首页 > 最新文献

2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)最新文献

英文 中文
Security Framework for IoT and Fog Computing Networks 物联网和雾计算网络安全框架
Dominik Soukup, Ondřej Hujňák, Simon Štefunko, Radek Krejcí, Erik Gresak
Our environment becomes more and more interconnected. Various devices like refrigerators, doors or light bulbs communicate over different networks and provide information for applications that are supposed to make our lives easier and more comfortable. However, such data provide sensitive information about our presence or habits and become captivating for network attackers. It is very challenging to detect incidents in heterogeneous IoT networks where different devices come in and out or change their network profiles quite frequently. We propose a security framework for IoT and fog computing networks to address these challenges. Our framework is very flexible and designed even for devices with limited computational power. All components can be deployed on one network node or distributed among many, which also allows easy scalability. Part of our solution is software IoT gateway that provides the capability to analyse traffic from non-IP IoT sensors. This project covers full-stack security solution because it contains collectors, detectors and management tools. This framework has only software components with no relation to any specific hardware device. It is developed as an open-source project and it is publicly available for the worldwide community. Currently developed detectors detect identified vulnerabilities for Z-Wave, Long Range Wide Area Network (Lo-RaWAN), BLE and IP based IoT protocols.
我们的环境变得越来越相互联系。冰箱、门或灯泡等各种设备通过不同的网络进行通信,并为应用程序提供信息,这些应用程序本应使我们的生活更轻松、更舒适。然而,这些数据提供了关于我们的存在或习惯的敏感信息,并成为网络攻击者的吸引力。在异构物联网网络中,检测不同设备进出或频繁更改其网络配置文件的事件非常具有挑战性。我们提出了一个物联网和雾计算网络的安全框架来应对这些挑战。我们的框架非常灵活,甚至为计算能力有限的设备设计。所有组件都可以部署在一个网络节点上,也可以分布在多个网络节点上,这也允许容易的可伸缩性。我们的解决方案的一部分是软件物联网网关,提供分析来自非ip物联网传感器的流量的能力。该项目涵盖了全栈安全解决方案,因为它包含收集器、检测器和管理工具。这个框架只有软件组件,与任何特定的硬件设备没有关系。它是作为一个开源项目开发的,它对全球社区公开可用。目前开发的探测器可检测Z-Wave、远程广域网(Lo-RaWAN)、BLE和基于IP的物联网协议的已识别漏洞。
{"title":"Security Framework for IoT and Fog Computing Networks","authors":"Dominik Soukup, Ondřej Hujňák, Simon Štefunko, Radek Krejcí, Erik Gresak","doi":"10.1109/I-SMAC47947.2019.9032592","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032592","url":null,"abstract":"Our environment becomes more and more interconnected. Various devices like refrigerators, doors or light bulbs communicate over different networks and provide information for applications that are supposed to make our lives easier and more comfortable. However, such data provide sensitive information about our presence or habits and become captivating for network attackers. It is very challenging to detect incidents in heterogeneous IoT networks where different devices come in and out or change their network profiles quite frequently. We propose a security framework for IoT and fog computing networks to address these challenges. Our framework is very flexible and designed even for devices with limited computational power. All components can be deployed on one network node or distributed among many, which also allows easy scalability. Part of our solution is software IoT gateway that provides the capability to analyse traffic from non-IP IoT sensors. This project covers full-stack security solution because it contains collectors, detectors and management tools. This framework has only software components with no relation to any specific hardware device. It is developed as an open-source project and it is publicly available for the worldwide community. Currently developed detectors detect identified vulnerabilities for Z-Wave, Long Range Wide Area Network (Lo-RaWAN), BLE and IP based IoT protocols.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127733903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Block Chain Technology towards Identity Management in Health Care Application 区块链技术在医疗保健身份管理中的应用
G. Shobana, M. Suguna
Blockchain is decentralized architecture, where data are stored in the form of blocks for processing. The data has to be transferred from one person to another with safety and security and updated with smart contract in the blockchain. But there are some challenges such as data spoofing, integrity, authentication of the data. In the health sector the privacy of the patients' data has to be maintained. The proposed system, “Insurance Management in Healthcare Sector” uses blockchain combined with identity management to access the identity of a person when authorized by the person. After verifying the details, the insured amount will be transferred to the policy holder or the hospital with the help of matching smart contracts in the blockchain of the Ethereum platform. As a result, the insurance claim can reach the policy holder who has initiated the claim process with proof of work. The other use cases such as health care industries, social media networks are also discussed and the analysis of how the blockchain can be used in various fields.
区块链是一种去中心化的架构,其中数据以块的形式存储以供处理。数据必须在安全的情况下从一个人转移到另一个人,并在bb0中使用智能合约进行更新。但也存在数据欺骗、数据完整性、数据身份验证等问题。在卫生部门,必须维护病人数据的隐私。拟议的系统“医疗保健部门的保险管理”使用区块链和身份管理相结合,在获得个人授权时访问该人的身份。在核实细节后,通过匹配以太坊平台区块链中的智能合约,将保险金额转账给投保人或医院。因此,保险索赔可以送达带有工作证明的启动索赔流程的保单持有人。还讨论了其他用例,如医疗保健行业、社交媒体网络,并分析了区块链如何在各个领域中使用。
{"title":"Block Chain Technology towards Identity Management in Health Care Application","authors":"G. Shobana, M. Suguna","doi":"10.1109/I-SMAC47947.2019.9032472","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032472","url":null,"abstract":"Blockchain is decentralized architecture, where data are stored in the form of blocks for processing. The data has to be transferred from one person to another with safety and security and updated with smart contract in the blockchain. But there are some challenges such as data spoofing, integrity, authentication of the data. In the health sector the privacy of the patients' data has to be maintained. The proposed system, “Insurance Management in Healthcare Sector” uses blockchain combined with identity management to access the identity of a person when authorized by the person. After verifying the details, the insured amount will be transferred to the policy holder or the hospital with the help of matching smart contracts in the blockchain of the Ethereum platform. As a result, the insurance claim can reach the policy holder who has initiated the claim process with proof of work. The other use cases such as health care industries, social media networks are also discussed and the analysis of how the blockchain can be used in various fields.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131009656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Compact Low Loss Onchip Bandpass Filter For 5G Radio Front End Using Integrated Passive Device Technology 采用集成无源器件技术的5G无线电前端紧凑型低损耗片上带通滤波器
V. R. Machavaram, B. Nistala
A compact very low loss onchip bandpass filter which suits the 5G radio frequency front end (RFFE) filtering requirements, is reported here. The proposed filter is modeled using $0.18 mumathrm{m}$ CMOS Silicon substrate IPD technology. A series LC resonant onchip BPF structure is designed and simulated by combining a passive multilayer (ML) spiral inductor and a planar spiral capacitor in High Frequency Structural Simulator (HFSS) at component level. The filter showed a quality factor (Q) value of 7.3125 and a fractional bandwidth of 13% (< 20%). It had exhibited very good insertion loss of −0.415 dB and also excellent return loss of −42.9 dB, at a self-resonant (SRF) frequency of 3.5 GHz. The physical dimensions of the Inductor, Capacitor and bandpass filter are $340times 240 mumathrm{m}^{2},quad 280times 240 mumathrm{m}^{2}$ and $480times 240 mumathrm{m}^{2}$ respectively. It had demonstrated with an excellent loss along with a narrow passband characteristics, still occupying very small onchip area. Hence, this compact resonator filter definitely suits the 5G front end filter applications. We simulated this filter by focusing around 3.5 GHz, as this spectral band is used in 4G and also being actively considered for several 5G trials and installations across several countries.
本文报道了一种紧凑型极低损耗片上带通滤波器,适合5G射频前端(RFFE)滤波要求。该滤波器采用$0.18 mu mathm {m}$ CMOS硅衬底IPD技术建模。采用无源多层螺旋电感与平面螺旋电容相结合的方法,在高频结构模拟器(HFSS)中设计并仿真了串联LC谐振片上BPF结构。该滤波器的质量因子(Q)值为7.3125,分数带宽为13%(< 20%)。在自谐振(SRF)频率为3.5 GHz时,其插入损耗为- 0.415 dB,回波损耗为- 42.9 dB。电感器、电容和带通滤波器的物理尺寸分别为$340乘以240 mu mathm {m}^{2}, $ quad 280乘以240 mu mathm {m}^{2}$和$480乘以240 mu mathm {m}^{2}$。实验证明,该芯片具有良好的损耗和窄通带特性,且占用的片上面积很小。因此,这款紧凑型谐振器滤波器绝对适合5G前端滤波器应用。我们通过聚焦3.5 GHz左右来模拟该滤波器,因为该频段用于4G,并且正在积极考虑在几个国家进行几次5G试验和安装。
{"title":"A Compact Low Loss Onchip Bandpass Filter For 5G Radio Front End Using Integrated Passive Device Technology","authors":"V. R. Machavaram, B. Nistala","doi":"10.1109/I-SMAC47947.2019.9032445","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032445","url":null,"abstract":"A compact very low loss onchip bandpass filter which suits the 5G radio frequency front end (RFFE) filtering requirements, is reported here. The proposed filter is modeled using $0.18 mumathrm{m}$ CMOS Silicon substrate IPD technology. A series LC resonant onchip BPF structure is designed and simulated by combining a passive multilayer (ML) spiral inductor and a planar spiral capacitor in High Frequency Structural Simulator (HFSS) at component level. The filter showed a quality factor (Q) value of 7.3125 and a fractional bandwidth of 13% (< 20%). It had exhibited very good insertion loss of −0.415 dB and also excellent return loss of −42.9 dB, at a self-resonant (SRF) frequency of 3.5 GHz. The physical dimensions of the Inductor, Capacitor and bandpass filter are $340times 240 mumathrm{m}^{2},quad 280times 240 mumathrm{m}^{2}$ and $480times 240 mumathrm{m}^{2}$ respectively. It had demonstrated with an excellent loss along with a narrow passband characteristics, still occupying very small onchip area. Hence, this compact resonator filter definitely suits the 5G front end filter applications. We simulated this filter by focusing around 3.5 GHz, as this spectral band is used in 4G and also being actively considered for several 5G trials and installations across several countries.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128994307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recognizing Presence of Hematological Disease using Deep Learning 利用深度学习识别血液病的存在
Bhagyeshri Darane, Prathamesh Rajput, Yogesh Sondagar, Reeta Koshy
Accurate classification and counting of blood components is crucial in detection of illnesses of an individual. The widely used methods to count blood components are manual counting and hematology analyzer. With advancement in the field of image processing and machine learning, new and better methods are available for counting and classifying blood components. Deep leaning is training the computer with labelled data for classification tasks. Such techniques have shown high performance and accuracy. Most Deep learning models uses neural network architecture. One of the most popular type of deep learning model is Convolutional Neural Network. CNN convolves learned features with input data, and uses 2D convolutional layers, making this architecture well suited to processing 2D data, such as images. CNN's extract the features from the image automatically using numerous hidden layers. Most Deep learning models use transfer learning that is fine-tuning a pre-trained model. RCNN stands for Region based CNN. Unlike CNN which is used for image classification, RCNN is used for object detection. Thus in this paper, we have proposed a method to classify various components of blood : RBCs, WBCs (Monocyte, Lymphocytes, Eosinophils, Neutrophils and Basophils) and find their count from a microscopic blood image using Faster R-CNN model. Thus generating a CBC (Complete Blood Count) report which can be used by medical professionals to diagnose, suggest tests and treatments to their patients.
血液成分的准确分类和计数对个体疾病的检测至关重要。目前广泛使用的血液成分计数方法是人工计数和血液分析仪。随着图像处理和机器学习领域的进步,新的更好的方法可以用于计数和分类血液成分。深度学习是用标记数据训练计算机进行分类任务。这些技术已经显示出很高的性能和准确性。大多数深度学习模型使用神经网络架构。最流行的深度学习模型之一是卷积神经网络。CNN将学习到的特征与输入数据进行卷积,并使用二维卷积层,使得该架构非常适合处理二维数据,如图像。CNN使用许多隐藏层自动从图像中提取特征。大多数深度学习模型使用迁移学习,这是对预训练模型的微调。RCNN代表基于区域的CNN。与CNN用于图像分类不同,RCNN用于目标检测。因此,在本文中,我们提出了一种方法来分类血液中的各种成分:红细胞,白细胞(单核细胞,淋巴细胞,嗜酸性粒细胞,中性粒细胞和嗜碱性粒细胞),并从显微镜下的血液图像中使用Faster R-CNN模型找到它们的计数。从而产生CBC(全血细胞计数)报告,可用于医疗专业人员诊断,建议测试和治疗他们的病人。
{"title":"Recognizing Presence of Hematological Disease using Deep Learning","authors":"Bhagyeshri Darane, Prathamesh Rajput, Yogesh Sondagar, Reeta Koshy","doi":"10.1109/I-SMAC47947.2019.9032639","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032639","url":null,"abstract":"Accurate classification and counting of blood components is crucial in detection of illnesses of an individual. The widely used methods to count blood components are manual counting and hematology analyzer. With advancement in the field of image processing and machine learning, new and better methods are available for counting and classifying blood components. Deep leaning is training the computer with labelled data for classification tasks. Such techniques have shown high performance and accuracy. Most Deep learning models uses neural network architecture. One of the most popular type of deep learning model is Convolutional Neural Network. CNN convolves learned features with input data, and uses 2D convolutional layers, making this architecture well suited to processing 2D data, such as images. CNN's extract the features from the image automatically using numerous hidden layers. Most Deep learning models use transfer learning that is fine-tuning a pre-trained model. RCNN stands for Region based CNN. Unlike CNN which is used for image classification, RCNN is used for object detection. Thus in this paper, we have proposed a method to classify various components of blood : RBCs, WBCs (Monocyte, Lymphocytes, Eosinophils, Neutrophils and Basophils) and find their count from a microscopic blood image using Faster R-CNN model. Thus generating a CBC (Complete Blood Count) report which can be used by medical professionals to diagnose, suggest tests and treatments to their patients.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131614795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Greenhouse Monitoring and Controlling using Modified K Means Clustering Algorithm 改进K均值聚类算法的温室监测与控制
B. Neethu, S. Jayanthy, J JudesonAntonyKovilpillai.
An embedded system is developed for monitoring and controlling the parameters that affect the growth of plants using STM32F401RE ARM Cortex M4 based Microcontrollers. Parameters such as Light intensity, Soil Moisture, CO2, Temperature, are monitored. The measured values are processed using Modified K Means Clustering Algorithm to find if the values are needed to be optimized to the required level to enhance the plant growth. The results are compared with the Traditional K-Means Clustering algorithm. The results indicate that the proposed algorithm gives better results in terms of accuracy and execution time compared to traditional one. The data that are measured and predicted are viewed using Cool Term.
采用基于ARM Cortex M4的STM32F401RE微控制器,开发了一种用于监测和控制影响植物生长参数的嵌入式系统。监测光照强度、土壤湿度、二氧化碳、温度等参数。利用改进K均值聚类算法对测量值进行处理,以确定是否需要将测量值优化到所需水平以促进植物生长。结果与传统的k -均值聚类算法进行了比较。结果表明,该算法在精度和执行时间上都优于传统算法。使用Cool Term查看测量和预测的数据。
{"title":"Greenhouse Monitoring and Controlling using Modified K Means Clustering Algorithm","authors":"B. Neethu, S. Jayanthy, J JudesonAntonyKovilpillai.","doi":"10.1109/I-SMAC47947.2019.9032656","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032656","url":null,"abstract":"An embedded system is developed for monitoring and controlling the parameters that affect the growth of plants using STM32F401RE ARM Cortex M4 based Microcontrollers. Parameters such as Light intensity, Soil Moisture, CO2, Temperature, are monitored. The measured values are processed using Modified K Means Clustering Algorithm to find if the values are needed to be optimized to the required level to enhance the plant growth. The results are compared with the Traditional K-Means Clustering algorithm. The results indicate that the proposed algorithm gives better results in terms of accuracy and execution time compared to traditional one. The data that are measured and predicted are viewed using Cool Term.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115389711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Electrically Tilted Broadband Antenna using Negative Refractive Index material 使用负折射率材料的电倾斜宽带天线
T. Upadhyaya, Riki H. Patel, A. Desai, Upesh Patel, K. Pandya, K. Kaur
A negative refractive index material loaded wideband patch resonator is presented for the wireless applications. The negative refraction has been achieved by creating a semi-circular and linear defect in the antenna ground plane. The antenna demonstrates an electrical tilt. This presents the ability to keep the communication module mechanically vertical. The engineered metallic strip excites the resonance mode. The structure of the metallic strip is a modification of thin wire and split-ring resonator (SRR) which are responsible for negative values of permeability and permittivity respectively. The finite truncated ground plane significantly helps to improve the antenna bandwidth. The antenna has an electrical length of $0.65lambda times 0.65lambda$ where $lambda$ is the wavelength at lowest resonance. The resonating frequencies of antenna are 2.46, 3.5, and 5.5 GigaHertz, respectively. The antenna has impedance bandwidth of 8.94%, 14.57% and 8.72% for the presented center frequencies respectively. The antenna prototype was fabricated where measured and simulated results show good correlation.
提出了一种用于无线应用的负折射率材料加载宽带贴片谐振器。负折射是通过在天线地平面上产生半圆形和线性缺陷来实现的。天线显示出电倾斜。这提供了保持通信模块机械垂直的能力。工程金属条激发共振模式。金属条的结构是由细线和裂环谐振器(SRR)的结构改造而成的,这两种结构分别造成了磁导率和介电常数的负值。有限截断地平面对提高天线带宽有显著的帮助。天线的电长度为$0.65lambda 乘以$0.65lambda $,其中$lambda$为最低共振波长。天线的谐振频率分别为2.46、3.5和5.5 ghz。在给定的中心频率下,天线的阻抗带宽分别为8.94%、14.57%和8.72%。制作了天线样机,测量结果与仿真结果具有良好的相关性。
{"title":"Electrically Tilted Broadband Antenna using Negative Refractive Index material","authors":"T. Upadhyaya, Riki H. Patel, A. Desai, Upesh Patel, K. Pandya, K. Kaur","doi":"10.1109/I-SMAC47947.2019.9032570","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032570","url":null,"abstract":"A negative refractive index material loaded wideband patch resonator is presented for the wireless applications. The negative refraction has been achieved by creating a semi-circular and linear defect in the antenna ground plane. The antenna demonstrates an electrical tilt. This presents the ability to keep the communication module mechanically vertical. The engineered metallic strip excites the resonance mode. The structure of the metallic strip is a modification of thin wire and split-ring resonator (SRR) which are responsible for negative values of permeability and permittivity respectively. The finite truncated ground plane significantly helps to improve the antenna bandwidth. The antenna has an electrical length of $0.65lambda times 0.65lambda$ where $lambda$ is the wavelength at lowest resonance. The resonating frequencies of antenna are 2.46, 3.5, and 5.5 GigaHertz, respectively. The antenna has impedance bandwidth of 8.94%, 14.57% and 8.72% for the presented center frequencies respectively. The antenna prototype was fabricated where measured and simulated results show good correlation.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127589508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Light Weight Secure Data Sharing Scheme for Mobile Cloud Computing 面向移动云计算的轻量级安全数据共享方案
Sunanda Nalajala, K. Akhil, V. Sai, D. Shekhar, Praveen Tumuluru
Nowadays more and more data is stored and retrieved through Cloud Computing. With advancement there arises a problem in security. This means the data can be decrypted easily and the content being accessed by strangers and the privacy of the data will be lost. We have introduced a new algorithm known as “Cipher Attribute Based Encryption Algorithm” with symmetric key in our newly proposed light weight data sharing scheme for mobile cloud computing. Light weight in the sense, data with a fairly light storage capacity like files, audio clips etc. will be secured based on our proposed concept LDSS. The LDSS structure is modified and used as an access control in Cipher Attribute Based Encryption (CP-ABE). To reduce the user cost, it introduced attribute description fields to implement lazy revocation which is difficult in CP-ABE working systems. Everything in this operation might not be applicable in all mobile devices because the components are small and flexibility is less. The results from this paper show the issues related to data privacy have been solved in most cases for light weight data sharing scheme.
如今,越来越多的数据通过云计算进行存储和检索。随着技术的进步,安全问题也随之而来。这意味着数据可以很容易地解密,内容被陌生人访问,数据的隐私将丢失。我们在新提出的移动云计算轻量级数据共享方案中引入了一种新的算法,称为“基于密码属性的对称密钥加密算法”。轻量级的意思是,基于我们提出的LDSS概念,具有相当轻的存储容量的数据(如文件、音频剪辑等)将得到保护。对LDSS结构进行了改进,并将其作为基于密码属性的加密(CP-ABE)中的访问控制。为了降低用户成本,引入了属性描述字段,实现了在CP-ABE工作系统中难以实现的延迟撤销。此操作中的所有内容可能并不适用于所有移动设备,因为组件较小,灵活性较差。结果表明,轻量级数据共享方案在大多数情况下都解决了数据隐私问题。
{"title":"Light Weight Secure Data Sharing Scheme for Mobile Cloud Computing","authors":"Sunanda Nalajala, K. Akhil, V. Sai, D. Shekhar, Praveen Tumuluru","doi":"10.1109/I-SMAC47947.2019.9032618","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032618","url":null,"abstract":"Nowadays more and more data is stored and retrieved through Cloud Computing. With advancement there arises a problem in security. This means the data can be decrypted easily and the content being accessed by strangers and the privacy of the data will be lost. We have introduced a new algorithm known as “Cipher Attribute Based Encryption Algorithm” with symmetric key in our newly proposed light weight data sharing scheme for mobile cloud computing. Light weight in the sense, data with a fairly light storage capacity like files, audio clips etc. will be secured based on our proposed concept LDSS. The LDSS structure is modified and used as an access control in Cipher Attribute Based Encryption (CP-ABE). To reduce the user cost, it introduced attribute description fields to implement lazy revocation which is difficult in CP-ABE working systems. Everything in this operation might not be applicable in all mobile devices because the components are small and flexibility is less. The results from this paper show the issues related to data privacy have been solved in most cases for light weight data sharing scheme.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121896416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Text to vector image conversion and Adaptive Resonance Theory applied for Crisis communication 文本到矢量图像的转换和自适应共振理论在危机传播中的应用
Padmaveni Krishnan, D. Aravindhar, D. P. Kumar
The fast and up-to-date communication of disaster and recovery information during crisis plays a very important role in victims' life. Most of the information will reach as text and could be communicated as such. But this needs proper network coverage. In this research paper, a new software is developed to convert the text into vector images ie., syntagms into signagrams, and groups the crisis into categories using adaptive resonance theory. The proposed software can be used for delivering a quick and effective communication during crisis.
危机中快速、及时的灾后恢复信息沟通对受害者的生活起着非常重要的作用。大多数信息将以文本形式送达,并可以以文本形式进行交流。但这需要适当的网络覆盖。本文开发了一种将文本转换为矢量图像的软件。使用自适应共振理论将危机分类。所提出的软件可用于在危机期间提供快速有效的沟通。
{"title":"Text to vector image conversion and Adaptive Resonance Theory applied for Crisis communication","authors":"Padmaveni Krishnan, D. Aravindhar, D. P. Kumar","doi":"10.1109/I-SMAC47947.2019.9032609","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032609","url":null,"abstract":"The fast and up-to-date communication of disaster and recovery information during crisis plays a very important role in victims' life. Most of the information will reach as text and could be communicated as such. But this needs proper network coverage. In this research paper, a new software is developed to convert the text into vector images ie., syntagms into signagrams, and groups the crisis into categories using adaptive resonance theory. The proposed software can be used for delivering a quick and effective communication during crisis.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123083906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Machine learning based Social Media and Sentiment analysis for medical data applications 基于机器学习的社交媒体和情感分析在医疗数据应用中的研究
R. Meena, V. T. Bai
Due to the rapid advancements in social media, it generates voluminous data in almost different areas of applications. Large amount of potential health related data are being available in large scale in various sources of internet. We explored the small use case of social media data for a particular disease, cancer on three different social media platforms such as google trends, twitter and online forums with the sentiment analysis of the mined text. The study shows that people are more relied on social media for their health related queries and the twitter analysis shows that there is a significant raise in the percentage of positive sentiments in the tweets shared by the organizations and individuals on cancer.
由于社交媒体的快速发展,它在几乎不同的应用领域产生了大量的数据。大量潜在的健康相关数据在互联网的各种来源中大量可用。我们在三个不同的社交媒体平台(如google trends, twitter和在线论坛)上探索了针对特定疾病的社交媒体数据的小用例,并对挖掘的文本进行了情感分析。研究表明,人们更依赖社交媒体来查询与健康相关的问题,推特分析表明,组织和个人分享的关于癌症的推文中积极情绪的比例显著增加。
{"title":"Study on Machine learning based Social Media and Sentiment analysis for medical data applications","authors":"R. Meena, V. T. Bai","doi":"10.1109/I-SMAC47947.2019.9032580","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032580","url":null,"abstract":"Due to the rapid advancements in social media, it generates voluminous data in almost different areas of applications. Large amount of potential health related data are being available in large scale in various sources of internet. We explored the small use case of social media data for a particular disease, cancer on three different social media platforms such as google trends, twitter and online forums with the sentiment analysis of the mined text. The study shows that people are more relied on social media for their health related queries and the twitter analysis shows that there is a significant raise in the percentage of positive sentiments in the tweets shared by the organizations and individuals on cancer.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121848764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Network Security Tools and Applications in Research Perspective 网络安全工具及其应用研究展望
S. Vyshnavi, S. Sree, N. Jayapandian
The modern world technology is civilized, globalized and modernized. The technological development of social networks and e-commerce applications produce larger data. This data communication is major task, because device to device communication need network terminal. This data transmission is not safe because of different types of tools and software available to destroy the existing network. In the field of network security during data transfer from one particular node to other node some security vulnerability is happened this is the one of the critical issue in this sector. The reason for this network security is different types of data attacks are happen in day to day life. It is easy to establish a new network but protecting the entire network is a big issue. This network security is generally two parameter first one is communication and second one is data automation. The network security field is directly or indirectly linked with the concept of data encryption. The development in this network security has taken us to a level that from signature again we came back to thumb print. For example maintain the data secure we use the lock system which is a finger print type. This technology helps us to protect the physical data theft, but logical data theft is still problem for data transmission. This article will brief about the network security it also presents the various network security types. Those types are wired and wireless network security. Apart from the network security the following topics is also discussed in this article. Those are network security protocols and simulation tools in network security. The research problems in network security are privacy and vulnerability of data.
现代世界的技术是文明的、全球化的、现代化的。社交网络和电子商务应用的技术发展产生了更大的数据。由于设备间的通信需要网络终端,因此数据通信是一项重要的任务。这种数据传输是不安全的,因为不同类型的工具和软件可以破坏现有的网络。在网络安全领域中,数据在从一个特定节点到另一个节点的传输过程中会发生一些安全漏洞,这是该领域的关键问题之一。这种网络安全的原因是不同类型的数据攻击发生在日常生活中。建立一个新网络很容易,但保护整个网络是一个大问题。这种网络安全一般有两个参数,一是通信,二是数据自动化。网络安全领域与数据加密的概念有着直接或间接的联系。网络安全的发展已经使我们从签名回到了拇指指纹。例如,维护数据安全,我们使用的锁系统是一种指纹类型。这种技术帮助我们保护了物理数据被盗,但逻辑数据被盗仍然是数据传输的问题。本文将简要介绍网络安全,并介绍各种网络安全类型。这些类型是有线和无线网络安全。除了网络安全,本文还讨论了以下主题。即网络安全协议和网络安全仿真工具。网络安全研究的主要问题是数据的保密性和脆弱性。
{"title":"Network Security Tools and Applications in Research Perspective","authors":"S. Vyshnavi, S. Sree, N. Jayapandian","doi":"10.1109/I-SMAC47947.2019.9032526","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032526","url":null,"abstract":"The modern world technology is civilized, globalized and modernized. The technological development of social networks and e-commerce applications produce larger data. This data communication is major task, because device to device communication need network terminal. This data transmission is not safe because of different types of tools and software available to destroy the existing network. In the field of network security during data transfer from one particular node to other node some security vulnerability is happened this is the one of the critical issue in this sector. The reason for this network security is different types of data attacks are happen in day to day life. It is easy to establish a new network but protecting the entire network is a big issue. This network security is generally two parameter first one is communication and second one is data automation. The network security field is directly or indirectly linked with the concept of data encryption. The development in this network security has taken us to a level that from signature again we came back to thumb print. For example maintain the data secure we use the lock system which is a finger print type. This technology helps us to protect the physical data theft, but logical data theft is still problem for data transmission. This article will brief about the network security it also presents the various network security types. Those types are wired and wireless network security. Apart from the network security the following topics is also discussed in this article. Those are network security protocols and simulation tools in network security. The research problems in network security are privacy and vulnerability of data.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131334950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1