首页 > 最新文献

2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)最新文献

英文 中文
Design and Implementation of Hormonal Cycle Based Cryptographic Modus Operandi and Android Application Development for Cosseted Transmission 基于激素周期的加密方法设计与实现及Android应用开发
Rajdeep Chowdhury, Paromita Mitra, Sukhwant Kumar, Satyam Singh, Aditya Singh
Android Applications have become an integral fraction of entwined contemporary subsistence. The entire sphere is employing diverse assortment of applications for distinguished intention. Among all the flamboyant assortment of applications, some applications have engrossed apiece individual and are unanimously accepted. With apiece fleeting instant, numerous applications are emerging in the market and are contending amid the contemporary applications in use.The proposed work is a pioneering approach to develop an application for message transference in a cosseted manner. The eminence of the work lies in ensuring that the messages send are in a coded structure, more precisely in encrypted form, formulated from the proposed Cryptographic modus operandi. The focal intention of the proposed work is to augment the status of safekeeping in data transference. The work is a multidisciplinary work and includes Biological principles in devising the Cryptographic modus operandi. Hormonal system is one of the most decisive fractions of human well-being and fundamental structure. There are numerous hormones meant for diverse purposes in human anatomy, more precisely, they are exclusively distinct for male and female. Although, the numeral quotient of hormones is colossal, but in the work, preferred male and female hormones have been employed.The hormones employed, their operational cycle and their way of illustration in the proposed work opens a unique mode to encrypt data and augment the safekeeping echelon. The augmented safekeeping could unearth its employment in numerous modes and in countless places, not only for personal purposes but could also be employed for organizational purpose.The Android Application for the said Cryptographic modus operandi is an initiative for safekeeping of apiece individual employing the Application as well as a universal mold for societal impact on the whole.
Android应用程序已经成为交织在一起的当代生活中不可或缺的一部分。整个领域都在使用各种各样的应用程序来实现不同的目的。在纷繁的申请中,有些申请吸引了每个人的注意力,并被一致接受。随着每一个稍纵即逝的瞬间,市场上出现了许多应用程序,并在使用中的当代应用程序中进行竞争。提出的工作是一种开创性的方法,以一种受宠爱的方式开发消息传输应用程序。这项工作的卓越之处在于确保发送的消息是编码结构,更准确地说是加密形式,根据提出的密码学操作方式制定。拟议工作的重点意图是提高数据传输中的安全保存地位。这项工作是一项多学科的工作,包括设计密码操作方式的生物学原理。荷尔蒙系统是人类健康和基本结构中最具决定性的部分之一。在人体解剖学中,有许多不同用途的激素,更确切地说,它们只对男性和女性有区别。虽然,激素的数量商是巨大的,但在工作中,首选的雄性和雌性激素一直在使用。所使用的激素,它们的操作周期和它们在拟议工作中的说明方式打开了一个独特的模式来加密数据和增加安全保存梯队。增强的安全管理可以在许多模式和无数的地方得到应用,不仅可以用于个人目的,也可以用于组织目的。上述加密手法的Android应用程序是为了保护使用该应用程序的每个人的安全,以及对整个社会影响的通用模式。
{"title":"Design and Implementation of Hormonal Cycle Based Cryptographic Modus Operandi and Android Application Development for Cosseted Transmission","authors":"Rajdeep Chowdhury, Paromita Mitra, Sukhwant Kumar, Satyam Singh, Aditya Singh","doi":"10.1109/ICGCIOT.2018.8753013","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753013","url":null,"abstract":"Android Applications have become an integral fraction of entwined contemporary subsistence. The entire sphere is employing diverse assortment of applications for distinguished intention. Among all the flamboyant assortment of applications, some applications have engrossed apiece individual and are unanimously accepted. With apiece fleeting instant, numerous applications are emerging in the market and are contending amid the contemporary applications in use.The proposed work is a pioneering approach to develop an application for message transference in a cosseted manner. The eminence of the work lies in ensuring that the messages send are in a coded structure, more precisely in encrypted form, formulated from the proposed Cryptographic modus operandi. The focal intention of the proposed work is to augment the status of safekeeping in data transference. The work is a multidisciplinary work and includes Biological principles in devising the Cryptographic modus operandi. Hormonal system is one of the most decisive fractions of human well-being and fundamental structure. There are numerous hormones meant for diverse purposes in human anatomy, more precisely, they are exclusively distinct for male and female. Although, the numeral quotient of hormones is colossal, but in the work, preferred male and female hormones have been employed.The hormones employed, their operational cycle and their way of illustration in the proposed work opens a unique mode to encrypt data and augment the safekeeping echelon. The augmented safekeeping could unearth its employment in numerous modes and in countless places, not only for personal purposes but could also be employed for organizational purpose.The Android Application for the said Cryptographic modus operandi is an initiative for safekeeping of apiece individual employing the Application as well as a universal mold for societal impact on the whole.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126243277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Water utility management using Data Analytics and Geospatial Analytics for state of Delhi 用水公用事业管理使用数据分析和地理空间分析的国家德里
Ankita Gupta, Abhishek Singhal, A. Sabitha, T. Choudhury
Over the years the utility-customer relationship has rapidly transformed with vast number of factors affecting consumption including environmental factors like geography, weather, population, migration etc. Over the years the utility-customer relationship has rapidly transformed with vast number of factors affecting consumption including environmental factors like geography, weather, population, migration etc. The research work focuses on implementing a data driven approach towards understanding the water utility management, finding loopholes in demand supply patterns and customer base analysis using data analytics methods and geospatial approach. The first half focuses research work aims at understanding the water utility consumption in metropolitan city of parts of City of Delhi, using data analytics that aims at understanding per household consumption of consumers and segmentation of customers based on customer profiling.
多年来,公用事业客户关系迅速转变,影响消费的因素众多,包括地理、天气、人口、移民等环境因素。多年来,公用事业客户关系迅速转变,影响消费的因素众多,包括地理、天气、人口、移民等环境因素。研究工作的重点是实施数据驱动的方法来理解水务公司管理,发现需求供应模式的漏洞,并使用数据分析方法和地理空间方法进行客户群分析。上半年的重点是研究工作,旨在了解德里市部分大城市的水公用事业消费,使用数据分析,旨在了解消费者的每户消费和基于客户分析的客户细分。
{"title":"Water utility management using Data Analytics and Geospatial Analytics for state of Delhi","authors":"Ankita Gupta, Abhishek Singhal, A. Sabitha, T. Choudhury","doi":"10.1109/ICGCIOT.2018.8752970","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752970","url":null,"abstract":"Over the years the utility-customer relationship has rapidly transformed with vast number of factors affecting consumption including environmental factors like geography, weather, population, migration etc. Over the years the utility-customer relationship has rapidly transformed with vast number of factors affecting consumption including environmental factors like geography, weather, population, migration etc. The research work focuses on implementing a data driven approach towards understanding the water utility management, finding loopholes in demand supply patterns and customer base analysis using data analytics methods and geospatial approach. The first half focuses research work aims at understanding the water utility consumption in metropolitan city of parts of City of Delhi, using data analytics that aims at understanding per household consumption of consumers and segmentation of customers based on customer profiling.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125647555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Automated System for Identification of Fire and Behaviour of Prisoners Through Posture Using IOT 使用物联网通过姿势自动识别囚犯的火力和行为的系统
S. Nandyal, Soumya Mugali
Prisoners are very dangerous and it’s very difficult for the police department to monitor them because, there are chances that the prisoners can try to escape from the prison. To overcome this problem, the present work has been proposed. The work deals with design and development of an automated system to analyze the posture and behavior of the prisoners using the sensors namely, accelerometer sensors and smoke sensor. The sensors are placed on the body of the prisoner mainly, arm, leg and back part. The sensor values will be uploaded on to the cloud periodically. Whenever, the prisoner makes a movement to escape or any misbehavior activities are found, the updated sensor values alert the admin that the prisoner is trying to escape.
囚犯非常危险,警察部门很难监控他们,因为囚犯有可能试图逃离监狱。为了克服这一问题,提出了目前的工作。这项工作涉及设计和发展一个自动化系统,利用传感器,即加速度计传感器和烟雾传感器,分析囚犯的姿势和行为。传感器主要安装在囚犯的身体上,手臂、腿和背部。传感器的数据将定期上传到云端。每当发现囚犯有逃跑的动作或任何不当行为时,更新的传感器值就会提醒管理人员囚犯正在试图逃跑。
{"title":"An Automated System for Identification of Fire and Behaviour of Prisoners Through Posture Using IOT","authors":"S. Nandyal, Soumya Mugali","doi":"10.1109/ICGCIOT.2018.8753041","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753041","url":null,"abstract":"Prisoners are very dangerous and it’s very difficult for the police department to monitor them because, there are chances that the prisoners can try to escape from the prison. To overcome this problem, the present work has been proposed. The work deals with design and development of an automated system to analyze the posture and behavior of the prisoners using the sensors namely, accelerometer sensors and smoke sensor. The sensors are placed on the body of the prisoner mainly, arm, leg and back part. The sensor values will be uploaded on to the cloud periodically. Whenever, the prisoner makes a movement to escape or any misbehavior activities are found, the updated sensor values alert the admin that the prisoner is trying to escape.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133534658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Analysis of Passwords 密码的实证分析
Pushpa Sk, Manjunath T.N, Gireesh Babu C N, Syed Furqan Azeez
Almost every application and web service you join, require you to come with a password which is robust and strong enough to evade attacks. Password strength is a measure of degree to which a password is effective to any random attack. The strength of a password is a combination of length, numbers, complexity and randomness.The need to analyse the strength of a password is to flag weak passwords in order to improve password security. Although, there is not any rule that states a good password but certain guidelines can be followed to differentiate bad passwords. This paper primarily focuses on various authentication threats, steps to mitigate the threats and analysis of password strengths.
你加入的几乎每个应用程序和web服务都要求你提供一个足够强大的密码,以逃避攻击。密码强度是衡量密码对任何随机攻击有效的程度。密码的强度是长度、数字、复杂性和随机性的组合。分析密码强度的需要是标记弱密码,以提高密码安全性。虽然,没有任何规则规定一个好的密码,但可以遵循某些指导方针来区分坏密码。本文主要关注各种身份验证威胁、缓解威胁的步骤以及密码强度的分析。
{"title":"An Empirical Analysis of Passwords","authors":"Pushpa Sk, Manjunath T.N, Gireesh Babu C N, Syed Furqan Azeez","doi":"10.1109/ICGCIOT.2018.8753109","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753109","url":null,"abstract":"Almost every application and web service you join, require you to come with a password which is robust and strong enough to evade attacks. Password strength is a measure of degree to which a password is effective to any random attack. The strength of a password is a combination of length, numbers, complexity and randomness.The need to analyse the strength of a password is to flag weak passwords in order to improve password security. Although, there is not any rule that states a good password but certain guidelines can be followed to differentiate bad passwords. This paper primarily focuses on various authentication threats, steps to mitigate the threats and analysis of password strengths.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Customer Churn in the Telecom Industry Using Data Analytics 使用数据分析预测电信行业的客户流失
P. S, Rohit Rayapeddi
Around the world, the telecommunications industry is rapidly expanding, as we are entering into a smartphone dominated era. Internet availability is now cited as a basic necessity and requirement for the generation today. With this, comes a competition amongst service providers to provide the best services to customers, along with the best prices to retain the already existing ones. Customers may choose to leave, for reasons known or unknown due to their experiences with a certain provider. Churn, simply put, is the process where a customer suspends or cancels his/her service with a provider. This paper presents a solution to this problem by recognizing those who may sway towards leaving, providing a vital solution to companies as retentive of existing customer is much easier than securing a new customer. Predictive, unsupervised models can organize and prevent such situations and can tell us what to expect in the near future. The research done here is an application of Logistic regression, Random Forests and K - Means clustering with the help of R - to predict churn. The data set consists of 3400 instances were considered in the dataset and 19 out of 22 attributes being decisive in the process of prediction.
在全球范围内,随着我们进入智能手机主导的时代,电信行业正在迅速扩张。互联网的可用性现在被认为是当今这一代人的基本必需品和要求。随之而来的是服务提供商之间的竞争,他们为客户提供最好的服务,同时以最优惠的价格保留现有的服务。客户可能会选择离开,原因是已知的或未知的,这是由于他们在某个供应商的经历。简单地说,客户流失是指客户暂停或取消与供应商的服务的过程。本文通过认识到那些可能倾向于离开的人,提出了解决这个问题的方法,为公司提供了一个重要的解决方案,因为保留现有客户比获得新客户要容易得多。预测性的、无监督的模型可以组织和预防这种情况,并可以告诉我们在不久的将来会发生什么。本文所做的研究是运用Logistic回归、随机森林和K -均值聚类在R -的帮助下预测客户流失。该数据集由3400个实例组成,其中22个属性中有19个在预测过程中起决定性作用。
{"title":"Predicting Customer Churn in the Telecom Industry Using Data Analytics","authors":"P. S, Rohit Rayapeddi","doi":"10.1109/ICGCIOT.2018.8753096","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753096","url":null,"abstract":"Around the world, the telecommunications industry is rapidly expanding, as we are entering into a smartphone dominated era. Internet availability is now cited as a basic necessity and requirement for the generation today. With this, comes a competition amongst service providers to provide the best services to customers, along with the best prices to retain the already existing ones. Customers may choose to leave, for reasons known or unknown due to their experiences with a certain provider. Churn, simply put, is the process where a customer suspends or cancels his/her service with a provider. This paper presents a solution to this problem by recognizing those who may sway towards leaving, providing a vital solution to companies as retentive of existing customer is much easier than securing a new customer. Predictive, unsupervised models can organize and prevent such situations and can tell us what to expect in the near future. The research done here is an application of Logistic regression, Random Forests and K - Means clustering with the help of R - to predict churn. The data set consists of 3400 instances were considered in the dataset and 19 out of 22 attributes being decisive in the process of prediction.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133178160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MQTT Based Monitoring System for Urban Farmers Using ESP32 and Raspberry Pi 基于ESP32和树莓派的MQTT城市农民监测系统
R. Kodali, Aditya Valdas
With rapidly developing technology and the Internet of Things taking the world by storm, easy-to-use and low-cost solutions are being provided to almost any and every application in the world. In a similar way, technological solutions are also now being applied to urban farming, a practice which has gained momentum especially in large cities, to help citizens grow vegetables and the like in their own homes or establishments. Urban farming is now more important than ever in the context of the rapid urbanization and development of smart cities all over the world. It is important that residents in urban areas grow their vegetables, and it is important that they do it the right way. Only then will it be possible, in the future, to sustain ourselves in large cities and places which are not quite accessible by villages where farming is done on a large scale. In this paper, we propose a process of growing and taking care of the plants, so that maximum efficiency is guaranteed in the growth process and also information is generated and shared by the whole community. This information will help us crunch the data and arrive at better decisions. The solution works on sensors monitoring the temperature, humidity, ambient light intensity and soil moisture levels pertaining to a certain plant. These sensors are connected to a device which makes understandable data out of these sensor outputs. This then communicates with a central device which collects information from all such sensors, and displays this on a locally hosted webpage. The content is also shown on a dashboard for comfortable visualization and understanding. It also stores a database which can be referred for future analytics. All the devices used are low-cost and consume low-power, which is ideally suited for IoT applications which focus more on communicating effectively at low costs.
随着快速发展的技术和物联网席卷全球,世界上几乎所有的应用都提供了易于使用和低成本的解决方案。以同样的方式,技术解决方案现在也被应用于城市农业,这种做法在大城市得到了发展,帮助市民在自己的家中或场所种植蔬菜等。在全球快速城市化和智慧城市发展的背景下,城市农业比以往任何时候都更加重要。城市居民种植蔬菜很重要,而且要以正确的方式种植。只有这样,在未来,我们才有可能在大城市和农村无法到达的地方维持我们的生活,因为农村大规模地进行农业生产。在本文中,我们提出了一个种植和照顾植物的过程,从而在生长过程中保证最大的效率,并在整个社区中产生和共享信息。这些信息将帮助我们处理数据,做出更好的决策。该解决方案通过传感器监测特定植物的温度、湿度、环境光照强度和土壤湿度水平。这些传感器连接到一个设备,该设备从这些传感器输出中产生可理解的数据。然后,它与从所有这些传感器收集信息的中心设备通信,并将其显示在本地托管的网页上。内容也显示在仪表板上,便于可视化和理解。它还存储了一个数据库,可以用于将来的分析。所使用的所有设备都是低成本和低功耗的,这非常适合更注重以低成本有效通信的物联网应用。
{"title":"MQTT Based Monitoring System for Urban Farmers Using ESP32 and Raspberry Pi","authors":"R. Kodali, Aditya Valdas","doi":"10.1109/ICGCIOT.2018.8752995","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752995","url":null,"abstract":"With rapidly developing technology and the Internet of Things taking the world by storm, easy-to-use and low-cost solutions are being provided to almost any and every application in the world. In a similar way, technological solutions are also now being applied to urban farming, a practice which has gained momentum especially in large cities, to help citizens grow vegetables and the like in their own homes or establishments. Urban farming is now more important than ever in the context of the rapid urbanization and development of smart cities all over the world. It is important that residents in urban areas grow their vegetables, and it is important that they do it the right way. Only then will it be possible, in the future, to sustain ourselves in large cities and places which are not quite accessible by villages where farming is done on a large scale. In this paper, we propose a process of growing and taking care of the plants, so that maximum efficiency is guaranteed in the growth process and also information is generated and shared by the whole community. This information will help us crunch the data and arrive at better decisions. The solution works on sensors monitoring the temperature, humidity, ambient light intensity and soil moisture levels pertaining to a certain plant. These sensors are connected to a device which makes understandable data out of these sensor outputs. This then communicates with a central device which collects information from all such sensors, and displays this on a locally hosted webpage. The content is also shown on a dashboard for comfortable visualization and understanding. It also stores a database which can be referred for future analytics. All the devices used are low-cost and consume low-power, which is ideally suited for IoT applications which focus more on communicating effectively at low costs.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122644592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Approach for Prohibiting Distributed Denial-OF-Service Using Dynamic Path Identifiers through Inter-Domain Routing 基于域间路由的动态路径标识防止分布式拒绝服务的方法
S. Nandyal, Sabiya Sultana
Lately, there are expanding consequence in utilizing an inter-domain routing objects as Path Identifiers (PIDs). In any case, PIDs utilized in current methodologies are static, which makes simple for attackers to dispatch Distributed Denial-of Service (DDoS) flooding attacks. To deal with this consequence, it gives the consideration for the construction, performance and assessment of DPID, an architecture which utilizes PIDs negotiated amidst adjoining domains as inter-domain routing. In DPID, inter-domain route of PID bridging two domains is preserved as secret and varies dynamically. This system portrays exactly how adjoining domains handle PIDs, in what way it manages continuous communications while PIDs change. It builds 22-node model which holds three domains to authenticate DPID’s usefulness and leads comprehensive simulations to figure out its capability and cost. Outcomes from both experiments and simulations demonstrate that D-PID can effectively prohibit DDoS attacks. In D-PID, it gives the outcome as two contiguous domains frequently update the PIDs amidst them and install new PIDs for packet forwarding into the data plane. Hence, it concludes regardless of whether the attacker acquires PIDs of its destination and later forwards malicious packets successfully, after a particular time period these PIDs turn to be invalid and the following packets will be sent from other path to the destination. Besides, if any attacker strives to retrieve new PIDs and carries DDoS flooding attack, as a matter there will be increment in attacking cost, as well as makes it simple for detecting the attacker.
近年来,利用域间路由对象作为路径标识符(pid)的应用越来越广泛。在任何情况下,当前方法中使用的pid都是静态的,这使得攻击者可以轻松地调度分布式拒绝服务(DDoS)泛滥攻击。为了解决这一问题,本文考虑了DPID的构建、性能和评估,DPID是一种利用相邻域间协商的pid作为域间路由的体系结构。在DPID中,PID桥接两个域的域间路由被保密并动态变化。该系统准确地描述了相邻域如何处理pid,以及在pid变化时以何种方式管理连续通信。建立了包含三个域的22节点模型来验证DPID的有效性,并进行了全面的仿真来计算DPID的能力和成本。实验和仿真结果表明,D-PID可以有效地阻止DDoS攻击。在D-PID中,它给出的结果是两个连续的域频繁地更新它们之间的pid,并安装新的pid以将数据包转发到数据平面。由此得出结论:无论攻击者是否获取到目的地址的pid并成功转发恶意报文,经过一段时间后,这些pid将失效,后续报文将从其他路径发送到目的地址。此外,如果任何攻击者努力检索新的pid并进行DDoS泛洪攻击,则会增加攻击成本,并且使攻击者的检测变得简单。
{"title":"An Approach for Prohibiting Distributed Denial-OF-Service Using Dynamic Path Identifiers through Inter-Domain Routing","authors":"S. Nandyal, Sabiya Sultana","doi":"10.1109/ICGCIOT.2018.8753063","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753063","url":null,"abstract":"Lately, there are expanding consequence in utilizing an inter-domain routing objects as Path Identifiers (PIDs). In any case, PIDs utilized in current methodologies are static, which makes simple for attackers to dispatch Distributed Denial-of Service (DDoS) flooding attacks. To deal with this consequence, it gives the consideration for the construction, performance and assessment of DPID, an architecture which utilizes PIDs negotiated amidst adjoining domains as inter-domain routing. In DPID, inter-domain route of PID bridging two domains is preserved as secret and varies dynamically. This system portrays exactly how adjoining domains handle PIDs, in what way it manages continuous communications while PIDs change. It builds 22-node model which holds three domains to authenticate DPID’s usefulness and leads comprehensive simulations to figure out its capability and cost. Outcomes from both experiments and simulations demonstrate that D-PID can effectively prohibit DDoS attacks. In D-PID, it gives the outcome as two contiguous domains frequently update the PIDs amidst them and install new PIDs for packet forwarding into the data plane. Hence, it concludes regardless of whether the attacker acquires PIDs of its destination and later forwards malicious packets successfully, after a particular time period these PIDs turn to be invalid and the following packets will be sent from other path to the destination. Besides, if any attacker strives to retrieve new PIDs and carries DDoS flooding attack, as a matter there will be increment in attacking cost, as well as makes it simple for detecting the attacker.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124963197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Internet of Things in Fast Moving Consumer Goods Sector to increase Business Efficiency 物联网在快速消费品领域的应用,提高业务效率
Pramod Kumar Sagar, Kanika Garg, Chiranjit Dutta
Internet of Things (IoT) has its footsteps in almost each and every aspect of living, whether it being personal or professional. It aims to make living better by making physical devices smarter. With its immense applications in fields like agriculture, wearables, poultry, etc., it is also invading Fast Moving Consumer Goods (FMCG) sector. FMCG and IoT together can bring a revolution in the field of business marketing. IoT can help FMCG to increase productivity, improve product quality, generate revenues, maintain customer satisfaction and enhance visibility by measuring, analyzing and monitoring product quality with the help of sensors. IoT can be applied in each and every segment of FMCG sector like production, inventory management, sales and marketing, product management, customer relationship management (CRM), etc., this research paper aims to put forth the relationship between IoT and FMCG sector and also show how it can be used to gain business efficiency. The paper proposes a design on how IoT can be used in three primarily segments (production, distribution and marketing) of FMCG sector. Radio Frequency Identification (RFID) technology is the main methodology used for proposing the design of IoT based FMCG sector. The paper combines various innovation of IoT in different industries and concludes by proposing a theoretical and partially implemented model.
物联网(IoT)几乎渗透到了生活的方方面面,无论是个人生活还是职业生活。它的目标是通过使物理设备更智能,让生活更美好。随着它在农业、可穿戴设备、家禽等领域的巨大应用,它也在入侵快速消费品(FMCG)领域。快消品和物联网的结合可以带来商业营销领域的一场革命。物联网可以帮助快速消费品提高生产力,提高产品质量,创造收入,保持客户满意度,并通过传感器测量,分析和监控产品质量来提高可见性。物联网可以应用于快消品行业的每一个环节,如生产、库存管理、销售和营销、产品管理、客户关系管理(CRM)等,本研究论文旨在提出物联网与快消品行业之间的关系,并展示如何利用物联网提高业务效率。本文提出了一个关于物联网如何在快速消费品行业的三个主要部分(生产,分销和营销)中使用的设计。射频识别(RFID)技术是提出基于物联网的快速消费品行业设计的主要方法。本文结合了物联网在不同行业的各种创新,最后提出了一个理论和部分实现的模型。
{"title":"Application of Internet of Things in Fast Moving Consumer Goods Sector to increase Business Efficiency","authors":"Pramod Kumar Sagar, Kanika Garg, Chiranjit Dutta","doi":"10.1109/ICGCIOT.2018.8753033","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753033","url":null,"abstract":"Internet of Things (IoT) has its footsteps in almost each and every aspect of living, whether it being personal or professional. It aims to make living better by making physical devices smarter. With its immense applications in fields like agriculture, wearables, poultry, etc., it is also invading Fast Moving Consumer Goods (FMCG) sector. FMCG and IoT together can bring a revolution in the field of business marketing. IoT can help FMCG to increase productivity, improve product quality, generate revenues, maintain customer satisfaction and enhance visibility by measuring, analyzing and monitoring product quality with the help of sensors. IoT can be applied in each and every segment of FMCG sector like production, inventory management, sales and marketing, product management, customer relationship management (CRM), etc., this research paper aims to put forth the relationship between IoT and FMCG sector and also show how it can be used to gain business efficiency. The paper proposes a design on how IoT can be used in three primarily segments (production, distribution and marketing) of FMCG sector. Radio Frequency Identification (RFID) technology is the main methodology used for proposing the design of IoT based FMCG sector. The paper combines various innovation of IoT in different industries and concludes by proposing a theoretical and partially implemented model.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114855950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Caries Detection with the Aid of Multilinear Principal Component Analysis and Neural Network 基于多线性主成分分析和神经网络的龋齿检测
Shashikant Patil, V. Kulkarni, A. Bhise
Diagnosis of tooth caries or cavities are regarded as one of the promising research issues for the past two decades. Moreover, several techniques are established to diagnose the tooth demineralization, tooth decaying and re-mineralization. However, the complexity of tooth decaying diagnosis emerges when the surroundings are comparatively multifaceted. Hence, for solving such issues, this paper establishes caries diagnosing model. Here, the feature selection is dependent on Multilinear Principal Component Analysis (MPCA). In addition, the classification is performed by exploiting well-known classifier known as Neural Network (NN).
在过去的二十年里,龋齿或蛀牙的诊断被认为是一个有前途的研究问题。建立了牙齿脱矿、蛀牙和再矿化的诊断方法。然而,当周围环境相对复杂时,蛀牙诊断的复杂性就显现出来了。因此,为了解决这一问题,本文建立了龋病诊断模型。在这里,特征选择依赖于多线性主成分分析(MPCA)。此外,分类是利用著名的分类器神经网络(NN)来完成的。
{"title":"Caries Detection with the Aid of Multilinear Principal Component Analysis and Neural Network","authors":"Shashikant Patil, V. Kulkarni, A. Bhise","doi":"10.1109/ICGCIoT.2018.8753002","DOIUrl":"https://doi.org/10.1109/ICGCIoT.2018.8753002","url":null,"abstract":"Diagnosis of tooth caries or cavities are regarded as one of the promising research issues for the past two decades. Moreover, several techniques are established to diagnose the tooth demineralization, tooth decaying and re-mineralization. However, the complexity of tooth decaying diagnosis emerges when the surroundings are comparatively multifaceted. Hence, for solving such issues, this paper establishes caries diagnosing model. Here, the feature selection is dependent on Multilinear Principal Component Analysis (MPCA). In addition, the classification is performed by exploiting well-known classifier known as Neural Network (NN).","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124019851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study of load balancing algorithms for Cloud Computing 云计算负载均衡算法研究
Vidya S. Handur, Supriya Belkar, S. Deshpande, Prakash Marakumbi
The significance of distributed applications is constantly rising due to technological advancements such as increasing internetworking of various computing devices and widespread usage of smart phones. Cloud computing is an information technology paradigm that enables ubiquitous access to shared pools of configurable system resources. Load balancing is one among various challenging issues in cloud computing. It is a mechanism to distribute the user requests among the virtual machines so that the requests are assigned proportional to the capacity of each virtual machine. Balancing of requests prevents the virtual machines from being either overloaded or under loaded. This paper presents a comparison of performance of load balancing algorithms in cloud computing. The algorithms considered for study are Throttled and Equally Spread Current Execution. Particle swarm optimization is also simulated to solve load balancing dynamically. The proposed work compares response time of all the three techniques. The simulation results show that particle swarm optimization performs better for dynamic changes in the system.
随着各种计算设备互联程度的提高和智能手机的广泛使用等技术的进步,分布式应用的重要性不断提高。云计算是一种信息技术范例,它支持无处不在地访问可配置系统资源的共享池。负载平衡是云计算中各种具有挑战性的问题之一。它是一种在虚拟机之间分配用户请求的机制,以便根据每个虚拟机的容量按比例分配请求。请求平衡可以防止虚拟机过载或负载不足。本文对云计算中各种负载均衡算法的性能进行了比较。研究考虑的算法是节流和等扩散电流执行。模拟粒子群算法求解动态负载均衡问题。提出的工作比较了所有三种技术的响应时间。仿真结果表明,粒子群算法对于系统的动态变化具有较好的性能。
{"title":"Study of load balancing algorithms for Cloud Computing","authors":"Vidya S. Handur, Supriya Belkar, S. Deshpande, Prakash Marakumbi","doi":"10.1109/ICGCIOT.2018.8753091","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753091","url":null,"abstract":"The significance of distributed applications is constantly rising due to technological advancements such as increasing internetworking of various computing devices and widespread usage of smart phones. Cloud computing is an information technology paradigm that enables ubiquitous access to shared pools of configurable system resources. Load balancing is one among various challenging issues in cloud computing. It is a mechanism to distribute the user requests among the virtual machines so that the requests are assigned proportional to the capacity of each virtual machine. Balancing of requests prevents the virtual machines from being either overloaded or under loaded. This paper presents a comparison of performance of load balancing algorithms in cloud computing. The algorithms considered for study are Throttled and Equally Spread Current Execution. Particle swarm optimization is also simulated to solve load balancing dynamically. The proposed work compares response time of all the three techniques. The simulation results show that particle swarm optimization performs better for dynamic changes in the system.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126892740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1