首页 > 最新文献

2012 Fourth International Conference on Advanced Computing (ICoAC)最新文献

英文 中文
Integration based large scale broker's resource management on friendly shopping application in Dynamic Grid computing 基于集成的大型代理资源管理在动态网格计算中的友好购物应用
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416830
R. Surendran, B. Varthini
Dynamic Grid computing is a process of Share the grid balanced resources and services in a large-scale worldwide distributed Environment with fault free run time application. Resource management technique (RMT) jointly works with grid broker for an elastic grid computing. Broker that acts as a middle man to the stock exchange and place trade on behalf of clients. Special care must be taken when using broker in shopping application. Broker based Resource Management (BRM) have a lot of intelligent techniques like Request Deployment, Job Handle, Grid Resource Discovery, Match making, Optimization, Job Migration, Job scheduling, Middleware supports, Meta brokers, Resource brokers, Dispatcher. In BRM, Broker keeps track of information about all the Resource in its resource pool, including their availability, load, network accessibility, usage models, capabilities, and pricing information and the range of computational tasks that they can perform. The resource broker provides pairing services between the service requester (Buyer) and the service provider (supplier). The resource broker selects the best scheduler for the resource execution job, and collaborates with the scheduler to execute the multi tasks. Agents are only responsible for the timely and accurate processing of forms. Its works for some limited agency certified based company that is Agents are working for some particular service provider's company only. But broker work for all companies (all service providers). From the broker's service, all types of services requester (variety of different purchaser) is benefited. Example: Product requester detects the all brands of the particular products details displayed through broker, but agent display only agencies certified company's product details only. Broker is an agent that heads the whole hierarchy, maintaining all service information of the system. Consumers are searching the products from their related Image or text or video through broker based on linear programming solution. Benefits of this shopping system are save the price and get a quality product through broker's suggestion based shopping and location via product ranking based shopping.
动态网格计算是在大规模的全球分布式环境中,以无故障运行时应用程序共享网格均衡的资源和服务的过程。资源管理技术(RMT)与网格代理共同实现弹性网格计算。作为证券交易所的中间人,代表客户进行交易的经纪人。在购物应用程序中使用broker时必须特别注意。基于代理的资源管理(BRM)有很多智能技术,比如请求部署、作业处理、网格资源发现、匹配、优化、作业迁移、作业调度、中间件支持、元代理、资源代理、Dispatcher。在BRM中,Broker跟踪其资源池中所有资源的信息,包括它们的可用性、负载、网络可访问性、使用模型、功能和定价信息,以及它们可以执行的计算任务范围。资源代理在服务请求者(买方)和服务提供者(供应商)之间提供配对服务。资源代理为资源执行作业选择最佳调度器,并与调度器协作执行多任务。代理商只负责及时准确地处理表格。它的工作是为一些有限代理认证的公司,即代理商是为一些特定的服务提供商的公司工作。但经纪人为所有公司(所有服务提供商)工作。从经纪人的服务中,所有类型的服务请求者(各种不同的购买者)都受益。示例:产品请求者检测所有品牌的特定产品的详细信息,通过代理显示,但代理只显示代理认证公司的产品详细信息。代理是领导整个层次结构的代理,维护系统的所有服务信息。消费者通过基于线性规划解决方案的代理从相关的图片、文字或视频中搜索产品。该购物系统的优点是通过经纪人的建议购物和通过产品排名购物来节省价格并获得优质产品。
{"title":"Integration based large scale broker's resource management on friendly shopping application in Dynamic Grid computing","authors":"R. Surendran, B. Varthini","doi":"10.1109/ICOAC.2012.6416830","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416830","url":null,"abstract":"Dynamic Grid computing is a process of Share the grid balanced resources and services in a large-scale worldwide distributed Environment with fault free run time application. Resource management technique (RMT) jointly works with grid broker for an elastic grid computing. Broker that acts as a middle man to the stock exchange and place trade on behalf of clients. Special care must be taken when using broker in shopping application. Broker based Resource Management (BRM) have a lot of intelligent techniques like Request Deployment, Job Handle, Grid Resource Discovery, Match making, Optimization, Job Migration, Job scheduling, Middleware supports, Meta brokers, Resource brokers, Dispatcher. In BRM, Broker keeps track of information about all the Resource in its resource pool, including their availability, load, network accessibility, usage models, capabilities, and pricing information and the range of computational tasks that they can perform. The resource broker provides pairing services between the service requester (Buyer) and the service provider (supplier). The resource broker selects the best scheduler for the resource execution job, and collaborates with the scheduler to execute the multi tasks. Agents are only responsible for the timely and accurate processing of forms. Its works for some limited agency certified based company that is Agents are working for some particular service provider's company only. But broker work for all companies (all service providers). From the broker's service, all types of services requester (variety of different purchaser) is benefited. Example: Product requester detects the all brands of the particular products details displayed through broker, but agent display only agencies certified company's product details only. Broker is an agent that heads the whole hierarchy, maintaining all service information of the system. Consumers are searching the products from their related Image or text or video through broker based on linear programming solution. Benefits of this shopping system are save the price and get a quality product through broker's suggestion based shopping and location via product ranking based shopping.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127828214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Corona based clustering with mixed routing and data aggregation to avoid energy hole problem in wireless sensor network 基于混合路由和数据聚合的电晕聚类避免了无线传感器网络中的能量空穴问题
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416860
L. Bhagyalakshmi, S. Suman, K. Murugan
In a Wireless sensor network, the energy hole problem is a severe issue that forces the nodes near the sink to exhaust their energy sooner than the nodes deployed in the outer region, resulting the reduced the network lifetime. To overcome this problem, a novel clustering scheme with load balancing is proposed for a corona model network, where the coronas are divided into sector and form homogenous clusters. In the homogenous cluster, some nodes inside the circular centroid region (CR) forms cluster head (CH) to control network operation. It is important that the Load handled by the cluster heads are to be balanced by means of mixed routing strategy together with data aggregation. It is seen that this technique balances the energy in the network. The simulation result shows that this technique out performs other clustering scheme in terms of network lifetime and energy dissipation.
在无线传感器网络中,能量空洞问题是一个严重的问题,它迫使sink附近的节点比部署在外部区域的节点更快地耗尽能量,从而导致网络寿命缩短。为了克服这一问题,提出了一种新的基于负载均衡的电晕模型网络聚类方案,该方案将电晕划分为扇区并形成同质簇。在同质簇中,圆形质心区域(CR)内的一些节点形成簇头(CH)来控制网络的运行。通过混合路由策略和数据聚合来平衡集群头处理的负载是很重要的。可以看出,这种技术平衡了网络中的能量。仿真结果表明,该方法在网络寿命和能量消耗方面优于其他聚类方案。
{"title":"Corona based clustering with mixed routing and data aggregation to avoid energy hole problem in wireless sensor network","authors":"L. Bhagyalakshmi, S. Suman, K. Murugan","doi":"10.1109/ICOAC.2012.6416860","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416860","url":null,"abstract":"In a Wireless sensor network, the energy hole problem is a severe issue that forces the nodes near the sink to exhaust their energy sooner than the nodes deployed in the outer region, resulting the reduced the network lifetime. To overcome this problem, a novel clustering scheme with load balancing is proposed for a corona model network, where the coronas are divided into sector and form homogenous clusters. In the homogenous cluster, some nodes inside the circular centroid region (CR) forms cluster head (CH) to control network operation. It is important that the Load handled by the cluster heads are to be balanced by means of mixed routing strategy together with data aggregation. It is seen that this technique balances the energy in the network. The simulation result shows that this technique out performs other clustering scheme in terms of network lifetime and energy dissipation.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126061291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Lightweight decentralized algorithm for localizing reactive jammers in wireless sensor network 无线传感器网络中无功干扰器定位的轻量级分散算法
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416800
G. Vinothkumar, G. Ramya, A. Rengarajan
In wireless sensor network one of the most security threat is the reactive jammer because of the mass destruction to the sensor communication and it is difficult to disclose. So we have to deactivate the reactive jammers by identifying all the trigger nodes, because the transmission invokes the jammer. Such a trigger identification procedure can work as an application-layer service and benefit many existing reactive jamming defending schemes. In this paper, on the one hand, we leverage several optimization problems to provide a complete trigger-identification service framework for unreliable wireless sensor networks. On the other hand, we provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios. theoretical analysis and simulation results are included to validate the performance of this framework.
在无线传感器网络中,反应性干扰是最大的安全威胁之一,因为它对传感器通信具有大规模的破坏作用,并且难以被发现。所以我们必须通过识别所有触发节点来解除被动干扰器,因为传输会调用干扰器。这种触发识别过程可以作为一种应用层服务,使许多现有的无功干扰防御方案受益。在本文中,一方面,我们利用几个优化问题为不可靠的无线传感器网络提供了一个完整的触发识别服务框架。另一方面,针对两种复杂的干扰模型,提出了一种改进算法,以增强其对各种网络场景的鲁棒性。理论分析和仿真结果验证了该框架的性能。
{"title":"Lightweight decentralized algorithm for localizing reactive jammers in wireless sensor network","authors":"G. Vinothkumar, G. Ramya, A. Rengarajan","doi":"10.1109/ICOAC.2012.6416800","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416800","url":null,"abstract":"In wireless sensor network one of the most security threat is the reactive jammer because of the mass destruction to the sensor communication and it is difficult to disclose. So we have to deactivate the reactive jammers by identifying all the trigger nodes, because the transmission invokes the jammer. Such a trigger identification procedure can work as an application-layer service and benefit many existing reactive jamming defending schemes. In this paper, on the one hand, we leverage several optimization problems to provide a complete trigger-identification service framework for unreliable wireless sensor networks. On the other hand, we provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios. theoretical analysis and simulation results are included to validate the performance of this framework.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127156873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Achieving cost efficiency using CaaS model in the cloud 在云中使用CaaS模型实现成本效率
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416841
S. Padmavathi, P. Rajeshwari, P. Pradheeba, R. Mythili
Caching has become the key technology used for bridging the performance gap across memory hierarchies via temporal or spatial localities; in particular, the effect is prominent in disk storage systems. Applications that involve heavy I/O activities, which are common in the cloud, probably benefit the most from caching. The use of local volatile memory as cache might be a natural alternative, but many well-known restrictions, such as capacity and the utilization of host machines, hinder its effective use. We present the cache as a service (CaaS) model as an optional service to typical infrastructure service offerings. Specifically, the cloud provider sets aside a large pool of memory that can be dynamically partitioned and allocated to standard infrastructure services as disk cache. We first investigate the feasibility of providing CaaS with the proof-of-concept elastic cache system (using dedicated remote memory servers) built and validated on the actual system, and practical benefits of CaaS for both users and providers (i.e., performance and profit, respectively) are thoroughly studied with a novel pricing scheme. Our CaaS model helps to leverage the cloud economy greatly in that 1) the extra user cost for I/O performance gain is minimal if ever exists, and 2) the provider's profit increases due to improvements in server consolidation resulting from that performance gain. Through extensive experiments with eight resource allocation strategies, we show that our CaaS model can be a promising cost-efficient solution for both users and providers.
缓存已经成为通过时间或空间位置来弥合内存层次之间性能差距的关键技术;这种效果在磁盘存储系统中尤为突出。涉及大量I/O活动的应用程序(这在云中很常见)可能从缓存中获益最多。使用本地易失性内存作为缓存可能是一种自然的选择,但是许多众所周知的限制,例如容量和主机的利用率,阻碍了它的有效使用。我们将缓存作为服务(CaaS)模型作为典型基础设施服务产品的可选服务。具体来说,云提供商留出了一个大的内存池,可以动态地对其进行分区,并将其作为磁盘缓存分配给标准基础设施服务。我们首先研究了在实际系统上构建和验证的概念验证弹性缓存系统(使用专用远程存储服务器)提供CaaS的可行性,并通过新的定价方案彻底研究了CaaS对用户和提供商的实际好处(分别是性能和利润)。我们的CaaS模型有助于极大地利用云经济,因为1)I/O性能增益的额外用户成本是最小的(如果存在的话),2)由于性能增益带来的服务器整合改进,提供商的利润增加了。通过对八种资源分配策略的广泛实验,我们证明了我们的CaaS模型对于用户和提供者来说都是一个很有前途的经济高效的解决方案。
{"title":"Achieving cost efficiency using CaaS model in the cloud","authors":"S. Padmavathi, P. Rajeshwari, P. Pradheeba, R. Mythili","doi":"10.1109/ICOAC.2012.6416841","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416841","url":null,"abstract":"Caching has become the key technology used for bridging the performance gap across memory hierarchies via temporal or spatial localities; in particular, the effect is prominent in disk storage systems. Applications that involve heavy I/O activities, which are common in the cloud, probably benefit the most from caching. The use of local volatile memory as cache might be a natural alternative, but many well-known restrictions, such as capacity and the utilization of host machines, hinder its effective use. We present the cache as a service (CaaS) model as an optional service to typical infrastructure service offerings. Specifically, the cloud provider sets aside a large pool of memory that can be dynamically partitioned and allocated to standard infrastructure services as disk cache. We first investigate the feasibility of providing CaaS with the proof-of-concept elastic cache system (using dedicated remote memory servers) built and validated on the actual system, and practical benefits of CaaS for both users and providers (i.e., performance and profit, respectively) are thoroughly studied with a novel pricing scheme. Our CaaS model helps to leverage the cloud economy greatly in that 1) the extra user cost for I/O performance gain is minimal if ever exists, and 2) the provider's profit increases due to improvements in server consolidation resulting from that performance gain. Through extensive experiments with eight resource allocation strategies, we show that our CaaS model can be a promising cost-efficient solution for both users and providers.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128015732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic handoff decision based on current traffic level and neighbor information in wireless data networks 无线数据网络中基于当前通信量和邻居信息的动态切换决策
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416797
V. Saravanan, A. Sumathi
In wireless network, mobile nodes frequently perform layer 2 and layer 3 handoffs. The handoff may occur due to many factors like signal strength, load balancing, number of connections and frequencies engaged...etc. This frequent handoff may disturb the services of real-time applications such as voice over IP. Normally few milliseconds of interrupt will happen during the handoff process. This delay should be minimized for smooth performance. Information exchange between mobile nodes and network monitoring has to be done to achieve seamless layer 2 and layer 3 handoff. Increasing in packet loss rates and heavy traffic will initiate incorrect handoff. We propose a method for avoiding unbeneficial handoffs and to eliminate unwanted traffic.
在无线网络中,移动节点经常进行第二层和第三层切换。由于信号强度、负载平衡、连接数量和频率等因素,切换可能会发生。这种频繁的切换可能会干扰实时应用程序(如IP语音)的业务。通常在切换过程中只会发生几毫秒的中断。为了使性能平稳,应该尽量减少这种延迟。移动节点和网络监控之间的信息交换必须完成,以实现无缝的第二层和第三层切换。丢包率增加和流量过大会导致错误的切换。我们提出了一种方法来避免不利的切换和消除不必要的流量。
{"title":"Dynamic handoff decision based on current traffic level and neighbor information in wireless data networks","authors":"V. Saravanan, A. Sumathi","doi":"10.1109/ICOAC.2012.6416797","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416797","url":null,"abstract":"In wireless network, mobile nodes frequently perform layer 2 and layer 3 handoffs. The handoff may occur due to many factors like signal strength, load balancing, number of connections and frequencies engaged...etc. This frequent handoff may disturb the services of real-time applications such as voice over IP. Normally few milliseconds of interrupt will happen during the handoff process. This delay should be minimized for smooth performance. Information exchange between mobile nodes and network monitoring has to be done to achieve seamless layer 2 and layer 3 handoff. Increasing in packet loss rates and heavy traffic will initiate incorrect handoff. We propose a method for avoiding unbeneficial handoffs and to eliminate unwanted traffic.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134159190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Comparative study on different interference aware routing metrics in WMN: A survey WMN中不同干扰感知路由度量的比较研究综述
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416827
K. Sangeetha, R. Priyadharsini, A. Anbuelaveni, R. Sivaranjani
Wireless Mesh network plays a significant role in enhancement of various techniques in wireless communication. The primary goal of wireless mesh networking is to achieve high system throughput. As the topology of the network is unpredictable in a wireless medium due to its mobile nature and hence the routing with high throughput becomes more difficult. Interference is the major cause for performance degradation of any wireless network. In this paper, we provide an comparative study based on the unique features of different interference aware routing metrics and a survey about how interference level is estimated using those metrics.
无线Mesh网络在无线通信技术的发展中起着重要的作用。无线网状网络的主要目标是实现高系统吞吐量。由于无线介质的移动性,网络的拓扑结构是不可预测的,因此高吞吐量的路由变得更加困难。干扰是任何无线网络性能下降的主要原因。在本文中,我们基于不同干扰感知路由度量的独特特征进行了比较研究,并调查了如何使用这些度量来估计干扰水平。
{"title":"Comparative study on different interference aware routing metrics in WMN: A survey","authors":"K. Sangeetha, R. Priyadharsini, A. Anbuelaveni, R. Sivaranjani","doi":"10.1109/ICOAC.2012.6416827","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416827","url":null,"abstract":"Wireless Mesh network plays a significant role in enhancement of various techniques in wireless communication. The primary goal of wireless mesh networking is to achieve high system throughput. As the topology of the network is unpredictable in a wireless medium due to its mobile nature and hence the routing with high throughput becomes more difficult. Interference is the major cause for performance degradation of any wireless network. In this paper, we provide an comparative study based on the unique features of different interference aware routing metrics and a survey about how interference level is estimated using those metrics.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130611710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advanced biometric ATM machine with AES 256 and steganography implementation 先进的生物识别ATM机与AES 256和隐写实现
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416799
R. Murugesh
The main objective of this system is to make ATM transactions as secure as possible. This system replaces the conventional ATM card with Fingerprint. Therefore, users don't have to carry a plastic card to withdraw money. The Fingerprint and the phone number of all users are stored in the system database during Registration. Fingerprints are used to identify a Person's genuinity. A Fingerprint scanner is used to get the fingerprint of the user, after which the system requests for the PIN (Personal Identification Number). Once the user enters the PIN, the user is prompted to enter the OTP (One Time Password) which is a 4-digit random password sent by the server to the user's registered mobile number. On cross verification with the data stored in the system database, the user is allowed to make a transaction. The underlying mechanism involves combining the concepts of Cryptography and Steganography. The PIN and OTP are encrypted using AES 256. Then the encrypted data is steganographed with the fingerprint image which acts as the BASE image. The Steganographed image is sent to the server, where it is de-steganographed and verified with the data available in the system database.
该系统的主要目的是使ATM交易尽可能安全。该系统用指纹代替了传统的ATM卡。因此,用户取款时不必携带塑料卡。注册时,所有用户的指纹和电话号码都会保存在系统数据库中。指纹是用来鉴别一个人的真伪的。指纹扫描器用于获取用户的指纹,然后系统要求输入PIN(个人识别号码)。一旦用户输入PIN码,就会提示用户输入一次性密码(OTP),这是服务器发送给用户注册手机号码的4位随机密码。在与存储在系统数据库中的数据进行交叉验证后,允许用户进行事务处理。其基本机制包括结合密码学和隐写术的概念。PIN和OTP使用AES 256加密。然后用指纹图像作为BASE图像对加密后的数据进行隐写。经过隐写处理的图像被发送到服务器,在服务器上对其进行反隐写处理,并使用系统数据库中的可用数据进行验证。
{"title":"Advanced biometric ATM machine with AES 256 and steganography implementation","authors":"R. Murugesh","doi":"10.1109/ICOAC.2012.6416799","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416799","url":null,"abstract":"The main objective of this system is to make ATM transactions as secure as possible. This system replaces the conventional ATM card with Fingerprint. Therefore, users don't have to carry a plastic card to withdraw money. The Fingerprint and the phone number of all users are stored in the system database during Registration. Fingerprints are used to identify a Person's genuinity. A Fingerprint scanner is used to get the fingerprint of the user, after which the system requests for the PIN (Personal Identification Number). Once the user enters the PIN, the user is prompted to enter the OTP (One Time Password) which is a 4-digit random password sent by the server to the user's registered mobile number. On cross verification with the data stored in the system database, the user is allowed to make a transaction. The underlying mechanism involves combining the concepts of Cryptography and Steganography. The PIN and OTP are encrypted using AES 256. Then the encrypted data is steganographed with the fingerprint image which acts as the BASE image. The Steganographed image is sent to the server, where it is de-steganographed and verified with the data available in the system database.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115176259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Data theft prevention & endpoint protection from unauthorized USB devices — Implementation 数据盗窃预防和端点保护,从未经授权的USB设备-实现
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416856
S. Verma, A. Singh
Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or “thumb drive”), to illicitly download and store confidential and proprietary data from network endpoint [1]. There are many establishments and organization that are unaware of, or choose to remain ignorant about the threat that can be caused by portable devices in their network setting until some events that can be from a minor unfortunate incident to a complete catastrophe. In the information age, cybercrime and information leakage increase, because endpoints are an easy target [2]. The key to managing portable devices in business environment is to give administrator direct control over what devices are in use on your network. In this paper we present the implementation of access and identity management for endpoint protection and data security from USB devices to maintain information security and data theft prevention in a corporate environment.
Podslurping是指有意或无意地使用便携式USB大容量存储设备,如USB闪存驱动器(或“拇指驱动器”),从网络端点非法下载和存储机密和专有数据[1]。有许多机构和组织没有意识到,或者选择对其网络设置中的便携式设备可能造成的威胁保持无知,直到发生一些从小的不幸事件到完全灾难的事件。在信息时代,网络犯罪和信息泄露越来越多,因为端点是一个容易攻击的目标[2]。在业务环境中管理便携式设备的关键是让管理员直接控制网络中使用的设备。在本文中,我们提出了端点保护和USB设备数据安全的访问和身份管理的实现,以维护企业环境中的信息安全和数据盗窃预防。
{"title":"Data theft prevention & endpoint protection from unauthorized USB devices — Implementation","authors":"S. Verma, A. Singh","doi":"10.1109/ICOAC.2012.6416856","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416856","url":null,"abstract":"Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or “thumb drive”), to illicitly download and store confidential and proprietary data from network endpoint [1]. There are many establishments and organization that are unaware of, or choose to remain ignorant about the threat that can be caused by portable devices in their network setting until some events that can be from a minor unfortunate incident to a complete catastrophe. In the information age, cybercrime and information leakage increase, because endpoints are an easy target [2]. The key to managing portable devices in business environment is to give administrator direct control over what devices are in use on your network. In this paper we present the implementation of access and identity management for endpoint protection and data security from USB devices to maintain information security and data theft prevention in a corporate environment.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"630 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116180948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Energy and error analysis of IEEE 802.15.4 Zigbee RF transceiver under various fading channels in Wireless Sensor Network 无线传感器网络中IEEE 802.15.4 Zigbee射频收发器在各种衰落信道下的能量与误差分析
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416858
V. Nithya, B. Ramachandran, V. Bhaskar
This paper addresses the performance analysis of Zigbee transceiver using IEEE 802.15.4 standard under 2.4 GHz frequency band in terms of Energy and Error over various fading channel conditions. Energy is a critical aspect in Wireless Sensor Network (WSN) for improved network lifetime. The multipath nature of the wireless sensor network channel imposes adverse effect on the received signal characteristics. These unreliable links increases the error level to a greater extent and hence, degrades battery life. In this paper, we investigate the energy efficiency of a Zigbee transceiver using Direct Sequence Spread Spectrum- Offset Quadrature Phase Shift Keying (DSSS-OQPSK) modulation under 2.4 GHz frequency band in a WSN. The Symbol Error Rate (SER) is computed for a Zigbee transceiver, and an expression for energy efficiency measurement is obtained. Simulation results on SER are obtained for AWGN, Rayleigh and Rician fading channels and used in energy efficiency computation. It is found that the energy efficiency of Zigbee transceivers is as low as 10% for Rayleigh channels, but it is over 90% for AWGN channels, when the received SNR is 10 dB, whereas, for Rician channels, it lies in between Rayleigh and AWGN, depending upon the fading level.
本文从能量和误差两个方面分析了2.4 GHz频段下采用IEEE 802.15.4标准的Zigbee收发器在各种衰落信道条件下的性能。在无线传感器网络(WSN)中,能量是提高网络寿命的关键因素。无线传感器网络信道的多径特性对接收信号特性有不利影响。这些不可靠的链接增加了更大程度的误差水平,从而降低了电池寿命。在本文中,我们研究了在无线传感器网络2.4 GHz频段下使用直接序列扩频-偏移正交相移键控(DSSS-OQPSK)调制的Zigbee收发器的能量效率。计算了Zigbee收发器的误码率(SER),得到了能效测量的表达式。得到了AWGN信道、瑞利信道和瑞利信道的SER仿真结果,并用于能效计算。研究发现,当接收信噪比为10 dB时,瑞利信道的Zigbee收发器能量效率低至10%,AWGN信道的能量效率在90%以上,而对于瑞利信道,根据衰落程度的不同,其能量效率介于瑞利信道和AWGN信道之间。
{"title":"Energy and error analysis of IEEE 802.15.4 Zigbee RF transceiver under various fading channels in Wireless Sensor Network","authors":"V. Nithya, B. Ramachandran, V. Bhaskar","doi":"10.1109/ICOAC.2012.6416858","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416858","url":null,"abstract":"This paper addresses the performance analysis of Zigbee transceiver using IEEE 802.15.4 standard under 2.4 GHz frequency band in terms of Energy and Error over various fading channel conditions. Energy is a critical aspect in Wireless Sensor Network (WSN) for improved network lifetime. The multipath nature of the wireless sensor network channel imposes adverse effect on the received signal characteristics. These unreliable links increases the error level to a greater extent and hence, degrades battery life. In this paper, we investigate the energy efficiency of a Zigbee transceiver using Direct Sequence Spread Spectrum- Offset Quadrature Phase Shift Keying (DSSS-OQPSK) modulation under 2.4 GHz frequency band in a WSN. The Symbol Error Rate (SER) is computed for a Zigbee transceiver, and an expression for energy efficiency measurement is obtained. Simulation results on SER are obtained for AWGN, Rayleigh and Rician fading channels and used in energy efficiency computation. It is found that the energy efficiency of Zigbee transceivers is as low as 10% for Rayleigh channels, but it is over 90% for AWGN channels, when the received SNR is 10 dB, whereas, for Rician channels, it lies in between Rayleigh and AWGN, depending upon the fading level.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128777164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient face recognition with compensation for aging variations 有效的人脸识别与年龄变化补偿
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416839
J. S. Nayak, M. Indiramma
Face recognition is identifying a person based on facial characteristics. Automated face recognition is identifying a given query face called probe from a target population known as gallery. The face recognition algorithms perform well when the interpersonal images have more discriminating features than intra personal images. The changes in the face bring down the similarity of the intrapersonal images. The variations in the face can be due to pose, expression, illumination changes and aging of a person. Face recognition accuracy is largely influenced by the age related changes in face. Aging effects on face are not uniform and depend on both intrinsic as well as external factors like geographic location, race, food habits etc. The facial changes are exclusive for each person in spite of aging being an apparent phenomenon among all individuals. Hence there are many challenges still open in compensating age related variations. In this paper we have proposed a novel self-PCA based approach in order to consider distinctiveness of the effects of aging of a person for age invariant face recognition. The region around the eyes is used as the input feature instead of the entire face as it is more stable part of the face with respect to aging and also requires less space. The proposed approach is tested using the images of the FG-NET database.
人脸识别是基于面部特征来识别一个人。自动人脸识别是从一个被称为gallery的目标人群中识别一个被称为probe的给定查询脸。当人际图像比个人内部图像具有更多的区别特征时,人脸识别算法表现良好。面部的变化降低了个人形象的相似性。面部的变化可能是由于姿势、表情、光照的变化和一个人的年龄。人脸识别的准确性在很大程度上受年龄相关的面部变化的影响。衰老对面部的影响不是均匀的,它既取决于内在因素,也取决于外在因素,如地理位置、种族、饮食习惯等。尽管衰老对每个人来说都是一个明显的现象,但面部变化对每个人来说都是独一无二的。因此,在补偿与年龄相关的差异方面仍存在许多挑战。在本文中,我们提出了一种新的基于自pca的方法,以考虑一个人的年龄对年龄不变人脸识别的影响的独特性。眼睛周围的区域作为输入特征,而不是整个脸部,因为它是脸部相对于老化更稳定的部分,也需要更少的空间。利用FG-NET数据库的图像对所提出的方法进行了测试。
{"title":"Efficient face recognition with compensation for aging variations","authors":"J. S. Nayak, M. Indiramma","doi":"10.1109/ICOAC.2012.6416839","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416839","url":null,"abstract":"Face recognition is identifying a person based on facial characteristics. Automated face recognition is identifying a given query face called probe from a target population known as gallery. The face recognition algorithms perform well when the interpersonal images have more discriminating features than intra personal images. The changes in the face bring down the similarity of the intrapersonal images. The variations in the face can be due to pose, expression, illumination changes and aging of a person. Face recognition accuracy is largely influenced by the age related changes in face. Aging effects on face are not uniform and depend on both intrinsic as well as external factors like geographic location, race, food habits etc. The facial changes are exclusive for each person in spite of aging being an apparent phenomenon among all individuals. Hence there are many challenges still open in compensating age related variations. In this paper we have proposed a novel self-PCA based approach in order to consider distinctiveness of the effects of aging of a person for age invariant face recognition. The region around the eyes is used as the input feature instead of the entire face as it is more stable part of the face with respect to aging and also requires less space. The proposed approach is tested using the images of the FG-NET database.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117070953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2012 Fourth International Conference on Advanced Computing (ICoAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1