that cloud computing offers a few influences, however it has some drawback as well, that amid load balancing of information in cloud server faces issues of system blockage, less transfer speed usage, adaptation to non-critical failure and security and so on. This is the place where the idea of "Fog Computing" comes to play. It effectively exchanges delicate information without deferring to the dispersed gadgets. Fog is like the cloud where the distinction lies in the way that has found more near end clients to process and offer reaction to the customer in a less amount of time. Fog Computing, additionally named as "fogging", is a disseminated framework in which a keen gadget deals with certain application procedures or services at the outskirt of the system, in any case, others are still overseen in the cloud. It is, basically, a focal layer between the cloud and the equipment to empower the increasingly productive information handling, investigation and capacity, which is accomplished by lessening the measure of information that should be transported to the cloud.
{"title":"Fog Computing: A New Era of Cloud Computing","authors":"S. Delfín, N.P Sivasanker., N. Raj, A. Anand","doi":"10.1109/ICCMC.2019.8819633","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819633","url":null,"abstract":"In cloud computing, the word cloud (additionally stated as \"the cloud\") is utilized as an allegory for \"the Internet,\" so the state cloud computing signifies \"a sort of Internet based computing\". It can likewise be characterized as a gathering of PCs and servers that are associated together over the Internet to structure a system. In spite of the fact that cloud computing offers a few influences, however it has some drawback as well, that amid load balancing of information in cloud server faces issues of system blockage, less transfer speed usage, adaptation to non-critical failure and security and so on. This is the place where the idea of \"Fog Computing\" comes to play. It effectively exchanges delicate information without deferring to the dispersed gadgets. Fog is like the cloud where the distinction lies in the way that has found more near end clients to process and offer reaction to the customer in a less amount of time. Fog Computing, additionally named as \"fogging\", is a disseminated framework in which a keen gadget deals with certain application procedures or services at the outskirt of the system, in any case, others are still overseen in the cloud. It is, basically, a focal layer between the cloud and the equipment to empower the increasingly productive information handling, investigation and capacity, which is accomplished by lessening the measure of information that should be transported to the cloud.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132892923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819717
Mrityunjaya D Hatagundi, H. V. Kumaraswamy
As the technologies leaning towards digitalization, there has been extensive scope for researches in the field of Software Defined Networking. The architectural framework makes the life of network administrators easy by decoupling the data plane and the control plane. This architecture exploits easy configuration of network, thus providing programmable terminal for development of applications related to security, management and logging while the centralized controller gives much more control over entire network. This type of network is at risk due to attacks by the intruders with an intention to slow down or shut down the entire network. One such kind of attacks is DoS attack. DoS attack involves flooding of fake packet flows from a single source into the original packet flow. DDoS is a type of DoS attack where multiple compromised systems, which are often infected with malicious programs, are used to target a single system. Hence to achieve security in distributed environment, it is important to reduce the effect of such attacks. In this paper an approach of mitigating Distributed DoS has been discussed. Approach first detects DDoS using Entropy Detection attack and then uses Bandwidth Prediction method to mitigate it. Entropy is basically used for measuring randomness in the system and there are two essential components to DDoS detection using entropy; window size and threshold.
{"title":"A Comprehensive Survey on Different Attacks on SDN and Approaches to Mitigate","authors":"Mrityunjaya D Hatagundi, H. V. Kumaraswamy","doi":"10.1109/ICCMC.2019.8819717","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819717","url":null,"abstract":"As the technologies leaning towards digitalization, there has been extensive scope for researches in the field of Software Defined Networking. The architectural framework makes the life of network administrators easy by decoupling the data plane and the control plane. This architecture exploits easy configuration of network, thus providing programmable terminal for development of applications related to security, management and logging while the centralized controller gives much more control over entire network. This type of network is at risk due to attacks by the intruders with an intention to slow down or shut down the entire network. One such kind of attacks is DoS attack. DoS attack involves flooding of fake packet flows from a single source into the original packet flow. DDoS is a type of DoS attack where multiple compromised systems, which are often infected with malicious programs, are used to target a single system. Hence to achieve security in distributed environment, it is important to reduce the effect of such attacks. In this paper an approach of mitigating Distributed DoS has been discussed. Approach first detects DDoS using Entropy Detection attack and then uses Bandwidth Prediction method to mitigate it. Entropy is basically used for measuring randomness in the system and there are two essential components to DDoS detection using entropy; window size and threshold.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115536965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819758
E. Saraswathi, Prateek P. Kulkarni, Momin Nawaf Khalil, Shishir Chandra Nigam
The credit card business has increased speedily over the last two decades. Corporations and establishments are moving towards various online services, which aims to permit their customers with high potency and accessibility. The evolution is a huge step towards potency, accessibility and profitableness of view. Nevertheless, it additionally has some downsides. These smart services are recently prone to significant security related vulnerabilities. Developing business through card depends on the fact that neither the card nor the user needs to be present at the point of transaction. Thus, it is impossible for merchandiser to check weather the cardholder is real or not. Companies’ loss in recent times are majorly due to the credit card fraud and the fraudsters who ceaselessly obtain new ways to commit the unlawful activities. As we know that Artificial Neural Network has the ability to work as a human brain when trained properly. We have also implemented SOM for accuracy purpose. In this paper, we discuss about the performance of the network and their accuracy.
{"title":"Credit Card Fraud Prediction And Detection using Artificial Neural Network And Self-Organizing Maps","authors":"E. Saraswathi, Prateek P. Kulkarni, Momin Nawaf Khalil, Shishir Chandra Nigam","doi":"10.1109/ICCMC.2019.8819758","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819758","url":null,"abstract":"The credit card business has increased speedily over the last two decades. Corporations and establishments are moving towards various online services, which aims to permit their customers with high potency and accessibility. The evolution is a huge step towards potency, accessibility and profitableness of view. Nevertheless, it additionally has some downsides. These smart services are recently prone to significant security related vulnerabilities. Developing business through card depends on the fact that neither the card nor the user needs to be present at the point of transaction. Thus, it is impossible for merchandiser to check weather the cardholder is real or not. Companies’ loss in recent times are majorly due to the credit card fraud and the fraudsters who ceaselessly obtain new ways to commit the unlawful activities. As we know that Artificial Neural Network has the ability to work as a human brain when trained properly. We have also implemented SOM for accuracy purpose. In this paper, we discuss about the performance of the network and their accuracy.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124539668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819838
A. Kushal, P. Raj, Prajapati Naitik, Prajapati Tapan, T. Anjali
Nowadays, industries demand Mobile Cloud Computing (MCC) implementation to enable the user to attain the benefits of cloud computing in an energy efficient way. However, MCC architecture requires mobile computing devices of users to establish a stable wireless connection. The mobile devices in transit may lose connection and continuously try to establish a connection with the cloud. As a result, mobile devices may lose the connection and waste a lot of energy. In the present work to address this issue, dynamic source Ant Colony Optimization algorithm is deployed along with the cloudlet based MCC architecture. The proposed solution considers a real-time scenario where there is a large number of mobile devices and cloudlets in the area. In such a real-time scenario, the proposed solution provides a connection with less energy consumption and high performance. To apply the proposed solution a simulator has been developed. In the present paper, the developed simulator has also been introduced.
{"title":"Dynamic Source ACO algorithm for energy-aware cloudlet-based mobile cloud computing architecture","authors":"A. Kushal, P. Raj, Prajapati Naitik, Prajapati Tapan, T. Anjali","doi":"10.1109/ICCMC.2019.8819838","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819838","url":null,"abstract":"Nowadays, industries demand Mobile Cloud Computing (MCC) implementation to enable the user to attain the benefits of cloud computing in an energy efficient way. However, MCC architecture requires mobile computing devices of users to establish a stable wireless connection. The mobile devices in transit may lose connection and continuously try to establish a connection with the cloud. As a result, mobile devices may lose the connection and waste a lot of energy. In the present work to address this issue, dynamic source Ant Colony Optimization algorithm is deployed along with the cloudlet based MCC architecture. The proposed solution considers a real-time scenario where there is a large number of mobile devices and cloudlets in the area. In such a real-time scenario, the proposed solution provides a connection with less energy consumption and high performance. To apply the proposed solution a simulator has been developed. In the present paper, the developed simulator has also been introduced.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124771623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819751
J. Shah
Text classification is a process of allocating one or more class label to a text document. If the text classification problem has too many categories, and there are certain categories with less number of training documents, text classification task becomes difficult. Recall will be less for categories with less number of training documents. To handle text classification problem with too many categories and to take into consideration parent-child/sibling relationships between categories in user profile and document profile for content-based filtering, hierarchical classification is better approach. The main issue with hierarchical classification is error propagation. The error that occurs at early level in hierarchy will carry forward to all the levels below it. So, misclassification at early level in hierarchy needs to be reduced. Term ambiguity may be one of the reasons for classification error. Naïve Bayes classification method is mostly used in text classification problem as it takes less time for training and testing. Naïve Bayes model considers that terms are not dependent on each other for a given class. For data where terms are dependent on each other, performance of naïve Bayes is degraded. In this paper, word-level n-gram based Multinomial Naïve Bayes classification method is combined with hierarchical classification to reduce misclassification that occur at early level in hierarchy & improve content-based filtering. Proposed algorithm also suggests a way to reduce execution time requirements for calculating probabilities of terms for n-gram naïve bayes model.
{"title":"Performance Evaluation of Applying N-Gram Based Naïve Bayes Classifier for Hierarchical Classification","authors":"J. Shah","doi":"10.1109/ICCMC.2019.8819751","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819751","url":null,"abstract":"Text classification is a process of allocating one or more class label to a text document. If the text classification problem has too many categories, and there are certain categories with less number of training documents, text classification task becomes difficult. Recall will be less for categories with less number of training documents. To handle text classification problem with too many categories and to take into consideration parent-child/sibling relationships between categories in user profile and document profile for content-based filtering, hierarchical classification is better approach. The main issue with hierarchical classification is error propagation. The error that occurs at early level in hierarchy will carry forward to all the levels below it. So, misclassification at early level in hierarchy needs to be reduced. Term ambiguity may be one of the reasons for classification error. Naïve Bayes classification method is mostly used in text classification problem as it takes less time for training and testing. Naïve Bayes model considers that terms are not dependent on each other for a given class. For data where terms are dependent on each other, performance of naïve Bayes is degraded. In this paper, word-level n-gram based Multinomial Naïve Bayes classification method is combined with hierarchical classification to reduce misclassification that occur at early level in hierarchy & improve content-based filtering. Proposed algorithm also suggests a way to reduce execution time requirements for calculating probabilities of terms for n-gram naïve bayes model.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129378201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819844
Zeenat Shareef, S. Reddy
Aquaculture is one of the important activities in the coastal regions of India. The livelihood of thousands of farmers depends on the yield generated through aquaculture activities. Water quality is an important factor that affects the growth and development of marine creatures. Any deterioration in water quality endangers these species and affects the yield. Therefore, there is a need to monitor the water quality at regular intervals and provide alerts to the aquaculture farmers so that they can take preventive actions in time. This paper presents design and development of water quality monitoring system for aquaculture farms of western Godavari region. It also presents network analysis performed between the base station and the sensor node in order to cover the aquaculture farm with sensor nodes in an efficient manner.
{"title":"Design and wireless sensor Network Analysis of Water Quality Monitoring System for Aquaculture","authors":"Zeenat Shareef, S. Reddy","doi":"10.1109/ICCMC.2019.8819844","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819844","url":null,"abstract":"Aquaculture is one of the important activities in the coastal regions of India. The livelihood of thousands of farmers depends on the yield generated through aquaculture activities. Water quality is an important factor that affects the growth and development of marine creatures. Any deterioration in water quality endangers these species and affects the yield. Therefore, there is a need to monitor the water quality at regular intervals and provide alerts to the aquaculture farmers so that they can take preventive actions in time. This paper presents design and development of water quality monitoring system for aquaculture farms of western Godavari region. It also presents network analysis performed between the base station and the sensor node in order to cover the aquaculture farm with sensor nodes in an efficient manner.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130119301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819761
R. Chatterjee, Rajdeep Chakraborty, J. Mandal
Digitization has transformed our world. The famous World Wide Web, various social networks and numerous e-commerce applications are responsible to generate huge volume of data regularly. The emerging data security mechanisms ensures a safe transmission of information through the internet. Symmetric key cryptography is one of the key techniques used for the security of large data transmission over the internet. Some popular symmetric key algorithms; TDES, IDEA, AES etc. The proposed model uses several symmetric key algorithms in cascaded manner. The model is first divided into 64 bits plaintext block and then into two sub-blocks of 32 bits. The left and right blocks go through a list of symmetric key cryptography techniques like TR, RPPT, TB and RPSPNC and bit rotation in one step. TR stands for Triangular Encryption, which is responsible to generate a triangle shape bit stream where different encryption-decryption techniques are achieved by the order of reading bit RPPT (Recursive Pared Parity Technique) a very simple space efficient encryption algorithm produces cipher text by performing logical OR of consecutive bits. Transformation of Bits (TB) uses swapping method of bits of different order for encryption and decryption process. Recursive Positional Substitution on Prime-Nonprime of Cluster (RPSPNC) methodology swaps bits based on prime/non prime bit position and generates intermediate bit stream as a cipher text. Finally merge the two halves sub-blocks to get the 64 bits cipher text. To test the feasibility of the proposed model it is compared with AES and another embedded encryption technique RPPT+TB for entropy, non-homogeneity, n-gram(4-gram) test, frequency distribution graph and FPGA based hardware test.
{"title":"Design of Cryptographic model for End-to-End Encryption in FPGA based systems","authors":"R. Chatterjee, Rajdeep Chakraborty, J. Mandal","doi":"10.1109/ICCMC.2019.8819761","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819761","url":null,"abstract":"Digitization has transformed our world. The famous World Wide Web, various social networks and numerous e-commerce applications are responsible to generate huge volume of data regularly. The emerging data security mechanisms ensures a safe transmission of information through the internet. Symmetric key cryptography is one of the key techniques used for the security of large data transmission over the internet. Some popular symmetric key algorithms; TDES, IDEA, AES etc. The proposed model uses several symmetric key algorithms in cascaded manner. The model is first divided into 64 bits plaintext block and then into two sub-blocks of 32 bits. The left and right blocks go through a list of symmetric key cryptography techniques like TR, RPPT, TB and RPSPNC and bit rotation in one step. TR stands for Triangular Encryption, which is responsible to generate a triangle shape bit stream where different encryption-decryption techniques are achieved by the order of reading bit RPPT (Recursive Pared Parity Technique) a very simple space efficient encryption algorithm produces cipher text by performing logical OR of consecutive bits. Transformation of Bits (TB) uses swapping method of bits of different order for encryption and decryption process. Recursive Positional Substitution on Prime-Nonprime of Cluster (RPSPNC) methodology swaps bits based on prime/non prime bit position and generates intermediate bit stream as a cipher text. Finally merge the two halves sub-blocks to get the 64 bits cipher text. To test the feasibility of the proposed model it is compared with AES and another embedded encryption technique RPPT+TB for entropy, non-homogeneity, n-gram(4-gram) test, frequency distribution graph and FPGA based hardware test.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131080607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819664
Sujata D. More, Meenakshi S. Arya
In alteration discovery analysis, image misalignment still remains a pesky issue, although such discovery would be is entirely determined by the accuracy of image registration. If the procedure of alteration detection is done on images that are not aligned properly, problems may accrue in the form of missed or wrong alterations. This, in turn, would have an adverse effect on the correctness of actual change detection. This paper's aim is to propose a methodology about the recognition of change technique that is expected to curtail the influence exerted by improper alignment of images. And to effect this, the method of detecting alternations or changes based on pixel is being advanced, as this suggested method would deal with errors arising out of mis-registration effectively. The technique proposed here involves image stitching by combining two or more images of the same scene as a single larger image. Block matching technique is a way of locating matching blocks in a sequence of image for the purpose of image estimation. To spot the alteration in image, the use of image differencing is being advocated. It is anticipated that the suggested experimental steps would yield a top rate of accuracy.
{"title":"A Proposed Methodology for Multi-Temporal Image Change Detection by Using Image Stitching Through Pixel Block Localization","authors":"Sujata D. More, Meenakshi S. Arya","doi":"10.1109/ICCMC.2019.8819664","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819664","url":null,"abstract":"In alteration discovery analysis, image misalignment still remains a pesky issue, although such discovery would be is entirely determined by the accuracy of image registration. If the procedure of alteration detection is done on images that are not aligned properly, problems may accrue in the form of missed or wrong alterations. This, in turn, would have an adverse effect on the correctness of actual change detection. This paper's aim is to propose a methodology about the recognition of change technique that is expected to curtail the influence exerted by improper alignment of images. And to effect this, the method of detecting alternations or changes based on pixel is being advanced, as this suggested method would deal with errors arising out of mis-registration effectively. The technique proposed here involves image stitching by combining two or more images of the same scene as a single larger image. Block matching technique is a way of locating matching blocks in a sequence of image for the purpose of image estimation. To spot the alteration in image, the use of image differencing is being advocated. It is anticipated that the suggested experimental steps would yield a top rate of accuracy.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132405852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}