Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508125
Seema Sharma
This paper discusses the usage of Deception as a strategy in network security and development of Java based honeypot that is named as “Maya”. For network deception, intruders are deliberately provided with hosts having one or more vulnerabilities. Honeypot is such a network deception tool that provides illusion to the attackers. Basic purpose of Honeypot is to get compromised in order to gather information about intruders and their attack methods. It could also be used to lure attacker and divert him from the actual network. “Maya” honeypot is Java based deception tool having emulated services (FTP etc), a Rule & Anomaly based intrusion detection engine and a web based administration cum monitoring tool.
{"title":"Detection and analysis of network & application layer attacks using Maya Honeypot","authors":"Seema Sharma","doi":"10.1109/CONFLUENCE.2016.7508125","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508125","url":null,"abstract":"This paper discusses the usage of Deception as a strategy in network security and development of Java based honeypot that is named as “Maya”. For network deception, intruders are deliberately provided with hosts having one or more vulnerabilities. Honeypot is such a network deception tool that provides illusion to the attackers. Basic purpose of Honeypot is to get compromised in order to gather information about intruders and their attack methods. It could also be used to lure attacker and divert him from the actual network. “Maya” honeypot is Java based deception tool having emulated services (FTP etc), a Rule & Anomaly based intrusion detection engine and a web based administration cum monitoring tool.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"39 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123524579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508157
Pooja Sharma, Shanu Sharma
Now a days with the advancement of technology, there has been a tremendous rise in the volume of captured and distributed content. Image acquisition can be done with the help of scanners, cameras, smart phones, tablets etc. Document retrieval and recognition systems require high quality document images but most of the time, the images acquired suffer from various degradations like blur, uneven illumination, low resolution etc. To reduce the processing time and get good results, we require methods to evaluate and improve the quality of such images. This paper reviews the quality assessment methods and enhancement techniques for document images as well as represents a survey of the work that has been performed in the field of document image quality assessment and enhancement.
{"title":"An analysis of vision based techniques for quality assessment and enhancement of camera captured document images","authors":"Pooja Sharma, Shanu Sharma","doi":"10.1109/CONFLUENCE.2016.7508157","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508157","url":null,"abstract":"Now a days with the advancement of technology, there has been a tremendous rise in the volume of captured and distributed content. Image acquisition can be done with the help of scanners, cameras, smart phones, tablets etc. Document retrieval and recognition systems require high quality document images but most of the time, the images acquired suffer from various degradations like blur, uneven illumination, low resolution etc. To reduce the processing time and get good results, we require methods to evaluate and improve the quality of such images. This paper reviews the quality assessment methods and enhancement techniques for document images as well as represents a survey of the work that has been performed in the field of document image quality assessment and enhancement.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122917222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508137
Mantek Singh Bhatia, Arunima Jaiswal
Data acquisition refers to the act of collecting data on a large scale. This paper presents a qualitative and quantitative analysis of two data acquisition techniques, namely, Pen and Paper Interviewing (PAPI) and Computer-Assisted Personal Interviewing (CAPI). It cites two case studies to clearly define the difference between the two techniques. They have been compared on four factors, namely, cost, time consumed during the whole process, productivity of each interviewer and quality assessment of each techniques (average number of errors occurred per interview). It emphasizes on providing absolute numbers to clearly show the difference between the two techniques.
{"title":"Empirical analysis of data acquisition techniques: PAPI vs. CAPI","authors":"Mantek Singh Bhatia, Arunima Jaiswal","doi":"10.1109/CONFLUENCE.2016.7508137","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508137","url":null,"abstract":"Data acquisition refers to the act of collecting data on a large scale. This paper presents a qualitative and quantitative analysis of two data acquisition techniques, namely, Pen and Paper Interviewing (PAPI) and Computer-Assisted Personal Interviewing (CAPI). It cites two case studies to clearly define the difference between the two techniques. They have been compared on four factors, namely, cost, time consumed during the whole process, productivity of each interviewer and quality assessment of each techniques (average number of errors occurred per interview). It emphasizes on providing absolute numbers to clearly show the difference between the two techniques.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129139954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508038
V. Bova, V. Kureichik, D. Zaruba
This article discusses the promising direction in the field of intelligence informational system such as knowledge bases development. These knowledge bases use ontology systemization as a tool for classification of domain objects. The developed model is able to select essential features of classifiable objects. To solve problems of classification and structuring of data and knowledge, we suggest a new evolutionary approach based on the arranging of knowledge objects with respect to the basic element inside of a multidimensional space of features. The basic element is denoted by the genetic algorithm (GA). This algorithm allows to obtain the effective solution of classification with the use of different types of basic element representation inside of multidimensional space and various classes ordering in sequence of ontology objects. The genetic algorithm is an iterative probabilistic heuristic search algorithm with simultaneous use of a variety of populations from alternative solution space.
{"title":"Data and knowledge classification in intelligence informational systems by the evolutionary method","authors":"V. Bova, V. Kureichik, D. Zaruba","doi":"10.1109/CONFLUENCE.2016.7508038","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508038","url":null,"abstract":"This article discusses the promising direction in the field of intelligence informational system such as knowledge bases development. These knowledge bases use ontology systemization as a tool for classification of domain objects. The developed model is able to select essential features of classifiable objects. To solve problems of classification and structuring of data and knowledge, we suggest a new evolutionary approach based on the arranging of knowledge objects with respect to the basic element inside of a multidimensional space of features. The basic element is denoted by the genetic algorithm (GA). This algorithm allows to obtain the effective solution of classification with the use of different types of basic element representation inside of multidimensional space and various classes ordering in sequence of ontology objects. The genetic algorithm is an iterative probabilistic heuristic search algorithm with simultaneous use of a variety of populations from alternative solution space.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122417814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508138
N. Kaur, A. Kaur
This paper presents an approach of data mining technique to predict electricity demand of a geographical region based on the meteorological conditions. The value prediction predictive data mining technique is implemented with the Artificial Neural Networks. The values of the factors such as temperature, humidity and public holiday on which electricity consumption depends and the daily consumption values constitute the data. Data mining operations are performed on this historical data to form a prediction model which is capable of predicting daily consumption provided the meteorological parameters. The steps of knowledge discovery of data process are implemented. The data is preprocessed and fed to neural network for training it. The trained neural network is used to predict the electricity demand for the given meteorological conditions.
{"title":"Predictive modelling approach to data mining for forecasting electricity consumption","authors":"N. Kaur, A. Kaur","doi":"10.1109/CONFLUENCE.2016.7508138","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508138","url":null,"abstract":"This paper presents an approach of data mining technique to predict electricity demand of a geographical region based on the meteorological conditions. The value prediction predictive data mining technique is implemented with the Artificial Neural Networks. The values of the factors such as temperature, humidity and public holiday on which electricity consumption depends and the daily consumption values constitute the data. Data mining operations are performed on this historical data to form a prediction model which is capable of predicting daily consumption provided the meteorological parameters. The steps of knowledge discovery of data process are implemented. The data is preprocessed and fed to neural network for training it. The trained neural network is used to predict the electricity demand for the given meteorological conditions.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116448324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508184
Tanvi Sachdev, B. Gandhi, Jitendra Kumar Singh Jadon
A device intended to use the white space radio spectrum is a “white-spaces device” (WSD). Such devices are designed to detect the presence of existing but unused areas of airwaves and utilize it for internet connectivity. The advantages associated with the utilization of white space spectrum make it extremely attractive for wireless applications. This paper applies to Master white space device and Slave white space device, which are a part of TV white space device which are managed and controlled by a white space database operating in the TV band of 470 MHz to 790 MHz. These devices are intended to possess primary, dedicated or external antennas, where TVWS devices using external antennas are intended only for fixed use. A master WSD directly communicates with a TVWSDB and on the other hand a slave WSD is able to communicate when under the control of a master WSD. This paper presents the functionality of both Master and Slave WSD with their hand in hand working and it also explain some essential parameters required for their operation.
{"title":"Interconnectivity of a Master and a Slave white space device under the control of a TVWSDB","authors":"Tanvi Sachdev, B. Gandhi, Jitendra Kumar Singh Jadon","doi":"10.1109/CONFLUENCE.2016.7508184","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508184","url":null,"abstract":"A device intended to use the white space radio spectrum is a “white-spaces device” (WSD). Such devices are designed to detect the presence of existing but unused areas of airwaves and utilize it for internet connectivity. The advantages associated with the utilization of white space spectrum make it extremely attractive for wireless applications. This paper applies to Master white space device and Slave white space device, which are a part of TV white space device which are managed and controlled by a white space database operating in the TV band of 470 MHz to 790 MHz. These devices are intended to possess primary, dedicated or external antennas, where TVWS devices using external antennas are intended only for fixed use. A master WSD directly communicates with a TVWSDB and on the other hand a slave WSD is able to communicate when under the control of a master WSD. This paper presents the functionality of both Master and Slave WSD with their hand in hand working and it also explain some essential parameters required for their operation.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127122294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508113
H. Atre, Karan Razdan, R. Sagar
Most people today are extremely reliant on their mobile devices. From the basic task of making calls to keeping track of your fitness, the smart phone is a versatile device that can cater to a number of our needs. The mobile devices owe their popularity and success to the huge number of applications that can be installed on them and the various tasks that can be performed using the said applications. Like every good thing, mobile devices have a few short comings too. The major limitations in a mobile device have always been the amount of memory available, the processing power and the battery life. We are going to investigate the various trends in the mobile device market and how mobile cloud computing fits into the whole picture.
{"title":"A review of mobile cloud computing","authors":"H. Atre, Karan Razdan, R. Sagar","doi":"10.1109/CONFLUENCE.2016.7508113","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508113","url":null,"abstract":"Most people today are extremely reliant on their mobile devices. From the basic task of making calls to keeping track of your fitness, the smart phone is a versatile device that can cater to a number of our needs. The mobile devices owe their popularity and success to the huge number of applications that can be installed on them and the various tasks that can be performed using the said applications. Like every good thing, mobile devices have a few short comings too. The major limitations in a mobile device have always been the amount of memory available, the processing power and the battery life. We are going to investigate the various trends in the mobile device market and how mobile cloud computing fits into the whole picture.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126856165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508162
Jaya Bajpai, A. Kaur
Embedding a digital data into the host signal under perceptual constraints is called audio watermarking. Existing Literature in this field gives vast algorithms providing solutions to the audio watermarking constraints. A survey on different domains such as spatial domain, frequency domain and the hybrid domain of digital audio watermarking has been carried out in this paper. The algorithms that are implemented have been studied and reviewed, the challenges posed in this algorithms and their drawbacks have been presented in the paper. The best possible solution to them have been engrossed as future work in this survey.
{"title":"A literature survey - various audio watermarking techniques and their challenges","authors":"Jaya Bajpai, A. Kaur","doi":"10.1109/CONFLUENCE.2016.7508162","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508162","url":null,"abstract":"Embedding a digital data into the host signal under perceptual constraints is called audio watermarking. Existing Literature in this field gives vast algorithms providing solutions to the audio watermarking constraints. A survey on different domains such as spatial domain, frequency domain and the hybrid domain of digital audio watermarking has been carried out in this paper. The algorithms that are implemented have been studied and reviewed, the challenges posed in this algorithms and their drawbacks have been presented in the paper. The best possible solution to them have been engrossed as future work in this survey.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133929858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508181
Navita, Amandeep
Long Term Evolution (LTE) has become a powerful technology for 4th Generation networks. New generation always demand a better quality of service mainly in terms of high data rate, better signal quality, large coverage area and services at low cost etc. LTE comes to support the 4G environment by adopting the three important multiple access techniques. The three multiple access techniques are Orthogonal Frequency Division Multiple Access (OFDMA), Multiple Inputs Multiple Outputs (MIMO) and Single Carrier Frequency Division Multiple Access (SC-FDMA) techniques. Each technique has its associated features that make LTE popular among its users. OFDMA and MIMO technology are used for downlink and SC-FDMA for uplink channel. In this paper, we are going to analyze the performance of OFDMA, MIMO and SC-FDMA in LTE at physical layer by considering different modulation schemes such as BPSK, QPSK, 16 QAM by using BER and SNR as parameters.
{"title":"Performance analysis of OFDMA, MIMO and SC-FDMA technology in 4G LTE networks","authors":"Navita, Amandeep","doi":"10.1109/CONFLUENCE.2016.7508181","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508181","url":null,"abstract":"Long Term Evolution (LTE) has become a powerful technology for 4th Generation networks. New generation always demand a better quality of service mainly in terms of high data rate, better signal quality, large coverage area and services at low cost etc. LTE comes to support the 4G environment by adopting the three important multiple access techniques. The three multiple access techniques are Orthogonal Frequency Division Multiple Access (OFDMA), Multiple Inputs Multiple Outputs (MIMO) and Single Carrier Frequency Division Multiple Access (SC-FDMA) techniques. Each technique has its associated features that make LTE popular among its users. OFDMA and MIMO technology are used for downlink and SC-FDMA for uplink channel. In this paper, we are going to analyze the performance of OFDMA, MIMO and SC-FDMA in LTE at physical layer by considering different modulation schemes such as BPSK, QPSK, 16 QAM by using BER and SNR as parameters.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131560942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508182
O. Chaturvedi, Parmeet Kaur, Nishtha Ahuja, T. Prakash
The paper proposes two distributed algorithms for the construction of a connected dominating set (CDS) in a mobile ad hoc network. The CDS can be used as a virtual backbone for efficient communication in the ad hoc networks and consequently allow scalability of distributed algorithms implemented for these networks. The proposed algorithms organize the entire network topology into clusters and the CDS is formed out of the nodes acting as the cluster heads (CHs). The paper proposes improvements in some existing algorithms to yield a smaller sized CDS or cause a low message overhead during CDS construction. The simulation results verify the effectiveness of the proposed algorithms as compared to the existing algorithms.
{"title":"Improved algorithms for construction of connected dominating set in MANETs","authors":"O. Chaturvedi, Parmeet Kaur, Nishtha Ahuja, T. Prakash","doi":"10.1109/CONFLUENCE.2016.7508182","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508182","url":null,"abstract":"The paper proposes two distributed algorithms for the construction of a connected dominating set (CDS) in a mobile ad hoc network. The CDS can be used as a virtual backbone for efficient communication in the ad hoc networks and consequently allow scalability of distributed algorithms implemented for these networks. The proposed algorithms organize the entire network topology into clusters and the CDS is formed out of the nodes acting as the cluster heads (CHs). The paper proposes improvements in some existing algorithms to yield a smaller sized CDS or cause a low message overhead during CDS construction. The simulation results verify the effectiveness of the proposed algorithms as compared to the existing algorithms.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133338197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}