首页 > 最新文献

2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
Comparative Analysis of Recent Neuro Fuzzy Systems For Stock Market Prediction 近期神经模糊系统在股市预测中的比较分析
P. K. Bharne, S. Prabhune
The fuzzy logic and neural networks are the two powerful techniques commonly used in various application field from their evolution. The combination of both techniques is commonly termed as Neuro-Fuzzy System (NFS). Both techniques are combined because they overcome the limitations of each other. Basically, this model is used to construct the complex model by using fuzzy logic and its capabilities are improves with a neural network. In NFS, fuzzy rules are adjusted by the input-output patterns of a neural network. This paper presents the use of this powerful NFS system in the fields of stock market application for stock price prediction. Most of the traditional approaches do not consider all kind of stock price movements. But literature proves that the NFS is a leading technique in stock market prediction. This paper initially describes the brief description of neural networks and Fuzzy logic system along with their pros and cons. Further discussing, how the advantages of both systems combined in NFS. Also, the different types and architectures of NFS are presented here. Finally, this paper studies the recent NFS dependent methods which is used for the prediction of stock market. This paper summarizes the analysis of these techniques based on the technique used, the dataset used, their advantages and some research gap of all these techniques.
模糊逻辑和神经网络从它们的发展历程来看,是两种强大的技术,被广泛应用于各个应用领域。这两种技术的结合通常被称为神经模糊系统(NFS)。这两种技术结合在一起是因为它们克服了彼此的局限性。该模型主要是利用模糊逻辑构造复杂模型,并通过神经网络对其性能进行改进。在NFS中,模糊规则通过神经网络的输入输出模式进行调整。本文介绍了利用这个功能强大的NFS系统在股票市场领域进行股票价格预测的应用。大多数传统方法都没有考虑到所有类型的股价变动。但文献证明,NFS是一种领先的股票市场预测技术。本文首先简要介绍了神经网络和模糊逻辑系统的优缺点,并进一步讨论了在NFS中如何将这两种系统的优点结合起来。此外,本文还介绍了NFS的不同类型和体系结构。最后,本文对近年来用于股票市场预测的NFS依赖方法进行了研究。本文从这些技术所采用的技术、使用的数据集、各自的优势和研究差距等方面对这些技术进行了总结分析。
{"title":"Comparative Analysis of Recent Neuro Fuzzy Systems For Stock Market Prediction","authors":"P. K. Bharne, S. Prabhune","doi":"10.1109/ICCMC.2019.8819644","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819644","url":null,"abstract":"The fuzzy logic and neural networks are the two powerful techniques commonly used in various application field from their evolution. The combination of both techniques is commonly termed as Neuro-Fuzzy System (NFS). Both techniques are combined because they overcome the limitations of each other. Basically, this model is used to construct the complex model by using fuzzy logic and its capabilities are improves with a neural network. In NFS, fuzzy rules are adjusted by the input-output patterns of a neural network. This paper presents the use of this powerful NFS system in the fields of stock market application for stock price prediction. Most of the traditional approaches do not consider all kind of stock price movements. But literature proves that the NFS is a leading technique in stock market prediction. This paper initially describes the brief description of neural networks and Fuzzy logic system along with their pros and cons. Further discussing, how the advantages of both systems combined in NFS. Also, the different types and architectures of NFS are presented here. Finally, this paper studies the recent NFS dependent methods which is used for the prediction of stock market. This paper summarizes the analysis of these techniques based on the technique used, the dataset used, their advantages and some research gap of all these techniques.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126170842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Diabetic Retinopathy Prediction System using Data Mining 基于数据挖掘的糖尿病视网膜病变预测系统的实现
Siddharekh S. Patil, Kalpana Malpe
Diabetic retinopathy (DR) is the most common cause of newly diagnosed blindness every year. Annual eye checking for diabetic patients are suggested in order to find and treat DR in a timely manner, since blindness from this condition is preventable with early identification. DR detection is solely based on existing patient records. Now a day’s medical data growing tremendously and we need to process that data for detection. But it is time consuming hence data mining techniques helps to get rid from this issue. We use neural network (NN) and naïve bayes for classification. According to comparison results NN gives better accuracy than naïve bayes and time and memory required for NN is less as compared to naïve bayes.
糖尿病视网膜病变(DR)是每年新诊断失明的最常见原因。建议对糖尿病患者进行年度眼科检查,以便及时发现和治疗DR,因为早期发现可以预防DR导致的失明。DR检测完全基于现有的患者记录。现在每天的医疗数据都在急剧增长,我们需要处理这些数据来进行检测。但这是耗时的,因此数据挖掘技术有助于摆脱这个问题。我们使用神经网络(NN)和naïve贝叶斯进行分类。对比结果显示,NN的准确率优于naïve贝叶斯,所需的时间和内存也比naïve贝叶斯少。
{"title":"Implementation of Diabetic Retinopathy Prediction System using Data Mining","authors":"Siddharekh S. Patil, Kalpana Malpe","doi":"10.1109/ICCMC.2019.8819865","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819865","url":null,"abstract":"Diabetic retinopathy (DR) is the most common cause of newly diagnosed blindness every year. Annual eye checking for diabetic patients are suggested in order to find and treat DR in a timely manner, since blindness from this condition is preventable with early identification. DR detection is solely based on existing patient records. Now a day’s medical data growing tremendously and we need to process that data for detection. But it is time consuming hence data mining techniques helps to get rid from this issue. We use neural network (NN) and naïve bayes for classification. According to comparison results NN gives better accuracy than naïve bayes and time and memory required for NN is less as compared to naïve bayes.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"58 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Load Balanced Clustering protocol for lifetime enhancement of WSN 用于WSN生存期增强的负载均衡聚类协议
Kumkum Dubey, Vijeta Sharma, Amrita Gupta, Ankita Srivastava, Shivendu Mishra, Prince Rajpoot
WSN have large numbers of spatially distributed and dedicated sensing devices, which are used for sensing the physical condition of the environment in which they are deployed. Todays time, WSN have lots of areas for research and it plays important role like tracking of area, health-scanning, earthquake-sensing and so on. WSN sets supplementary life as well as nodes time-period in sensor nodes. Network life cycle is dependent on many factors like their topology type, residual energy after some rounds, sensor-node distance to sink node etc. There are already lots of work done on this concept. Clustering is one of the most important approach to make efficient communication. In this paper, we used clustering approach that uses the minimum energy consumption by choosing the Clusters-Heads (CHs) using five parameters: delay, standard deviation of Eres, average distance of CHs, standard deviation of average life time of cluster head and max distance to Base Station (BS). Results verify that our proposed algorithm will prolong the lifetime of network over LEACH and base algorithm.
无线传感器网络具有大量空间分布和专用的传感设备,用于感知其所部署环境的物理状况。目前,无线传感器网络有很多研究领域,在区域跟踪、健康扫描、地震传感等方面发挥着重要的作用。WSN在传感器节点中设置了补充寿命和节点时间段。网络的生命周期取决于网络的拓扑类型、轮询后的剩余能量、传感器节点到汇聚节点的距离等因素。在这个概念上已经做了很多工作。聚类是实现高效通信的重要手段之一。在本文中,我们采用聚类方法,通过使用延迟、Eres的标准差、CHs的平均距离、簇头平均寿命的标准差和到基站的最大距离这五个参数来选择簇头(CHs),从而使用最小的能耗。实验结果表明,与LEACH和基本算法相比,我们提出的算法可以延长网络的生存期。
{"title":"Load Balanced Clustering protocol for lifetime enhancement of WSN","authors":"Kumkum Dubey, Vijeta Sharma, Amrita Gupta, Ankita Srivastava, Shivendu Mishra, Prince Rajpoot","doi":"10.1109/ICCMC.2019.8819854","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819854","url":null,"abstract":"WSN have large numbers of spatially distributed and dedicated sensing devices, which are used for sensing the physical condition of the environment in which they are deployed. Todays time, WSN have lots of areas for research and it plays important role like tracking of area, health-scanning, earthquake-sensing and so on. WSN sets supplementary life as well as nodes time-period in sensor nodes. Network life cycle is dependent on many factors like their topology type, residual energy after some rounds, sensor-node distance to sink node etc. There are already lots of work done on this concept. Clustering is one of the most important approach to make efficient communication. In this paper, we used clustering approach that uses the minimum energy consumption by choosing the Clusters-Heads (CHs) using five parameters: delay, standard deviation of Eres, average distance of CHs, standard deviation of average life time of cluster head and max distance to Base Station (BS). Results verify that our proposed algorithm will prolong the lifetime of network over LEACH and base algorithm.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121818386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effective Analysis using DWT and RBF for Biomedical Signals Pick-up from Heart through Surface Electrodes 基于小波变换和RBF的表面电极心脏生物医学信号有效分析
Padma Tatiparti, C. Kumari
It deals with the detection of heart diseases as a deciding path for treatment. The proposed work is for finding an effective technique for ECG Signal Analysis with modest reasonable accuracy and minimum computation time. ECG signal Patterns and heart rate are the parameters to indicate cardiac health. ECG signals are recorded by placing the surface electrodes on body to pick up rhythmically produced due to repolarization and depolarization activity of heart. For Instance the arrhythmia of ECG rhythm are irregular, it neither too slow nor too fast significant based on difference observed between normal sinus heart rhythm and types of arrhythmia. To avoid any risk, the recognition using computer based for classification of ECG signals pinched significant attention since last few decades. The predominant attributes used in detection of cardiac cycle for arrhythmic activity are Heart Rate, QRS complex and intervals and ST segment. Algorithms used for detection and also classification of various ECG signal abnormalities, some recordings from databases of arrhythmias is used in training and also testing classification based on Neural Networks. The data mining tool like Multilayer Perceptron, Radial Basis Functions Neural Networks are implemented for classification purpose due to its simplicity, adaptiveness and easy implementation produced high efficiency.
它将心脏病的检测作为治疗的决定性途径。所提出的工作是寻找一种有效的心电信号分析技术,以适度的合理精度和最小的计算时间。心电信号模式和心率是指示心脏健康的参数。通过在人体表面放置电极,采集心脏复极化和去极化活动有节奏地产生的电信号,记录心电图信号。如心电节律性心律失常不规则,根据正常窦性心律与心律失常类型的差异,心律失常既不过慢也不过快。为了避免这些风险,利用计算机对心电信号进行分类识别是近几十年来备受关注的问题。用于心律失常活动的心周期检测的主要属性是心率、QRS复合体、间隔和ST段。用于检测和分类各种心电信号异常的算法,来自心律失常数据库的一些记录用于训练和测试基于神经网络的分类。多层感知器、径向基函数神经网络等数据挖掘工具因其简单、自适应、易实现等特点而被用于分类。
{"title":"Effective Analysis using DWT and RBF for Biomedical Signals Pick-up from Heart through Surface Electrodes","authors":"Padma Tatiparti, C. Kumari","doi":"10.1109/ICCMC.2019.8819817","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819817","url":null,"abstract":"It deals with the detection of heart diseases as a deciding path for treatment. The proposed work is for finding an effective technique for ECG Signal Analysis with modest reasonable accuracy and minimum computation time. ECG signal Patterns and heart rate are the parameters to indicate cardiac health. ECG signals are recorded by placing the surface electrodes on body to pick up rhythmically produced due to repolarization and depolarization activity of heart. For Instance the arrhythmia of ECG rhythm are irregular, it neither too slow nor too fast significant based on difference observed between normal sinus heart rhythm and types of arrhythmia. To avoid any risk, the recognition using computer based for classification of ECG signals pinched significant attention since last few decades. The predominant attributes used in detection of cardiac cycle for arrhythmic activity are Heart Rate, QRS complex and intervals and ST segment. Algorithms used for detection and also classification of various ECG signal abnormalities, some recordings from databases of arrhythmias is used in training and also testing classification based on Neural Networks. The data mining tool like Multilayer Perceptron, Radial Basis Functions Neural Networks are implemented for classification purpose due to its simplicity, adaptiveness and easy implementation produced high efficiency.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"33 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114022604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Machine Learning Methodologies for Network Intrusion Detection 网络入侵检测的机器学习方法综述
Aditya Phadke, Mohit Kulkarni, Pranav Bhawalkar, Rashmi Bhattad
The Internet continues to spread itself over the globe, providing a great opportunity for various threats which are growing on a daily basis. Current static detection techniques only detect known malicious attacks and they also require frequent updates to signature-based databases. To reduce this work, systems are proposed for network intrusion detection systems capable of analyzing contents of the network by means of machine learning techniques to analyze and classify the malicious contents. Various machine learning algorithms are used for developing a Network Intrusion Detection System. The review intends to provide an exhaustive survey of the currently proposed machine learning based intrusion detection systems in order to assist Network Intrusion Detection System developers to gain a better intuition.
互联网继续在全球范围内传播,为各种威胁提供了巨大的机会,这些威胁每天都在增长。目前的静态检测技术只能检测已知的恶意攻击,并且需要频繁更新基于特征的数据库。为了减少这种工作量,我们提出了一种网络入侵检测系统,该系统能够通过机器学习技术分析网络内容,对恶意内容进行分析和分类。各种机器学习算法用于开发网络入侵检测系统。本文旨在对目前提出的基于机器学习的入侵检测系统进行详尽的调查,以帮助网络入侵检测系统的开发人员获得更好的直觉。
{"title":"A Review of Machine Learning Methodologies for Network Intrusion Detection","authors":"Aditya Phadke, Mohit Kulkarni, Pranav Bhawalkar, Rashmi Bhattad","doi":"10.1109/ICCMC.2019.8819748","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819748","url":null,"abstract":"The Internet continues to spread itself over the globe, providing a great opportunity for various threats which are growing on a daily basis. Current static detection techniques only detect known malicious attacks and they also require frequent updates to signature-based databases. To reduce this work, systems are proposed for network intrusion detection systems capable of analyzing contents of the network by means of machine learning techniques to analyze and classify the malicious contents. Various machine learning algorithms are used for developing a Network Intrusion Detection System. The review intends to provide an exhaustive survey of the currently proposed machine learning based intrusion detection systems in order to assist Network Intrusion Detection System developers to gain a better intuition.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133173561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Design of Rectangular Patch Array Antenna for Satellite Communication 卫星通信用矩形贴片阵列天线的设计
Touko Tcheutou Stephane Borel, Arvind R. Yadav, Utkarsh Shah
Microstrip patch array antennas are widely used in satellite communication, because of its advantages compared to the conventional antennas. Literature study of previous years of patch array antenna (PAA) shows that several techniques were used for making the small size of patch array antenna. This paper presents the micro strip array antenna 2x2 operating at 12 GHz with a bandwidth equal to 693.6 MHZ (5.9 %), a gain equal to 8.98 dB, directivity equal to 10.83 dB and finally an efficiency equal to 83 %. A 2x2 linear array is designed for line feeding, the substrate used is FR4 with a thickness of 1.6mm and a dielectric constant of 4.4. This array antenna is made for satellite communication, X-band applications, and KU applications. The antenna array is designed by using HFSS 12 (High Frequency Structure Simulator) and also the simulation has been done by the same software.
微带贴片阵列天线由于具有传统天线所不能比拟的优点,在卫星通信中得到了广泛的应用。对以往贴片阵天线的文献研究表明,小尺寸贴片阵天线的制作采用了多种技术。本文介绍了工作在12 GHz的微带阵列天线2x2,其带宽为693.6 MHZ(5.9%),增益为8.98 dB,指向性为10.83 dB,最终效率为83%。设计2x2线阵供线,衬底为FR4,厚度为1.6mm,介电常数为4.4。这种阵列天线是为卫星通信、x波段应用和KU应用而设计的。采用hfss12 (High Frequency Structure Simulator,高频结构模拟器)软件对天线阵进行了设计,并进行了仿真。
{"title":"Design of Rectangular Patch Array Antenna for Satellite Communication","authors":"Touko Tcheutou Stephane Borel, Arvind R. Yadav, Utkarsh Shah","doi":"10.1109/ICCMC.2019.8819861","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819861","url":null,"abstract":"Microstrip patch array antennas are widely used in satellite communication, because of its advantages compared to the conventional antennas. Literature study of previous years of patch array antenna (PAA) shows that several techniques were used for making the small size of patch array antenna. This paper presents the micro strip array antenna 2x2 operating at 12 GHz with a bandwidth equal to 693.6 MHZ (5.9 %), a gain equal to 8.98 dB, directivity equal to 10.83 dB and finally an efficiency equal to 83 %. A 2x2 linear array is designed for line feeding, the substrate used is FR4 with a thickness of 1.6mm and a dielectric constant of 4.4. This array antenna is made for satellite communication, X-band applications, and KU applications. The antenna array is designed by using HFSS 12 (High Frequency Structure Simulator) and also the simulation has been done by the same software.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"247 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133331219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Improved Conditional Privacy Protection in Vehicle Ad-hoc Networks 改进的车载Ad-hoc网络条件隐私保护
K. Mankar, Chitra T. Wasnik
Vehicle ad-hoc networks (VANETs) are susceptible to numerous attacks since all nodes of the network contain information like driver details, vehicle type, license plate, speed, location, and moving route. Since human lives are at stake, privacy is one of the major challenges. The abovementioned information is required by legal authorities for traffic management and prevention of accidents/crimes. Hence, the requirement of a conditional privacy scheme to achieve both obscurity as well as traceability has become a growing field of research. This paper presents an improved conditional privacy protection scheme in VANETs where an identity-based cryptosystem uses pseudonyms to assure user obscurity; at the same time, a backdoor access is provided for legal authorities to track defiant and untrustworthy users.
车辆自组织网络(vanet)容易受到许多攻击,因为网络的所有节点都包含驾驶员详细信息、车辆类型、车牌、速度、位置和移动路线等信息。由于人的生命受到威胁,隐私是主要挑战之一。上述资料是法律当局为交通管理及预防意外/罪案所需要的资料。因此,对条件隐私方案的要求,以实现隐蔽性和可追溯性已经成为一个日益增长的研究领域。提出了一种改进的vanet条件隐私保护方案,其中基于身份的密码系统使用假名来保证用户的隐蔽性;同时,为法律当局提供了后门访问,以跟踪挑衅和不值得信任的用户。
{"title":"Improved Conditional Privacy Protection in Vehicle Ad-hoc Networks","authors":"K. Mankar, Chitra T. Wasnik","doi":"10.1109/ICCMC.2019.8819827","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819827","url":null,"abstract":"Vehicle ad-hoc networks (VANETs) are susceptible to numerous attacks since all nodes of the network contain information like driver details, vehicle type, license plate, speed, location, and moving route. Since human lives are at stake, privacy is one of the major challenges. The abovementioned information is required by legal authorities for traffic management and prevention of accidents/crimes. Hence, the requirement of a conditional privacy scheme to achieve both obscurity as well as traceability has become a growing field of research. This paper presents an improved conditional privacy protection scheme in VANETs where an identity-based cryptosystem uses pseudonyms to assure user obscurity; at the same time, a backdoor access is provided for legal authorities to track defiant and untrustworthy users.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131803656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certificateless Aggregate Message Authentication for Hierarchical Trusted Authority based VANET 基于分层可信机构VANET的无证书聚合消息身份验证
Ruchi Dewangan, Fahiem Altaf, Soumyadev Maity
In VANET, vehicles periodically transmit beacon messages to the neighboring vehicles and the RSU. To establish the authenticity of these messages, a number of digital signature schemes have been proposed in literature. Many of these schemes enable an RSU to perform aggregate verification of the signatures to deal with high vehicle density scenarios. These schemes are either based on traditional PKC concept involving certificate management overhead or identity based cryptography having key escrow problem. Further, these schemes require the existence of OBU device which is resistant to side channel attacks. In this paper, we propose a hierarchical trusted authority privacy preserving certificateless aggregate signature scheme for VANET. In addition to providing message authentication, integrity and non-repudiation, our scheme is resistant to message forgeability attack. The proposed scheme assumes hierarchical organization of network such that vehicles operate under multiple trusted authorities (TA) which in turn are controlled by single root TA. Using our scheme, the entity could verify messages received from vehicles which operate under multiple TAs. The proposed scheme is free from key escrow problem and resistant to side channel attacks on OBU. It also possesses conditional linkability such that originator of a message could be revealed whenever required. Simulations confirm the efficient nature in terms of verification delay as compared to other well known schemes proposed in literature.
在VANET中,车辆定期向相邻车辆和RSU发送信标信息。为了建立这些消息的真实性,文献中提出了许多数字签名方案。其中许多方案使RSU能够对签名进行聚合验证,以应对高密度车辆场景。这些方案要么基于涉及证书管理开销的传统PKC概念,要么基于存在密钥托管问题的身份加密。此外,这些方案需要OBU设备的存在,以抵抗侧信道攻击。在本文中,我们提出了一种用于VANET的分层可信机构保护隐私的无证书聚合签名方案。该方案除了提供消息认证、完整性和不可否认性外,还能抵抗消息可伪造性攻击。该方案假设网络的分层组织,使得车辆在多个可信权威(TA)下运行,而这些权威又由单个根TA控制。使用我们的方案,实体可以验证从多个ta下运行的车辆接收的消息。该方案不存在密钥托管问题,能够抵抗OBU侧信道攻击。它还具有条件链接性,以便在需要时可以显示消息的发送者。与文献中提出的其他知名方案相比,仿真证实了该方案在验证延迟方面的有效性。
{"title":"Certificateless Aggregate Message Authentication for Hierarchical Trusted Authority based VANET","authors":"Ruchi Dewangan, Fahiem Altaf, Soumyadev Maity","doi":"10.1109/ICCMC.2019.8819737","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819737","url":null,"abstract":"In VANET, vehicles periodically transmit beacon messages to the neighboring vehicles and the RSU. To establish the authenticity of these messages, a number of digital signature schemes have been proposed in literature. Many of these schemes enable an RSU to perform aggregate verification of the signatures to deal with high vehicle density scenarios. These schemes are either based on traditional PKC concept involving certificate management overhead or identity based cryptography having key escrow problem. Further, these schemes require the existence of OBU device which is resistant to side channel attacks. In this paper, we propose a hierarchical trusted authority privacy preserving certificateless aggregate signature scheme for VANET. In addition to providing message authentication, integrity and non-repudiation, our scheme is resistant to message forgeability attack. The proposed scheme assumes hierarchical organization of network such that vehicles operate under multiple trusted authorities (TA) which in turn are controlled by single root TA. Using our scheme, the entity could verify messages received from vehicles which operate under multiple TAs. The proposed scheme is free from key escrow problem and resistant to side channel attacks on OBU. It also possesses conditional linkability such that originator of a message could be revealed whenever required. Simulations confirm the efficient nature in terms of verification delay as compared to other well known schemes proposed in literature.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134278595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Contemplation of Cloud Services Quality by exerting Coadunate-Coalesce Cryptography and Yajat method 运用共轭聚并密码和Yajat方法对云服务质量的思考
N V Satya Naresh Kalluri, Divya Vani Yarlagadda, K. R. Kumari, Rajesh Arepalli
Cloud computing is network consisting of configurable multifarious resources and predominant-level services which can be rapidly exerted with minimal management effort over the Internet. Cloud computing endows lot of services and consumers avail services from cloud agilely bestowed through internet. Some consumers without any knowledge about quality peculiarities, consumers may merely avail cloud service and feel unhappy, disenchant by using cloud service. As it is extremely imperative for consumers to recognize about cloud service quality before availing the service, this paper bestows about contemplation of quality for the services existing in cloud. This paper induces Yajat method for cogitation about cloud services quality to forthcoming patrons. In Yajat method quality ranking fixin based on different quality peculiarities is calculated for every service in cloud. Security quandary will occur while congregating quality assessment testimony by deeming multifarious quality peculiarities from consumers for Yajat method. To solve security quandary coadunate cryptography and Coalesce cryptography method is induced in this paper. Firstly by exerting Coadunate and coalesce cryptography, quality assessment testimony about cloud is collected securely and bestowed to Yajat method as input. Secondly by availing proctors in Yajat method, quality ranking fixin are calculated and bestowed to forthcoming consumers. The output of yajat method is bestowed to forthcoming consumers by proctors of cloud. Thus this paper intends forthcoming consumers by scrutinizing the output of yajat method, effortlessly choose to avail cloud service with the quality they aspire and feel elated, blissful by using cloud service.
云计算是由可配置的多种资源和主导级服务组成的网络,可以在Internet上以最小的管理工作量快速发挥作用。云计算提供了大量的服务,消费者可以通过互联网灵活地利用云服务。一些消费者对质量特性一无所知,消费者可能只是利用云服务而感到不快乐,对使用云服务感到失望。由于消费者在使用云服务之前对云服务质量的认识是非常必要的,因此本文对云服务的质量进行了思考。本文引入Yajat方法,对即将到来的客户进行云服务质量的思考。在Yajat方法中,基于不同的质量特性对云中的每个服务进行质量排序。考虑消费者对Yajat方法的各种质量特性,在汇总质量评估证词时,会出现安全困境。为了解决安全难题,本文提出了坐标密码和合并密码的方法。首先利用共轭密码学和聚并密码学,安全地收集云的质量评估证据,并将其作为输入赋给Yajat方法。其次,利用Yajat方法计算质量排名,并将其分配给即将到来的消费者。yajat方法的输出由云的监测器提供给即将到来的消费者。因此,本文希望即将到来的消费者通过仔细检查yajat方法的输出,毫不费力地选择利用云服务与他们所渴望的质量,并感到高兴,幸福的使用云服务。
{"title":"Contemplation of Cloud Services Quality by exerting Coadunate-Coalesce Cryptography and Yajat method","authors":"N V Satya Naresh Kalluri, Divya Vani Yarlagadda, K. R. Kumari, Rajesh Arepalli","doi":"10.1109/ICCMC.2019.8819847","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819847","url":null,"abstract":"Cloud computing is network consisting of configurable multifarious resources and predominant-level services which can be rapidly exerted with minimal management effort over the Internet. Cloud computing endows lot of services and consumers avail services from cloud agilely bestowed through internet. Some consumers without any knowledge about quality peculiarities, consumers may merely avail cloud service and feel unhappy, disenchant by using cloud service. As it is extremely imperative for consumers to recognize about cloud service quality before availing the service, this paper bestows about contemplation of quality for the services existing in cloud. This paper induces Yajat method for cogitation about cloud services quality to forthcoming patrons. In Yajat method quality ranking fixin based on different quality peculiarities is calculated for every service in cloud. Security quandary will occur while congregating quality assessment testimony by deeming multifarious quality peculiarities from consumers for Yajat method. To solve security quandary coadunate cryptography and Coalesce cryptography method is induced in this paper. Firstly by exerting Coadunate and coalesce cryptography, quality assessment testimony about cloud is collected securely and bestowed to Yajat method as input. Secondly by availing proctors in Yajat method, quality ranking fixin are calculated and bestowed to forthcoming consumers. The output of yajat method is bestowed to forthcoming consumers by proctors of cloud. Thus this paper intends forthcoming consumers by scrutinizing the output of yajat method, effortlessly choose to avail cloud service with the quality they aspire and feel elated, blissful by using cloud service.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130293382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Approaches to Identify and Prevent Cyber Attacks in Web 识别和预防网络攻击的新方法
S. Sodagudi, Sita Kumari Kotha, M. David Raju
Security is the biggest challenging approach in today’s internet accessible technologies like, mobile phones, webmail, instant messaging services, and removable storage media. Internet access has given the ability to easily carry and handle the large amounts of data. With the growing technologies, the usage of internet increases along with the threats/data breaches like view or modify the confidential data by an unauthorized entities. Though the technology increases, there is no guarantee for the overall security. Every web application contains vulnerabilities and it is the most crucial area for the intruders to place cyber attacks on it. These attacks are very harmful for the society. They involve creating financial theft, data threats, blackmailing, resource upholding and many more. This paper provides the approaches to identify, detect and taking preventive measures for the eradication of attacks. For this available tools and scanners can also be used in the present world scenario. SQL injection, DNS attacks and DoS attacks are emphasized towards implementation since the risk encountered is more in such attacks.
在当今的互联网可访问技术(如移动电话、网络邮件、即时消息服务和可移动存储媒体)中,安全性是最具挑战性的方法。互联网的接入使人们能够轻松地携带和处理大量的数据。随着技术的发展,互联网的使用也在增加,威胁/数据泄露也在增加,比如未经授权的实体查看或修改机密数据。虽然技术进步了,但并不能保证整体的安全。每个web应用程序都存在漏洞,这是入侵者对其进行网络攻击的最关键领域。这些攻击对社会是非常有害的。它们包括制造金融盗窃、数据威胁、勒索、资源维护等等。本文提供了识别、检测和采取预防措施以消除攻击的方法。为此,可用的工具和扫描仪也可用于当前的世界场景。由于SQL注入、DNS攻击和DoS攻击的风险更大,因此在实现上重点强调。
{"title":"Novel Approaches to Identify and Prevent Cyber Attacks in Web","authors":"S. Sodagudi, Sita Kumari Kotha, M. David Raju","doi":"10.1109/ICCMC.2019.8819822","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819822","url":null,"abstract":"Security is the biggest challenging approach in today’s internet accessible technologies like, mobile phones, webmail, instant messaging services, and removable storage media. Internet access has given the ability to easily carry and handle the large amounts of data. With the growing technologies, the usage of internet increases along with the threats/data breaches like view or modify the confidential data by an unauthorized entities. Though the technology increases, there is no guarantee for the overall security. Every web application contains vulnerabilities and it is the most crucial area for the intruders to place cyber attacks on it. These attacks are very harmful for the society. They involve creating financial theft, data threats, blackmailing, resource upholding and many more. This paper provides the approaches to identify, detect and taking preventive measures for the eradication of attacks. For this available tools and scanners can also be used in the present world scenario. SQL injection, DNS attacks and DoS attacks are emphasized towards implementation since the risk encountered is more in such attacks.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115665049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1