首页 > 最新文献

2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies最新文献

英文 中文
Power quality factor improvement using shunt active power line conditioner 采用并联有源电力线调节器改善电能质量因数
M. Nagarjuna, P. C. Panda, A. Sandeep
This paper describes an improvement method of power quality using shunt active power line conditioner (APLC) for a three phase supply system feeding three phase unbalanced non-linear load. A control algorithm is presented for an APLC to compensate harmonics and unbalance factor. Sensing load currents, dc bus voltages compute reference currents of APLC. APLC driving signals are produced with the reference signals via a hysteresis band current controller. MATLAB/simulink power system toolbox is used to simulate the proposed system. The proposed method restricts both THD and unbalance factor of input currents and a power quality factor is designated which integrally reflects the two quality aspects (i.e., harmonic and unbalance factor) before and after compensation. Power quality factor improvement with the proposed shunt APLC has been verified by the simulation results.
本文介绍了一种利用并联有源电力线调节器(APLC)改善三相非平衡非线性负荷供电系统电能质量的方法。提出了一种补偿谐波和不平衡因素的APLC控制算法。感应负载电流,直流母线电压,计算APLC的参考电流。APLC驱动信号与参考信号通过滞回带电流控制器产生。利用MATLAB/simulink电力系统工具箱对所提出的系统进行仿真。该方法同时限制输入电流的THD和不平衡因子,并指定一个综合反映补偿前后两个质量方面(即谐波和不平衡因子)的电能质量因子。仿真结果验证了并联APLC对电能质量因数的改善。
{"title":"Power quality factor improvement using shunt active power line conditioner","authors":"M. Nagarjuna, P. C. Panda, A. Sandeep","doi":"10.1109/ICACCCT.2014.7019475","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019475","url":null,"abstract":"This paper describes an improvement method of power quality using shunt active power line conditioner (APLC) for a three phase supply system feeding three phase unbalanced non-linear load. A control algorithm is presented for an APLC to compensate harmonics and unbalance factor. Sensing load currents, dc bus voltages compute reference currents of APLC. APLC driving signals are produced with the reference signals via a hysteresis band current controller. MATLAB/simulink power system toolbox is used to simulate the proposed system. The proposed method restricts both THD and unbalance factor of input currents and a power quality factor is designated which integrally reflects the two quality aspects (i.e., harmonic and unbalance factor) before and after compensation. Power quality factor improvement with the proposed shunt APLC has been verified by the simulation results.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122995842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance analysis of Modified Random Based Interleaver for OFDM-IDMA system 基于改进随机交织器的OFDM-IDMA系统性能分析
Raghu Kalyana, S. Anuradha
This paper in the mainly focuses on different interleavers used in Orthogonal Frequency Division Multiplexing (OFDM) and Interleave-Division-Multiple-Access (IDMA) system. An efficient Modified Random Based Interleaver is proposed which is simple and could produce orthogonal interleavers for generating user specific chip level interleavers for different users. The projected methodology reduces the computational complexity, memory requirement problem and also reduces the number of data exchanges between the base station (BS) and also the mobile station (MS). The simulation results are presented to indicate that the proposed Modified Random Based Interleaver gives better performance as compared to Master random Interleaver and Tree Based Interleaver in OFDM-IDMA system.
本文主要研究正交频分复用(OFDM)和交错分多址(IDMA)系统中使用的各种交织器。提出了一种改进的基于随机的交织器,该交织器结构简单,可以产生正交的交织器,为不同的用户生成特定的芯片级交织器。该方法降低了计算复杂度和内存需求问题,并减少了基站(BS)和移动站(MS)之间的数据交换次数。仿真结果表明,在OFDM-IDMA系统中,改进的随机交织器比主随机交织器和树交织器具有更好的性能。
{"title":"Performance analysis of Modified Random Based Interleaver for OFDM-IDMA system","authors":"Raghu Kalyana, S. Anuradha","doi":"10.1109/ICACCCT.2014.7019223","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019223","url":null,"abstract":"This paper in the mainly focuses on different interleavers used in Orthogonal Frequency Division Multiplexing (OFDM) and Interleave-Division-Multiple-Access (IDMA) system. An efficient Modified Random Based Interleaver is proposed which is simple and could produce orthogonal interleavers for generating user specific chip level interleavers for different users. The projected methodology reduces the computational complexity, memory requirement problem and also reduces the number of data exchanges between the base station (BS) and also the mobile station (MS). The simulation results are presented to indicate that the proposed Modified Random Based Interleaver gives better performance as compared to Master random Interleaver and Tree Based Interleaver in OFDM-IDMA system.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117303055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intrusion detection in wireless sensor network using genetic K-means algorithm 基于遗传k -均值算法的无线传感器网络入侵检测
G. Sandhya, A. Julian
Security of communication systems has become a crucial issue. A harder problem to crack in the field of Network Security is the identification and prevention of attacks. An effective Intrusion Detection System (IDS) is essential for ensuring network security. Intrusion detection systems include pattern analysis techniques to discover useful patterns of system features. These patterns describe user behavior. Anomalies are computed using the set of relevant system features. The derived patterns comprise inputs of classification systems, which are based on statistical and machine learning pattern recognition techniques. Clustering methods are useful in detection of unknown attack patterns. Elimination of insignificant features is essential for a simplified, faster and more accurate detection of attacks. Genetic algorithm based clustering offers identification of significant reduced input features. We present a conceptual framework for identifying attacks for intrusion detection by applying genetic K-means algorithm.
通信系统的安全已成为一个至关重要的问题。在网络安全领域,识别和预防攻击是一个比较难解决的问题。一个有效的入侵检测系统是保证网络安全的关键。入侵检测系统包括模式分析技术来发现系统特征的有用模式。这些模式描述了用户行为。使用相关系统特征集计算异常。衍生的模式包括基于统计和机器学习模式识别技术的分类系统的输入。聚类方法在检测未知攻击模式方面非常有用。消除无关紧要的特征对于简化、更快和更准确地检测攻击至关重要。基于遗传算法的聚类提供了显著减少输入特征的识别。本文提出了一种利用遗传k -均值算法识别入侵检测攻击的概念框架。
{"title":"Intrusion detection in wireless sensor network using genetic K-means algorithm","authors":"G. Sandhya, A. Julian","doi":"10.1109/ICACCCT.2014.7019418","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019418","url":null,"abstract":"Security of communication systems has become a crucial issue. A harder problem to crack in the field of Network Security is the identification and prevention of attacks. An effective Intrusion Detection System (IDS) is essential for ensuring network security. Intrusion detection systems include pattern analysis techniques to discover useful patterns of system features. These patterns describe user behavior. Anomalies are computed using the set of relevant system features. The derived patterns comprise inputs of classification systems, which are based on statistical and machine learning pattern recognition techniques. Clustering methods are useful in detection of unknown attack patterns. Elimination of insignificant features is essential for a simplified, faster and more accurate detection of attacks. Genetic algorithm based clustering offers identification of significant reduced input features. We present a conceptual framework for identifying attacks for intrusion detection by applying genetic K-means algorithm.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128769438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Comparison and performance analysis of clustering protocol using sleep&wakeup technique in WSN 基于睡眠唤醒技术的WSN聚类协议的比较与性能分析
T. Indhumathi, P. Sivakumar
In order to achieve data information, the Sensor Node's should form into clusters in wireless sensor network. In Multi-hop sensor network, the Base-Station (sink) is might not be considered. That is why, the hot-spot problem may occur in this network. In this paper, we analyze the sleep&wakeup approach, in order to avoid the hot spot (WLAN) problem, which aims to increase the network lifetime using energy as well as packet delivery ratio. In this technique, C-H (cluster-head) has selected based on energy level & Base-Station distance. Using this technique, we can improve the energy consumption & PDR up to 63%, when compare to that of FCA (fuzzy clustering algorithm) and LEACH (low energy adaptive clustering hierarchy) clustering protocol. Our simulation results are shows that the sleep&wakeup approach is better and energy efficient clustering protocol.
在无线传感器网络中,为了获取数据信息,传感器节点需要组成集群。在多跳传感器网络中,可能不考虑基站(sink)。这就是为什么在这个网络中可能会出现热点问题。为了避免无线局域网的热点问题,提高网络的能量使用寿命和分组传输率,本文分析了睡眠和唤醒方法。在该技术中,C-H(簇头)是根据能量等级和基站距离来选择的。与FCA(模糊聚类算法)和LEACH(低能量自适应聚类层次)聚类协议相比,使用该技术可以将能耗和PDR提高63%。仿真结果表明,该方法是一种较好的节能聚类协议。
{"title":"Comparison and performance analysis of clustering protocol using sleep&wakeup technique in WSN","authors":"T. Indhumathi, P. Sivakumar","doi":"10.1109/ICACCCT.2014.7019173","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019173","url":null,"abstract":"In order to achieve data information, the Sensor Node's should form into clusters in wireless sensor network. In Multi-hop sensor network, the Base-Station (sink) is might not be considered. That is why, the hot-spot problem may occur in this network. In this paper, we analyze the sleep&wakeup approach, in order to avoid the hot spot (WLAN) problem, which aims to increase the network lifetime using energy as well as packet delivery ratio. In this technique, C-H (cluster-head) has selected based on energy level & Base-Station distance. Using this technique, we can improve the energy consumption & PDR up to 63%, when compare to that of FCA (fuzzy clustering algorithm) and LEACH (low energy adaptive clustering hierarchy) clustering protocol. Our simulation results are shows that the sleep&wakeup approach is better and energy efficient clustering protocol.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124686309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel reconfigurable microstrip patch antenna for IMT-A 一种新型可重构IMT-A微带贴片天线
Kumar Singh, A. Bhargav, G. Mishra
In this paper a novel reconfigurable patch antenna is designed for IMT-A. The antenna has a simple design with five patches connected by four diodes. By suitably switching ON the diodes, reconfiguration in the radiation pattern is achieved while keeping the operating frequency fixed. Six different radiation patterns were achieved using the design and in all of them the band width requirement of IMT-A was achieved. The design was done using the well known EM simulation software, IE3D. The design was fabricated on RO3010 substrate with relative permeability of 10.2 and having thickness 1.28 mm and with the diodes replaced by microstrip lines for the ON state as an ideal case. Finally the fabricated designed was analysed using the vector network analyser.
本文设计了一种用于IMT-A的新型可重构贴片天线。天线有一个简单的设计,五个贴片由四个二极管连接。通过适当地接通二极管,在保持工作频率不变的情况下,实现了辐射模式的重新配置。采用该设计实现了6种不同的辐射方向图,均达到了IMT-A的带宽要求。设计采用著名的电磁仿真软件IE3D完成。设计采用RO3010衬底,相对磁导率为10.2,厚度为1.28 mm,理想情况下二极管采用微带线代替。最后利用矢量网络分析仪对设计的成品进行了分析。
{"title":"A novel reconfigurable microstrip patch antenna for IMT-A","authors":"Kumar Singh, A. Bhargav, G. Mishra","doi":"10.1109/ICACCCT.2014.7019171","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019171","url":null,"abstract":"In this paper a novel reconfigurable patch antenna is designed for IMT-A. The antenna has a simple design with five patches connected by four diodes. By suitably switching ON the diodes, reconfiguration in the radiation pattern is achieved while keeping the operating frequency fixed. Six different radiation patterns were achieved using the design and in all of them the band width requirement of IMT-A was achieved. The design was done using the well known EM simulation software, IE3D. The design was fabricated on RO3010 substrate with relative permeability of 10.2 and having thickness 1.28 mm and with the diodes replaced by microstrip lines for the ON state as an ideal case. Finally the fabricated designed was analysed using the vector network analyser.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130302974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model based object recognition for particle size distribution 基于模型的物体粒度分布识别
S. Priadarsini, S. Ganesan, C. Shanthi, N. Pappa
In Aerospace applications, Ammonium Nitrate, Ammonium dichromate [(NH4)2 Cr2 O7] and Hydroxy-Terminator PolyButadiene (HTPB) are used as solid propellants. Ammonium dichromate must be pulverized and used in rockets which play the major role to improve the burn rate of the fuel. Image Processing based techniques are used to measure the particle size of Ammonium dichromate. If the particle is overlapped its size or shape can't be accurately measured. Hence, overlap of the particle is determined and its size can be measured. This paper deals with the estimation of the area of Ammonium dichromate particles. An intimate approach to overcome overlap in the particles is done using the Gaussian process regression model. The prediction is done by using linear function of the observed values and these functions can be computed quickly using recursive formulas. Gaussian process regression model is employed to determine the multiple overlap of the particles.
在航空航天应用中,硝酸铵,重铬酸铵[(NH4)2 Cr2 O7]和羟基终结者聚丁二烯(HTPB)被用作固体推进剂。重铬酸铵必须粉碎并用于火箭,这对提高燃料的燃烧速度起着重要作用。基于图像处理的技术被用于测量重铬酸铵的粒度。如果粒子重叠,其大小或形状就不能精确测量。因此,确定了粒子的重叠,并可以测量其大小。本文讨论了重铬酸铵粒子面积的估计问题。利用高斯过程回归模型,提出了一种克服粒子重叠的方法。利用观测值的线性函数进行预测,这些函数可以用递归公式快速计算。采用高斯过程回归模型确定粒子的多重重叠。
{"title":"Model based object recognition for particle size distribution","authors":"S. Priadarsini, S. Ganesan, C. Shanthi, N. Pappa","doi":"10.1109/ICACCCT.2014.7019322","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019322","url":null,"abstract":"In Aerospace applications, Ammonium Nitrate, Ammonium dichromate [(NH4)2 Cr2 O7] and Hydroxy-Terminator PolyButadiene (HTPB) are used as solid propellants. Ammonium dichromate must be pulverized and used in rockets which play the major role to improve the burn rate of the fuel. Image Processing based techniques are used to measure the particle size of Ammonium dichromate. If the particle is overlapped its size or shape can't be accurately measured. Hence, overlap of the particle is determined and its size can be measured. This paper deals with the estimation of the area of Ammonium dichromate particles. An intimate approach to overcome overlap in the particles is done using the Gaussian process regression model. The prediction is done by using linear function of the observed values and these functions can be computed quickly using recursive formulas. Gaussian process regression model is employed to determine the multiple overlap of the particles.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123881463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Steganography on thermal images using generation technique 基于生成技术的热图像隐写
Dany Thomas Koshy, S. Vijayananth
Steganography on thermal image using generation method, where a secret thermal image is hidden in a generated cover image. Generated cover image is a unique image thereby providing more security and robustness. The generated cover image provides high capacity as the whole image for hiding thermal image by keeping low visual changes. Using thermal image gives more security as it is a rare image which is widely used in military purpose. The algorithm used here is highly resistant against RS, Sample pair, X2 and DCT based attacks.
利用生成法对热图像进行隐写,将秘密热图像隐藏在生成的封面图像中。生成的封面图像是一个独特的图像,从而提供更多的安全性和鲁棒性。生成的掩蔽图像在保持低视觉变化的同时,提供了作为整体的高容量来隐藏热图像。由于热像是一种罕见的图像,在军事上应用广泛,因此使用热像具有更高的安全性。这里使用的算法对RS,样本对,X2和基于DCT的攻击具有很强的抵抗力。
{"title":"Steganography on thermal images using generation technique","authors":"Dany Thomas Koshy, S. Vijayananth","doi":"10.1109/ICACCCT.2014.7019432","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019432","url":null,"abstract":"Steganography on thermal image using generation method, where a secret thermal image is hidden in a generated cover image. Generated cover image is a unique image thereby providing more security and robustness. The generated cover image provides high capacity as the whole image for hiding thermal image by keeping low visual changes. Using thermal image gives more security as it is a rare image which is widely used in military purpose. The algorithm used here is highly resistant against RS, Sample pair, X2 and DCT based attacks.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116193143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Assuring correctness for securing outsourced data repository in cloud environment 确保云环境中外包数据存储库安全的正确性
G. Durga Priya, S. Prathibha
The data storage in the cloud environment offers users with infrastructure affability, quicker deployment of applications and data, cost effective, acclimation of cloud resources to real needs, enhanced productivity, etc. Inspite of these beneficial factors, there are several disadvantages to the widespread adoption of cloud computing remain. Among them, surity towards the exactness of the outsourced data and matter of concealment takes the major part. In order to avoid a security hazard for the outsourced data, we propose the dynamic audit services that enable integrity verification of data. An Interactive Proof System (IPS) is introduced to protect the privacy of the data. The DataOwner stores the large number of data in the cloud after encrypting the data for auditing purpose. An Authorized Application (AA), manipulates the outsourced data and the AA helps the cloud users to access the services. Our system provides secure auditing while the data owner, outsourcing the data in the cloud. And after performing auditing operations, security solutions are enhanced for the purpose of detecting malicious users with the help of Certificate Authority, using the hash values and a TimeStamp.
云环境中的数据存储为用户提供了基础设施可用性、更快的应用程序和数据部署、成本效益、云资源适应实际需求、提高生产力等。尽管有这些有利因素,但广泛采用云计算仍然存在一些缺点。其中,外包数据的准确性和隐蔽性的保证占了主要的部分。为了避免外包数据的安全隐患,我们建议使用动态审计服务来验证数据的完整性。为了保护数据的隐私,引入了交互式证明系统(IPS)。DataOwner将大量数据加密后存储在云中,用于审计。授权应用程序(Authorized Application, AA)操作外包数据,AA帮助云用户访问服务。我们的系统提供安全审计,同时数据所有者将数据外包到云中。在执行审计操作之后,安全解决方案得到增强,以便在证书颁发机构的帮助下,使用哈希值和时间戳来检测恶意用户。
{"title":"Assuring correctness for securing outsourced data repository in cloud environment","authors":"G. Durga Priya, S. Prathibha","doi":"10.1109/ICACCCT.2014.7019407","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019407","url":null,"abstract":"The data storage in the cloud environment offers users with infrastructure affability, quicker deployment of applications and data, cost effective, acclimation of cloud resources to real needs, enhanced productivity, etc. Inspite of these beneficial factors, there are several disadvantages to the widespread adoption of cloud computing remain. Among them, surity towards the exactness of the outsourced data and matter of concealment takes the major part. In order to avoid a security hazard for the outsourced data, we propose the dynamic audit services that enable integrity verification of data. An Interactive Proof System (IPS) is introduced to protect the privacy of the data. The DataOwner stores the large number of data in the cloud after encrypting the data for auditing purpose. An Authorized Application (AA), manipulates the outsourced data and the AA helps the cloud users to access the services. Our system provides secure auditing while the data owner, outsourcing the data in the cloud. And after performing auditing operations, security solutions are enhanced for the purpose of detecting malicious users with the help of Certificate Authority, using the hash values and a TimeStamp.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124297926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Burst circulating threat in optical burst switched networks 光突发交换网络中的突发循环威胁
N. Sreenath, K. Muthuraj, K. Brabagaran
Optical network is a high speed network thus reduce the huge bandwidth demands and increase the internet users. Optical burst switched network is an optical networking technique that allows dynamic sub wavelength. OBS is viewed as compromise the optical packet switching and optical circuit switching networks. OBS networks suffer from various security vulnerabilities. This paper propose a security threat named as Burst Circulating attack for OBS networks and provide defective mechanism for this attack. The ns2 simulator with modified nOBS patch is used simulate and verify the security parameter.
光网络是一种高速网络,因此减少了巨大的带宽需求,增加了互联网用户。光突发交换网络是一种允许动态亚波长的光网络技术。OBS被认为是光分组交换和光电路交换网络的折衷方案。OBS网络存在各种安全漏洞。本文提出了一种针对OBS网络的突发循环攻击的安全威胁,并给出了该攻击的缺陷机制。采用修改nOBS补丁的ns2模拟器对安全参数进行仿真验证。
{"title":"Burst circulating threat in optical burst switched networks","authors":"N. Sreenath, K. Muthuraj, K. Brabagaran","doi":"10.1109/ICACCCT.2014.7019197","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019197","url":null,"abstract":"Optical network is a high speed network thus reduce the huge bandwidth demands and increase the internet users. Optical burst switched network is an optical networking technique that allows dynamic sub wavelength. OBS is viewed as compromise the optical packet switching and optical circuit switching networks. OBS networks suffer from various security vulnerabilities. This paper propose a security threat named as Burst Circulating attack for OBS networks and provide defective mechanism for this attack. The ns2 simulator with modified nOBS patch is used simulate and verify the security parameter.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124497404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach 使用动态方法的加密数据分割增强了多云存储的安全性
V. R. Balasaraswathi, S. Manikandan
The use of cloud computing has increased rapidly in many organizations. Security is considered to be the most critical aspects in a cloud computing environment due to the sensitive information stored in the cloud for users. The goal of cloud security is mainly focused on the issues related to the data security and privacy aspects in cloud computing. This multi cloud model which is based on partitioning of application system into distinct clouds instead of using single cloud service such as in Amazon cloud service. It will discuss and present the cryptographic data splitting with dynamic approach for securing information. The metadata information is stored in private cloud. This approach prevents the unauthorized data retrieval by hackers and intruders. The results and implementation for the new proposed model is analyzed, in relation to addressing the security factors in cloud computing.
云计算的使用在许多组织中迅速增加。安全被认为是云计算环境中最关键的方面,因为用户的敏感信息存储在云中。云安全的目标主要集中在云计算中与数据安全和隐私方面相关的问题。这种多云模型是基于将应用系统划分为不同的云,而不是像亚马逊云服务那样使用单一的云服务。讨论并提出了采用动态方法进行加密数据分割以保护信息安全。元数据信息存储在私有云中。这种方法可以防止黑客和入侵者对未经授权的数据进行检索。针对云计算中的安全因素,分析了新模型的结果和实现。
{"title":"Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach","authors":"V. R. Balasaraswathi, S. Manikandan","doi":"10.1109/ICACCCT.2014.7019286","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019286","url":null,"abstract":"The use of cloud computing has increased rapidly in many organizations. Security is considered to be the most critical aspects in a cloud computing environment due to the sensitive information stored in the cloud for users. The goal of cloud security is mainly focused on the issues related to the data security and privacy aspects in cloud computing. This multi cloud model which is based on partitioning of application system into distinct clouds instead of using single cloud service such as in Amazon cloud service. It will discuss and present the cryptographic data splitting with dynamic approach for securing information. The metadata information is stored in private cloud. This approach prevents the unauthorized data retrieval by hackers and intruders. The results and implementation for the new proposed model is analyzed, in relation to addressing the security factors in cloud computing.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126421712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
期刊
2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1