首页 > 最新文献

Proceedings of the International Conference on Advances in Information Communication Technology & Computing最新文献

英文 中文
Fast Three Level DNA Cryptographic Technique to Provide Better Security 快速三级DNA密码技术提供更好的安全性
C. Raju, D. P. Kumar, D. Hussenappa, V. Kulakarne
The DNA Cryptography is more efficient technique to provide security by converting the plain text into the DNA sequence. The DNA sequence consisting of four alphabets A, C, G and T. Each alphabet is related to a nucleotide. DNA can be used to store, transmit the data and used for computation of the security for the data. The existing DNA technique takes more time for generating the encryption and decryption of text. The main objective of this paper is to provide more security to the data with low time complexity. The proposed method consists of three level of security for encryption of data. In Level-1 the shift key operation and complement operations are used. In level-2 the LBP operator is applied on the output of shift key and one's complements operation. In level-3 the output of two level is converted into DNA sequence. The receiver will apply the decryption for extracting the plain text from the cipher text. This proposed DNA cryptography provides the better security than the other cryptographic techniques and also takes less time for encryption and decryption of the data and provides more security.
DNA密码学是一种更有效的技术,通过将纯文本转换为DNA序列来提供安全性。DNA序列由A、C、G和t四个字母组成,每个字母与一个核苷酸有关。DNA可以用来存储、传输数据,也可以用来计算数据的安全性。现有的DNA技术在生成文本的加密和解密时需要花费更多的时间。本文的主要目的是为低时间复杂度的数据提供更多的安全性。所提出的方法包括三个安全级别的数据加密。在Level-1中使用shift键操作和补码操作。在第二层,LBP算子应用于移位键和补码运算的输出。在三级中,二级输出转化为DNA序列。接收方将应用解密从密文中提取明文。与其他加密技术相比,本文提出的DNA加密技术具有更好的安全性,并且对数据进行加密和解密所需的时间更少,安全性更高。
{"title":"Fast Three Level DNA Cryptographic Technique to Provide Better Security","authors":"C. Raju, D. P. Kumar, D. Hussenappa, V. Kulakarne","doi":"10.1145/2979779.2979792","DOIUrl":"https://doi.org/10.1145/2979779.2979792","url":null,"abstract":"The DNA Cryptography is more efficient technique to provide security by converting the plain text into the DNA sequence. The DNA sequence consisting of four alphabets A, C, G and T. Each alphabet is related to a nucleotide. DNA can be used to store, transmit the data and used for computation of the security for the data. The existing DNA technique takes more time for generating the encryption and decryption of text. The main objective of this paper is to provide more security to the data with low time complexity. The proposed method consists of three level of security for encryption of data. In Level-1 the shift key operation and complement operations are used. In level-2 the LBP operator is applied on the output of shift key and one's complements operation. In level-3 the output of two level is converted into DNA sequence. The receiver will apply the decryption for extracting the plain text from the cipher text. This proposed DNA cryptography provides the better security than the other cryptographic techniques and also takes less time for encryption and decryption of the data and provides more security.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114456246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Proposing a method for Skype Forensic-preserving data evidences to present in front of court of law 提出了一种Skype法证保存数据证据的方法,以呈现在法庭面前
Vijay Chauhan, D. Katre
Skype is one of the most widely being used application in government sectors as well as in corporate world. Skype facilitates with several advantages. Today almost all the companies rely on Skype for all their official communication as it provides an easy to use interface for communication sitting at a single location. But, at the moment, no government organization considered preservation as a major concern. Thus, performing Digital Forensics and data preservation in case of Skype is a challenging task. This arises the requirement to store the sensitive communication the safeguard the evidences of digital communication. As per the perspective of Information Technology Act 2000/2008, to safeguard the legal admissibility of the digital records, it is mandatory to capture and preserve the digital evidences of digital data and electronic records. This paper includes the glimpse of existing mechanisms and challenges in Skype. Through this paper, implementation of proposed work for Skype will be performed that will help investigator to collect the strong data evidence.
Skype是在政府部门和企业世界中使用最广泛的应用程序之一。Skype有几个优点。今天,几乎所有的公司都依赖Skype进行所有的官方通信,因为它提供了一个易于使用的界面,可以坐在一个位置进行通信。但是,目前,没有一个政府组织将保护作为一个主要问题。因此,在Skype的情况下执行数字取证和数据保存是一项具有挑战性的任务。这就提出了存储敏感通信以保护数字通信证据的要求。根据2000/2008信息技术法案的观点,为了保障数字记录的法律可接受性,必须捕获和保存数字数据和电子记录的数字证据。本文包括Skype现有机制和挑战的一瞥。通过本文,实施拟议的Skype工作将被执行,这将有助于调查员收集强有力的数据证据。
{"title":"Proposing a method for Skype Forensic-preserving data evidences to present in front of court of law","authors":"Vijay Chauhan, D. Katre","doi":"10.1145/2979779.2979882","DOIUrl":"https://doi.org/10.1145/2979779.2979882","url":null,"abstract":"Skype is one of the most widely being used application in government sectors as well as in corporate world. Skype facilitates with several advantages. Today almost all the companies rely on Skype for all their official communication as it provides an easy to use interface for communication sitting at a single location. But, at the moment, no government organization considered preservation as a major concern. Thus, performing Digital Forensics and data preservation in case of Skype is a challenging task. This arises the requirement to store the sensitive communication the safeguard the evidences of digital communication. As per the perspective of Information Technology Act 2000/2008, to safeguard the legal admissibility of the digital records, it is mandatory to capture and preserve the digital evidences of digital data and electronic records. This paper includes the glimpse of existing mechanisms and challenges in Skype. Through this paper, implementation of proposed work for Skype will be performed that will help investigator to collect the strong data evidence.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114735963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empirical analysis of Machine Learning Techniques for context aware Recommender Systems in the environment of IoT 物联网环境下上下文感知推荐系统的机器学习技术实证分析
Nitin Sachdeva, R. Dhir, Akshi Kumar
At present recommender systems (RS) are incorporating contextual and social data of the client, delivering context aware RS where it take request response approach in which the recommendations are given to the client upon his solicitation. Later on they will utilize verifiable data of the client anywhere from the Internet of Things (IoT). Currently, a proactive RS that pushes proposals to the client when the present circumstance appears proper, without unequivocal client demand has been presented in the exploration research field of RS. In this paper, an outline of a context aware RS that prescribes recommendations under the IoT worldview is proposed. We also did the empirical analysis of the Machine Learning (ML) techniques like Genetic Algorithm optimized Artificial Neural Network (GA-ANN), decision tree, ANN, bagging, boosting which will perform the reasoning of the context. All inputs are virtually derived from the IoT and its output scores are calculated based on ML techniques which will decide if to push a recommendation to the user or not. Benchmark data of the Chicago restaurant is analyzed and it was observed that for the 98% of the contexts, GA-ANN produced correct recommendations with higher accuracy and efficiency in the correct times and context.
目前,推荐系统(RS)正在整合客户的上下文和社会数据,提供具有上下文意识的RS,其中采用请求响应方法,根据客户的请求向其提供推荐。之后,他们将利用来自物联网(IoT)的任何地方的客户端可验证数据。目前,在RS的探索研究领域中,已经提出了一种主动的RS,当当前情况看起来合适时,在没有明确的客户需求的情况下向客户推送建议。本文提出了在物联网世界观下规定建议的上下文感知RS的概述。我们还对机器学习(ML)技术进行了实证分析,如遗传算法优化的人工神经网络(GA-ANN)、决策树、人工神经网络、bagging、boosting,这些技术将执行上下文推理。所有输入几乎都来自物联网,其输出分数是基于机器学习技术计算的,机器学习技术将决定是否向用户推送推荐。对芝加哥餐厅的基准数据进行分析,发现在98%的情境下,GA-ANN在正确的时间和情境下以更高的准确率和效率给出了正确的推荐。
{"title":"Empirical analysis of Machine Learning Techniques for context aware Recommender Systems in the environment of IoT","authors":"Nitin Sachdeva, R. Dhir, Akshi Kumar","doi":"10.1145/2979779.2979818","DOIUrl":"https://doi.org/10.1145/2979779.2979818","url":null,"abstract":"At present recommender systems (RS) are incorporating contextual and social data of the client, delivering context aware RS where it take request response approach in which the recommendations are given to the client upon his solicitation. Later on they will utilize verifiable data of the client anywhere from the Internet of Things (IoT). Currently, a proactive RS that pushes proposals to the client when the present circumstance appears proper, without unequivocal client demand has been presented in the exploration research field of RS. In this paper, an outline of a context aware RS that prescribes recommendations under the IoT worldview is proposed. We also did the empirical analysis of the Machine Learning (ML) techniques like Genetic Algorithm optimized Artificial Neural Network (GA-ANN), decision tree, ANN, bagging, boosting which will perform the reasoning of the context. All inputs are virtually derived from the IoT and its output scores are calculated based on ML techniques which will decide if to push a recommendation to the user or not. Benchmark data of the Chicago restaurant is analyzed and it was observed that for the 98% of the contexts, GA-ANN produced correct recommendations with higher accuracy and efficiency in the correct times and context.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125791367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cost Aware Load Balanced Task Scheduling with Active VM Load Evaluation 成本感知负载均衡任务调度与主动虚拟机负载评估
A. Kaur, Bikrampal Kaur
The cloud platforms are gaining more popularity every year and adding up more customers to their portals. The cloud platforms are being flooded with the millions of user queries every second, which are becoming a major challenge to process them in the shortest possible time. The existing solutions do not evaluate the individual load on the virtual machines, while scheduling the tasks on the cloud platforms. In this paper, the new task scheduling model has been proposed, which utilizes the ant colony optimization for the load based VM allocation for each task loaded in the list for processing. The proposed model has been designed to calculate the load on the list of available VMs. The available list of the VM's is evaluated against the process cost, which checks the ability of VM in focus to process the given task. The VMs, who are eligible to process the given task, are shortlisted and the given task is assigned to the VM with the least load. The experimental results have manifested the effectiveness of the proposed model in comparison with the existing models to take the accurate offloading decisions.
云平台每年都越来越受欢迎,其门户网站的客户也越来越多。云平台正在被每秒数百万的用户查询淹没,这正在成为在尽可能短的时间内处理它们的主要挑战。现有的解决方案在调度云平台上的任务时,不评估虚拟机上的单个负载。本文提出了一种新的任务调度模型,该模型利用蚁群算法对加载在处理列表中的每个任务进行基于负载的VM分配。该模型被设计用于计算可用虚拟机列表上的负载。可用的VM列表将根据流程成本进行评估,流程成本检查重点VM处理给定任务的能力。有资格处理给定任务的虚拟机将被列入候选名单,并将给定任务分配给负载最少的虚拟机。实验结果表明,该模型与现有模型相比,能够做出准确的卸载决策。
{"title":"Cost Aware Load Balanced Task Scheduling with Active VM Load Evaluation","authors":"A. Kaur, Bikrampal Kaur","doi":"10.1145/2979779.2979861","DOIUrl":"https://doi.org/10.1145/2979779.2979861","url":null,"abstract":"The cloud platforms are gaining more popularity every year and adding up more customers to their portals. The cloud platforms are being flooded with the millions of user queries every second, which are becoming a major challenge to process them in the shortest possible time. The existing solutions do not evaluate the individual load on the virtual machines, while scheduling the tasks on the cloud platforms. In this paper, the new task scheduling model has been proposed, which utilizes the ant colony optimization for the load based VM allocation for each task loaded in the list for processing. The proposed model has been designed to calculate the load on the list of available VMs. The available list of the VM's is evaluated against the process cost, which checks the ability of VM in focus to process the given task. The VMs, who are eligible to process the given task, are shortlisted and the given task is assigned to the VM with the least load. The experimental results have manifested the effectiveness of the proposed model in comparison with the existing models to take the accurate offloading decisions.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127373127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reliable Approach to Address Broadcast Storm & Hidden Terminal Problem in Multihop Wireless Sensor Network for Image Dissemination 可靠解决多跳无线传感器网络中广播风暴和隐藏终端问题的方法
V. Gulhane, L. Malik
The performance of CSMA MAC degrades significantly due to hidden terminal problem as carrier sensing cannot avoid collision, this problem is faced by many CSMA MAC based systems hence it is one of the important issue which needs tobe solved in wireless communications. Idle listening of sensor nodes is a major source of energy waste during reprogramming and must be minimized. Although CSMA MAC is in the TinyOS release & the majority reprogramming systems use CSMA, the proposed work replaces existing CSMA with more efficient MAC i.e. a T-MAC. It uses TMAC unlike CSMA MAC in Deluge & most of the dissemination protocols to make the protocol more energy efficient, proper coordination & time synchronization between the node, proper bandwidth utilization & to carry appropriate MAC layer management functions like periodic wake up and sleep, neighbor's knowledge etc. TMAC uses the simple policy with fixed frames with variable active period & time-out interval which add many benefits like decreasing idle listening by duty cycle, collisions etc. hence improving the performance of designed protocol, making it better than the other protocols as it is more capable & adaptive as T-MAC prevents the packet collisions & ultimately solves the hidden terminal problem.
由于载波感知无法避免碰撞所带来的终端隐藏问题,导致CSMA MAC的性能显著下降,这是许多基于CSMA MAC的系统所面临的问题,是无线通信中需要解决的重要问题之一。传感器节点的空闲监听是重编程过程中能源浪费的主要来源,必须最小化。尽管CSMA MAC在TinyOS版本中并且大多数重编程系统使用CSMA,但提议的工作用更有效的MAC(即T-MAC)取代现有的CSMA。它使用TMAC(不像在Deluge和大多数传播协议中的CSMA MAC),使协议更节能,节点之间适当的协调和时间同步,适当的带宽利用率,并携带适当的MAC层管理功能,如周期性唤醒和睡眠,邻居的知识等。TMAC使用固定帧的简单策略,可变活动周期和超时间隔,增加了许多好处,如通过占空比减少空闲侦听,冲突等,从而提高了设计协议的性能,使其优于其他协议,因为它更有能力和自适应,因为T-MAC防止了数据包冲突,最终解决了隐藏终端问题。
{"title":"Reliable Approach to Address Broadcast Storm & Hidden Terminal Problem in Multihop Wireless Sensor Network for Image Dissemination","authors":"V. Gulhane, L. Malik","doi":"10.1145/2979779.2979820","DOIUrl":"https://doi.org/10.1145/2979779.2979820","url":null,"abstract":"The performance of CSMA MAC degrades significantly due to hidden terminal problem as carrier sensing cannot avoid collision, this problem is faced by many CSMA MAC based systems hence it is one of the important issue which needs tobe solved in wireless communications. Idle listening of sensor nodes is a major source of energy waste during reprogramming and must be minimized. Although CSMA MAC is in the TinyOS release & the majority reprogramming systems use CSMA, the proposed work replaces existing CSMA with more efficient MAC i.e. a T-MAC. It uses TMAC unlike CSMA MAC in Deluge & most of the dissemination protocols to make the protocol more energy efficient, proper coordination & time synchronization between the node, proper bandwidth utilization & to carry appropriate MAC layer management functions like periodic wake up and sleep, neighbor's knowledge etc. TMAC uses the simple policy with fixed frames with variable active period & time-out interval which add many benefits like decreasing idle listening by duty cycle, collisions etc. hence improving the performance of designed protocol, making it better than the other protocols as it is more capable & adaptive as T-MAC prevents the packet collisions & ultimately solves the hidden terminal problem.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121714799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Email Response System in E-learning 电子学习中的自动电子邮件响应系统
Ankita Mittal, A. Ramamurthy
E-Learning has become an essential element in everyday life. This method of teaching is being used to teach the students who are at remote location. This method has many advantages over the traditional method of teaching but there are several limitations in this method. One of those limitations is what if a student has a query? Probably, the answer seeking student will shoot an e-mail to the teacher along with his query and the teacher will reply with appropriate answer. The problem arises when many students ask the same query and the teacher has to reply each of them. There should be some kind of automation that can find that this query has been already answered and the system should reply with the appropriate answer. In this paper, we proposed an approach for an automatic email response system based on semantic similarity between queries and comparing between semantic similarity and semantic relatedness and find out which one is best for finding correct sense in query and finding score on the basis of sense match. System will be able to respond the email queries provided response will be available in the database.
电子学习已经成为日常生活中必不可少的元素。这种教学方法被用来教那些在偏远地区的学生。与传统的教学方法相比,这种方法有许多优点,但也有一些局限性。其中一个限制是,如果学生有查询怎么办?很可能,寻求答案的学生会给老师发一封电子邮件,连同他的问题,老师会回复适当的答案。当许多学生提出同样的问题,而老师必须一一回答时,问题就出现了。应该有某种类型的自动化,可以发现这个查询已经回答了,系统应该用适当的答案回复。本文提出了一种基于查询之间的语义相似度,比较语义相似度和语义相关性,找出查询中最适合找到正确意义的方法,并根据语义匹配找到分数的自动邮件回复系统的方法。系统将能够响应所提供的电子邮件查询,响应将在数据库中提供。
{"title":"Automatic Email Response System in E-learning","authors":"Ankita Mittal, A. Ramamurthy","doi":"10.1145/2979779.2979868","DOIUrl":"https://doi.org/10.1145/2979779.2979868","url":null,"abstract":"E-Learning has become an essential element in everyday life. This method of teaching is being used to teach the students who are at remote location. This method has many advantages over the traditional method of teaching but there are several limitations in this method. One of those limitations is what if a student has a query? Probably, the answer seeking student will shoot an e-mail to the teacher along with his query and the teacher will reply with appropriate answer. The problem arises when many students ask the same query and the teacher has to reply each of them. There should be some kind of automation that can find that this query has been already answered and the system should reply with the appropriate answer. In this paper, we proposed an approach for an automatic email response system based on semantic similarity between queries and comparing between semantic similarity and semantic relatedness and find out which one is best for finding correct sense in query and finding score on the basis of sense match. System will be able to respond the email queries provided response will be available in the database.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122726141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach to Ternary Logic gates using FinFET 一种利用FinFET制造三元逻辑门的方法
K. Jyoti, S. Narkhede
Ternary logic has been evolved from binary logic due to its many advantages as it is energy efficient, less complex and faster speed for serial transfer. Due to these technological advancements ternary circuits have attracted many researchers to implement ternary circuits. In digital system, NOT, NOR and NAND are of importance as they are the main building blocks of many complex arithmetic and logic circuits. In this paper, we discuss the basic ternary gates and some circuits implemented by using FinFET. An extensive simulation is performed for all the gates and circuits using Tspice Simulator. FinFET is being adapted instead of traditional MOSFET because of its captivity over the drawbacks occurred during narrowing to nanometer scale. Results obtained have expected functionality of each gate and circuits, additionally there is enhancement in performance parameters.
三元逻辑是由二进制逻辑发展而来的,因为它具有许多优点,如节能,不太复杂和串行传输速度更快。由于这些技术的进步,三元电路吸引了许多研究者来实现三元电路。在数字系统中,NOT, NOR和NAND是非常重要的,因为它们是许多复杂的算术和逻辑电路的主要组成部分。在本文中,我们讨论了基本的三元栅极和一些用FinFET实现的电路。使用Tspice模拟器对所有的门和电路进行了广泛的仿真。FinFET被用来取代传统的MOSFET,因为它克服了在缩小到纳米尺度时出现的缺点。得到的结果不仅满足了各门电路的预期功能,而且在性能参数上也有所提高。
{"title":"An Approach to Ternary Logic gates using FinFET","authors":"K. Jyoti, S. Narkhede","doi":"10.1145/2979779.2979838","DOIUrl":"https://doi.org/10.1145/2979779.2979838","url":null,"abstract":"Ternary logic has been evolved from binary logic due to its many advantages as it is energy efficient, less complex and faster speed for serial transfer. Due to these technological advancements ternary circuits have attracted many researchers to implement ternary circuits. In digital system, NOT, NOR and NAND are of importance as they are the main building blocks of many complex arithmetic and logic circuits. In this paper, we discuss the basic ternary gates and some circuits implemented by using FinFET. An extensive simulation is performed for all the gates and circuits using Tspice Simulator. FinFET is being adapted instead of traditional MOSFET because of its captivity over the drawbacks occurred during narrowing to nanometer scale. Results obtained have expected functionality of each gate and circuits, additionally there is enhancement in performance parameters.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126336684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IPv6 Cryptographically Generated Address: Analysis and Optimization IPv6加密生成地址:分析与优化
Junaid Latief Shah, J. Parvez
Cryptographically generated address (CGA) is a prime inherent element of SEND protocol introduced in IPv6.CGA works without relying on any trusted third party authority or Public Key Infrastructure (PKI).CGA find their application in proving address ownership and prevent spoofing or theft of IPv6 addresses by binding senders public key with the generated address. Though CGA is a promising technique and offers substantial amount of security, it does possess some limitations and performance bottlenecks. CGA is computationally intensive determined by the security parameter 'sec' and bandwidth gobbling due to use of RSA keys. For a higher value of 'sec', there is no guarantee on termination of brute force search for modifier. This paper evaluates the performance and discusses possible techniques that can be used in optimizing the use of IPv6 CGA. The techniques discussed are the possible modifications to the standard RFC 3972.These include reducing the granularity factor of sec from 16 to 8, replacing RSA with ECC and ECSDSA, using SHA-256 hash function instead of SHA-1 and including subnet prefix in the calculation of CGA. The paper also compares the modified CGA with standard CGA and advocates the reasons for incorporating these changes so that enhanced hybrid version of CGA can be obtained.
加密生成地址(cryptographic generated address, CGA)是IPv6中引入的SEND协议的主要固有元素。CGA的工作不依赖于任何可信的第三方权威机构或公钥基础设施(PKI)。通过将发送方公钥与生成的地址绑定,CGA在证明地址所有权和防止欺骗或窃取IPv6地址方面得到了应用。尽管CGA是一种很有前途的技术,并提供了大量的安全性,但它确实存在一些限制和性能瓶颈。CGA是计算密集型的,由安全参数“sec”决定,并且由于使用RSA密钥而导致带宽占用。对于较大的'sec'值,不能保证终止对修饰符的暴力搜索。本文评估了性能,并讨论了可用于优化IPv6 CGA使用的可能技术。所讨论的技术是对标准RFC 3972的可能修改。这些措施包括将sec的粒度因子从16降低到8,用ECC和ECSDSA代替RSA,使用SHA-256哈希函数代替SHA-1,以及在计算CGA时包含子网前缀。本文还对改进后的CGA与标准CGA进行了比较,并提出了加入这些变化的原因,以获得增强的混合CGA版本。
{"title":"IPv6 Cryptographically Generated Address: Analysis and Optimization","authors":"Junaid Latief Shah, J. Parvez","doi":"10.1145/2979779.2979781","DOIUrl":"https://doi.org/10.1145/2979779.2979781","url":null,"abstract":"Cryptographically generated address (CGA) is a prime inherent element of SEND protocol introduced in IPv6.CGA works without relying on any trusted third party authority or Public Key Infrastructure (PKI).CGA find their application in proving address ownership and prevent spoofing or theft of IPv6 addresses by binding senders public key with the generated address. Though CGA is a promising technique and offers substantial amount of security, it does possess some limitations and performance bottlenecks. CGA is computationally intensive determined by the security parameter 'sec' and bandwidth gobbling due to use of RSA keys. For a higher value of 'sec', there is no guarantee on termination of brute force search for modifier. This paper evaluates the performance and discusses possible techniques that can be used in optimizing the use of IPv6 CGA. The techniques discussed are the possible modifications to the standard RFC 3972.These include reducing the granularity factor of sec from 16 to 8, replacing RSA with ECC and ECSDSA, using SHA-256 hash function instead of SHA-1 and including subnet prefix in the calculation of CGA. The paper also compares the modified CGA with standard CGA and advocates the reasons for incorporating these changes so that enhanced hybrid version of CGA can be obtained.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131711133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Content Based Image Retrieval using Color and Texture Features 基于内容的基于颜色和纹理特征的图像检索
Naushad Varish, Arup Kumar Pal
In content based image retrieval(CBIR), the searching and retrieving of similar kinds of digital images from an image database are realized on the visual features of a given query image. The efficiency and accuracy of any CBIR scheme depends on the extracted significant visual features of the digital images. This paper considered a CBIR scheme based on the proficient combination of extracted color and texture visual features. The visual features are extracted from the enhanced HSV color image after enhancing the RGB color image using Laplacian filter. In the presented work, the color feature is extracted from the quantized histograms of Hue (H) and Saturation (S) components while texture feature is extracted from computed gray level co- occurrence matrices (GLCMs) of each sub image of discrete wavelet transform (DWT) of Value (V) component of HSV color image. The extracted color and texture visual features are combined together after normalizing them individually. The proposed CBIR scheme is evaluated on standard Corel image database and observed that the combined feature vector produces the satisfactory results in terms of performance evaluation metrics i.e. precision, recall and F-score. The experimental results are also showed that the proposed CBIR scheme outperforms as compare to the some other existing schemes.
在基于内容的图像检索(CBIR)中,根据给定查询图像的视觉特征,实现对图像数据库中同类数字图像的搜索和检索。任何CBIR方案的效率和准确性都取决于提取的数字图像的重要视觉特征。本文提出了一种基于提取的颜色和纹理视觉特征熟练结合的CBIR方案。利用拉普拉斯滤波对RGB彩色图像进行增强,提取增强后的HSV彩色图像的视觉特征。在本研究中,从色相(H)和饱和度(S)分量的量化直方图中提取颜色特征,而从HSV彩色图像的值(V)分量的离散小波变换(DWT)计算的每个子图像的灰度共生矩阵(glcm)中提取纹理特征。将提取的颜色和纹理视觉特征分别归一化后组合在一起。在标准Corel图像数据库上对所提出的CBIR方案进行了评估,并观察到组合特征向量在精度、召回率和F-score等性能评估指标上取得了令人满意的结果。实验结果还表明,与现有的一些方案相比,所提出的CBIR方案具有更好的性能。
{"title":"A Content Based Image Retrieval using Color and Texture Features","authors":"Naushad Varish, Arup Kumar Pal","doi":"10.1145/2979779.2979787","DOIUrl":"https://doi.org/10.1145/2979779.2979787","url":null,"abstract":"In content based image retrieval(CBIR), the searching and retrieving of similar kinds of digital images from an image database are realized on the visual features of a given query image. The efficiency and accuracy of any CBIR scheme depends on the extracted significant visual features of the digital images. This paper considered a CBIR scheme based on the proficient combination of extracted color and texture visual features. The visual features are extracted from the enhanced HSV color image after enhancing the RGB color image using Laplacian filter. In the presented work, the color feature is extracted from the quantized histograms of Hue (H) and Saturation (S) components while texture feature is extracted from computed gray level co- occurrence matrices (GLCMs) of each sub image of discrete wavelet transform (DWT) of Value (V) component of HSV color image. The extracted color and texture visual features are combined together after normalizing them individually. The proposed CBIR scheme is evaluated on standard Corel image database and observed that the combined feature vector produces the satisfactory results in terms of performance evaluation metrics i.e. precision, recall and F-score. The experimental results are also showed that the proposed CBIR scheme outperforms as compare to the some other existing schemes.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123129809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spin-offs in Indian Stock Market owing to Twitter Sentiments, Commodity Prices and Analyst Recommendations 由于推特情绪,商品价格和分析师建议,印度股市分拆
B. G. Deshmukh, Premkumar S. Jain, Manasi S. Patwardhan, Viraj Kulkarni
These days the most crucial and commercially valuable information is becoming increasingly available on the World Wide Web. Companies which provide financial services are also making their products available on the web. As there are various types of web financial information sources, such as News Blogs, News Articles, Financial websites and Social Media, a lot of work is being carried out in the Stock Market domain using Data Analytics. This paper tries to find out if twitter sentiments and commodity prices help in predicting actual stock prices for top 50 companies listed on NIFTY at NSE, India, by using Natural Language Processing, Sentiment Analysis and Machine Learning techniques. The results show that, Twitter sentiment gives 70% accuracy while predicting the actual stock prices and the accuracy is improved by 15% when integrated with commodity prices for making company-wise predictions. Furthermore, we check if analyst's recommendations have more impact on stock market price movements for all companies listed on NSE as compared to tweeter public sentiments. The results show that, analyst's recommendations contribute more with 9% of the increase in prediction accuracy.
如今,最重要和最具商业价值的信息越来越多地出现在万维网上。提供金融服务的公司也在网上提供他们的产品。由于有各种类型的网络金融信息源,如新闻博客,新闻文章,金融网站和社交媒体,在股票市场领域正在使用数据分析进行大量工作。本文试图通过使用自然语言处理、情感分析和机器学习技术,找出推特情绪和商品价格是否有助于预测印度NSE NIFTY上市的前50家公司的实际股价。结果表明,在预测实际股价时,Twitter情绪的准确率为70%,而在与商品价格相结合进行公司明智预测时,准确率提高了15%。此外,我们检验了分析师的建议是否比推特上的公众情绪对NSE所有上市公司的股价波动有更大的影响。结果表明,分析师的推荐对预测准确率的贡献更大,提高了9%。
{"title":"Spin-offs in Indian Stock Market owing to Twitter Sentiments, Commodity Prices and Analyst Recommendations","authors":"B. G. Deshmukh, Premkumar S. Jain, Manasi S. Patwardhan, Viraj Kulkarni","doi":"10.1145/2979779.2979856","DOIUrl":"https://doi.org/10.1145/2979779.2979856","url":null,"abstract":"These days the most crucial and commercially valuable information is becoming increasingly available on the World Wide Web. Companies which provide financial services are also making their products available on the web. As there are various types of web financial information sources, such as News Blogs, News Articles, Financial websites and Social Media, a lot of work is being carried out in the Stock Market domain using Data Analytics. This paper tries to find out if twitter sentiments and commodity prices help in predicting actual stock prices for top 50 companies listed on NIFTY at NSE, India, by using Natural Language Processing, Sentiment Analysis and Machine Learning techniques. The results show that, Twitter sentiment gives 70% accuracy while predicting the actual stock prices and the accuracy is improved by 15% when integrated with commodity prices for making company-wise predictions. Furthermore, we check if analyst's recommendations have more impact on stock market price movements for all companies listed on NSE as compared to tweeter public sentiments. The results show that, analyst's recommendations contribute more with 9% of the increase in prediction accuracy.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114986684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Proceedings of the International Conference on Advances in Information Communication Technology & Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1