首页 > 最新文献

International Journal of Computing, Communications and Networking最新文献

英文 中文
Indoor Navigation System for Visually Impaired using Real Time 3D Depth Sensing Sensor 使用实时三维深度传感传感器的视障人士室内导航系统
Pub Date : 2020-09-02 DOI: 10.30534/ijccn/2020/05922019
Reo J Mathew
This paper portrays a novel idea for aiding the visually impaired individuals to navigate indoors freely without depending on anyone but only by using a Smartphone. The system has been developed in such a way that it is feasible on any android device, having a depth sensing image sensor. The application makes use of an Indoor Positioning System (IPS), that can use different types of sensory information to locate objects or people inside a large complex. Navigating indoors is the most challenging. It is purely an application for the android Smartphone which uses Augmented reality (AR) and the visually impaired obtains navigation instructions in the form of audio. This can help provide step by step walking independently.The proposed system works with AR Core by Google, with the help of unity engine to process the images in augmented reality to detect the obstacles while navigating indoor and sends an audio message to the user to help him/her to navigate.
这篇论文描述了一个新颖的想法,帮助视障人士在室内自由导航,而不依赖任何人,只使用智能手机。该系统的开发方式使其在任何具有深度感测图像传感器的安卓设备上都是可行的。该应用程序利用室内定位系统(IPS),可以使用不同类型的感官信息来定位大型综合体内的物体或人。在室内导航是最具挑战性的。它纯粹是一款用于android智能手机的应用程序,使用增强现实(AR),视障人士以音频的形式获得导航指令。这可以帮助孩子独立一步一步地行走。该系统与谷歌的AR Core合作,在unity引擎的帮助下,在增强现实中处理图像,以检测室内导航时的障碍物,并向用户发送音频信息以帮助他/她导航。
{"title":"Indoor Navigation System for Visually Impaired using Real Time 3D Depth Sensing Sensor","authors":"Reo J Mathew","doi":"10.30534/ijccn/2020/05922019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/05922019","url":null,"abstract":"This paper portrays a novel idea for aiding the visually impaired individuals to navigate indoors freely without depending on anyone but only by using a Smartphone. The system has been developed in such a way that it is feasible on any android device, having a depth sensing image sensor. The application makes use of an Indoor Positioning System (IPS), that can use different types of sensory information to locate objects or people inside a large complex. Navigating indoors is the most challenging. It is purely an application for the android Smartphone which uses Augmented reality (AR) and the visually impaired obtains navigation instructions in the form of audio. This can help provide step by step walking independently.The proposed system works with AR Core by Google, with the help of unity engine to process the images in augmented reality to detect the obstacles while navigating indoor and sends an audio message to the user to help him/her to navigate.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126156176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flood Prediction Using IoT Enabled Sensor Network and Machine Learning 利用物联网传感器网络和机器学习进行洪水预测
Pub Date : 2020-09-02 DOI: 10.30534/ijccn/2020/06922019
S. Suresh
Floods are one of the most common natural disasters that affects humanity. Unless we take the proper precautions, it will endanger human life itself. Flood prediction using IoT enabled sensor network and machine learning outlines a very efficient way to properly understand and manage floods. This technology can be used to evaluate the risk of flooding, there by speeding up precautionary measures. IoT is a network of computing devices with unique identifiers which helps transferring data across the devices without interaction between human and computers. By using different sensors, information about various environmental conditions were collected and transfer it to google sheet with the help of IoT technology. The client can analyse the data in the form of dataset from a remote device and predict the risk of flood.
洪水是影响人类的最常见的自然灾害之一。除非我们采取适当的预防措施,否则它将危及人类的生命。使用物联网传感器网络和机器学习进行洪水预测,概述了一种非常有效的方法来正确理解和管理洪水。这项技术可以用来评估洪水的风险,从而加快预防措施。物联网是一个具有唯一标识符的计算设备网络,它有助于在设备之间传输数据,而无需人与计算机之间的交互。通过使用不同的传感器,收集各种环境条件的信息,并借助物联网技术将其传输到google sheet。客户端可以从远程设备以数据集的形式分析数据,并预测洪水的风险。
{"title":"Flood Prediction Using IoT Enabled Sensor Network and Machine Learning","authors":"S. Suresh","doi":"10.30534/ijccn/2020/06922019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/06922019","url":null,"abstract":"Floods are one of the most common natural disasters that affects humanity. Unless we take the proper precautions, it will endanger human life itself. Flood prediction using IoT enabled sensor network and machine learning outlines a very efficient way to properly understand and manage floods. This technology can be used to evaluate the risk of flooding, there by speeding up precautionary measures. IoT is a network of computing devices with unique identifiers which helps transferring data across the devices without interaction between human and computers. By using different sensors, information about various environmental conditions were collected and transfer it to google sheet with the help of IoT technology. The client can analyse the data in the form of dataset from a remote device and predict the risk of flood.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133715739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of Question Tags Based on LDA and Deep Neural Network 基于LDA和深度神经网络的问题标签预测
Pub Date : 2020-09-02 DOI: 10.30534/ijccn/2020/02922019
A. Mathew
Students are being evaluated based on the examinations conducted by various institutions or organizations, which test the knowledge of that person. Exams like Computerized Adaptive Testing (CAT), offers a computer based test that adapts the examinee's ability level. Some of the CAT exams include tags which help students to understand the questions. Tags are metadata used to identify or describe an item. There are three types of tags: Manual Tagging, Semi-Automatic tagging and Fully Automatic tagging. Earlier manual tagging was used to construct question banks. However it is time consuming and leads to many other consistency issues. A Semi-Automatic tagging facilitates human intervention to increase the accuracy of tagging. Fully automatic tagging gives a more promising result as compared with manual and semi-automatic tagging. This paper proposes a fully automated tagging system which uses Deep Neural Network and Natural Language Processing to generate tags from the derived knowledge unit. This paper also discusses LDA (Latent Dirichlet Allocation) which gives the relevance of each tag.
学生是根据各种机构或组织进行的考试来评估的,这些考试是为了测试那个人的知识。计算机适应测试(CAT)等考试提供了一种基于计算机的测试,以适应考生的能力水平。一些CAT考试包括帮助学生理解问题的标签。标签是用来标识或描述一个项目的元数据。有三种类型的标签:手动标签,半自动标签和全自动标签。早期的人工标注用于构建题库。然而,它是耗时的,并导致许多其他一致性问题。半自动标注方便人工干预,提高标注的准确性。与人工和半自动标注相比,全自动标注的效果更好。本文提出了一种基于深度神经网络和自然语言处理的全自动化标注系统。本文还讨论了LDA (Latent Dirichlet Allocation),它给出了每个标签的相关性。
{"title":"Prediction of Question Tags Based on LDA and Deep Neural Network","authors":"A. Mathew","doi":"10.30534/ijccn/2020/02922019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/02922019","url":null,"abstract":"Students are being evaluated based on the examinations conducted by various institutions or organizations, which test the knowledge of that person. Exams like Computerized Adaptive Testing (CAT), offers a computer based test that adapts the examinee's ability level. Some of the CAT exams include tags which help students to understand the questions. Tags are metadata used to identify or describe an item. There are three types of tags: Manual Tagging, Semi-Automatic tagging and Fully Automatic tagging. Earlier manual tagging was used to construct question banks. However it is time consuming and leads to many other consistency issues. A Semi-Automatic tagging facilitates human intervention to increase the accuracy of tagging. Fully automatic tagging gives a more promising result as compared with manual and semi-automatic tagging. This paper proposes a fully automated tagging system which uses Deep Neural Network and Natural Language Processing to generate tags from the derived knowledge unit. This paper also discusses LDA (Latent Dirichlet Allocation) which gives the relevance of each tag.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122998181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Resume - Personal Website Builder 数字简历-个人网站建设者
Pub Date : 2020-09-02 DOI: 10.30534/ijccn/2020/04922019
Anandu N Anandu Shimon
A Resume is an inevitable thing for a jobseeker, It helps an employer to validate the aspirant without looking at his face. So it is very important to create it very neatly by including all your details. Consequently, it needs to be updated with all your skills and experiences and these are also variable factors, therefore you have to change it frequently to keep it updated. It also needs to keep safe and remember to take it for all the interviews you are going to attend. of digital now everything getting into its digital format then why not your resumes. It's time to forget about old paper resumes/CVs and it helps to
简历对求职者来说是不可避免的,它可以帮助雇主不看求职者的脸就能确定他是否有抱负。因此,通过包含所有细节来非常整洁地创建它是非常重要的。因此,它需要根据你所有的技能和经验进行更新,这些也是可变的因素,因此你必须经常更改它以保持更新。它也需要妥善保管,并记得在你将要参加的所有面试时都带着它。现在所有的东西都变成了数字格式,那么为什么你的简历不可以呢?是时候忘记旧的纸质简历了
{"title":"Digital Resume - Personal Website Builder","authors":"Anandu N Anandu Shimon","doi":"10.30534/ijccn/2020/04922019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/04922019","url":null,"abstract":"A Resume is an inevitable thing for a jobseeker, It helps an employer to validate the aspirant without looking at his face. So it is very important to create it very neatly by including all your details. Consequently, it needs to be updated with all your skills and experiences and these are also variable factors, therefore you have to change it frequently to keep it updated. It also needs to keep safe and remember to take it for all the interviews you are going to attend. of digital now everything getting into its digital format then why not your resumes. It's time to forget about old paper resumes/CVs and it helps to","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134553854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Problems in Information Security in Network Sites and Solutions 网络站点信息安全存在的问题及解决方案
Pub Date : 2020-09-02 DOI: 10.30534/ijccn/2020/01922019
Magdi Mohammed Mohammed Ahmed Hamoda
 ABSTRACT Data security and computer hardware is a type of technology known as information security, which is applied to computers and networks. The goal of computer security includes protecting information, data, and the characteristics of scientific knowledge from theft, change, or natural disasters, while information and data can remain productive and available to targeted users. Computer system security terms mean the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering, or collapsing as a result of unauthorized or unreliable activities, and unplanned events, respectively, to solve information security problems on networks. Via the website. We must get to know what is related to the concept, and that information, data and device security is a type of technology known as information security, which is applied to computers and networks. The goal of computer security includes protecting scientific information, data, and scientific knowledge from theft, modification, or natural disasters, while information and data can remain productive and available to targeted users. Computer system security terms mean the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering, or collapsing as a result of unauthorized or unreliable activities, and unplanned events, respectively, to solve information security problems on networks. Via the website. We must get to know what is related to the concept and the basic structure of the social network site and other related social networks. Usually the social services network in the internet area indicates: the network address, the social network service and software, and the social network site. These three things are clearly interconnected and indispensable. It is combined to create a platform for users to communicate information.[1] .
数据安全和计算机硬件是一种被称为信息安全的技术,它被应用于计算机和网络。计算机安全的目标包括保护信息、数据和科学知识的特征免遭盗窃、变化或自然灾害,同时信息和数据可以保持生产性并可供目标用户使用。计算机系统安全术语是指保护敏感和有价值的信息和服务免受未经授权或不可靠的活动和意外事件的发布、篡改或破坏的集体过程和机制,以解决网络上的信息安全问题。通过网站。我们必须了解与之相关的概念是什么,即信息、数据和设备安全是一种被称为信息安全的技术,它应用于计算机和网络。计算机安全的目标包括保护科学信息、数据和科学知识免遭盗窃、修改或自然灾害,同时信息和数据可以保持生产性并可供目标用户使用。计算机系统安全术语是指保护敏感和有价值的信息和服务免受未经授权或不可靠的活动和意外事件的发布、篡改或破坏的集体过程和机制,以解决网络上的信息安全问题。通过网站。我们必须了解什么是相关的概念和基本结构的社交网站和其他相关的社交网络。通常互联网领域的社交服务网络是指:网络地址、社交网络服务和软件、社交网站。这三件事显然是相互联系和不可或缺的。它结合起来为用户创造了一个交流信息的平台。[1]。
{"title":"Problems in Information Security in Network Sites and Solutions","authors":"Magdi Mohammed Mohammed Ahmed Hamoda","doi":"10.30534/ijccn/2020/01922019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/01922019","url":null,"abstract":" ABSTRACT Data security and computer hardware is a type of technology known as information security, which is applied to computers and networks. The goal of computer security includes protecting information, data, and the characteristics of scientific knowledge from theft, change, or natural disasters, while information and data can remain productive and available to targeted users. Computer system security terms mean the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering, or collapsing as a result of unauthorized or unreliable activities, and unplanned events, respectively, to solve information security problems on networks. Via the website. We must get to know what is related to the concept, and that information, data and device security is a type of technology known as information security, which is applied to computers and networks. The goal of computer security includes protecting scientific information, data, and scientific knowledge from theft, modification, or natural disasters, while information and data can remain productive and available to targeted users. Computer system security terms mean the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering, or collapsing as a result of unauthorized or unreliable activities, and unplanned events, respectively, to solve information security problems on networks. Via the website. We must get to know what is related to the concept and the basic structure of the social network site and other related social networks. Usually the social services network in the internet area indicates: the network address, the social network service and software, and the social network site. These three things are clearly interconnected and indispensable. It is combined to create a platform for users to communicate information.[1] .","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130736797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Sensor Network in Sustainable City 可持续城市中传感器网络的优化
Pub Date : 2020-09-02 DOI: 10.30534/ijccn/2020/03922019
Gargy Ponnachan
A well monitored sustainable city enhances the lifestyle of the citizens by meeting their own needs with minimal natural resource consumption. The wireless sensor network plays an important role in collecting, processing and analyzing the corresponding information. We propose a system to monitor a city using various IoT enabled wireless sensor networks. With the help of IoT, smart city monitoring can be made possible through real-time monitoring, ubiquitous sensing and intelligent information processing. For best services, to exchange and communicate information IoT embedded systems can be used. It defines a customized design of IoT based monitoring devices. The sensors we use in the system efficiently monitor the city and collect information. The whole system is designed such that it helps in enhancing the condition of a city in many aspects.These information are used to predict upcoming environmentalconditions.
一个监控良好的可持续城市通过以最小的自然资源消耗来满足市民的需求,从而提高市民的生活方式。无线传感器网络在采集、处理和分析相应信息方面起着重要的作用。我们提出了一个使用各种支持物联网的无线传感器网络来监控城市的系统。在物联网的帮助下,通过实时监控、泛在感知和智能信息处理,实现智慧城市监控。为了获得最佳服务,可以使用物联网嵌入式系统来交换和通信信息。它定义了基于物联网的监控设备的定制设计。我们在系统中使用的传感器有效地监控城市并收集信息。整个系统的设计有助于在许多方面改善城市的状况。这些信息被用来预测即将到来的环境状况。
{"title":"Optimizing Sensor Network in Sustainable City","authors":"Gargy Ponnachan","doi":"10.30534/ijccn/2020/03922019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/03922019","url":null,"abstract":"A well monitored sustainable city enhances the lifestyle of the citizens by meeting their own needs with minimal natural resource consumption. The wireless sensor network plays an important role in collecting, processing and analyzing the corresponding information. We propose a system to monitor a city using various IoT enabled wireless sensor networks. With the help of IoT, smart city monitoring can be made possible through real-time monitoring, ubiquitous sensing and intelligent information processing. For best services, to exchange and communicate information IoT embedded systems can be used. It defines a customized design of IoT based monitoring devices. The sensors we use in the system efficiently monitor the city and collect information. The whole system is designed such that it helps in enhancing the condition of a city in many aspects.These information are used to predict upcoming environmentalconditions.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132647489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a New Android App for College Management System 基于Android的高校管理系统App开发
Pub Date : 2019-03-25 DOI: 10.30534/IJCCN/2019/017812019
Dhiman Ritika
Breeze is a new Android Application which provides a common, easy to use platform for college students for better interaction with fellow students, faculty and administration. This work has unique and helpful feature of queries, where students can put up their queries and anyone can answer their queries. For keeping a check over inappropriate posts a feature of report is also provided which tells admin about inappropriate posts and actions could be taken over it accordingly. It also provides user a help option which helps user with any information regarding labs, faculty and lecture halls. Breeze also provides a platform where user can view daily updates of his attendance and syllabus. Breeze app works fluently as it is based on online database system firebase. It has secure login features, and also allows login through Facebook and Google. It also provides basic features like changing password, changing profile picture, retrieving forgotten password. In all, it is an all in one application which has all the features to solve the basic problems of college students.
Breeze是一个新的Android应用程序,它为大学生提供了一个通用的,易于使用的平台,以便更好地与同学,教师和管理人员进行交互。这项工作具有独特而有用的查询功能,学生可以提出他们的问题,任何人都可以回答他们的问题。为了检查不适当的帖子,还提供了一个报告功能,告诉管理员不适当的帖子,并可以采取相应的行动。它还为用户提供了一个帮助选项,帮助用户了解有关实验室,教师和演讲厅的任何信息。Breeze还提供了一个平台,用户可以在其中查看出勤和教学大纲的每日更新。微风应用程序工作流畅,因为它是基于在线数据库系统firebase。它有安全的登录功能,也允许通过Facebook和谷歌登录。它还提供了基本功能,如更改密码,更改头像,检索忘记的密码。总之,它是一个多功能应用程序,具有解决大学生基本问题的所有功能。
{"title":"Developing a New Android App for College Management System","authors":"Dhiman Ritika","doi":"10.30534/IJCCN/2019/017812019","DOIUrl":"https://doi.org/10.30534/IJCCN/2019/017812019","url":null,"abstract":"Breeze is a new Android Application which provides a common, easy to use platform for college students for better interaction with fellow students, faculty and administration. This work has unique and helpful feature of queries, where students can put up their queries and anyone can answer their queries. For keeping a check over inappropriate posts a feature of report is also provided which tells admin about inappropriate posts and actions could be taken over it accordingly. It also provides user a help option which helps user with any information regarding labs, faculty and lecture halls. Breeze also provides a platform where user can view daily updates of his attendance and syllabus. Breeze app works fluently as it is based on online database system firebase. It has secure login features, and also allows login through Facebook and Google. It also provides basic features like changing password, changing profile picture, retrieving forgotten password. In all, it is an all in one application which has all the features to solve the basic problems of college students.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129851100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Communication Between Sensors in IoT 物联网中传感器之间的安全通信
Pub Date : 2018-12-31 DOI: 10.30534/ijccn/2018/02742018
Ewit
 Wireless Sensor Networks (WSNs) are the foremost module of IoT that gather information from the surroundings and send the data to the destinations. A wide Varity of devices can be included in the IOT. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being front-and-center as much of the collected information will be exposed to a wide and often unknown audience. Majority of the existing mechanisms are highly recursive that is actually not feasible for a resource-constraint node to execute for a longer run. Therefore, it will lead to an excessive shortening of resource from the sensor node thereby degrading both communication and security standard. The adversaries acts very differently in wireless sensor networks (WSN) and it has never been checked how they behave when they slipped to internet communication channel. Hence, a robust security scheme is required for securing both gateway node as well as sensor node from being prone to ever increasing level of threats in IoT network and its respective applications. The main aim of this paper is to introduce a secure communication system in IoT.
无线传感器网络(wsn)是物联网最重要的模块,它从周围环境收集信息并将数据发送到目的地。物联网中可以包含各种各样的设备。通过互联网连接许多独立的物联网系统带来了许多挑战,安全性是首要和中心,因为许多收集的信息将暴露给广泛且通常未知的受众。大多数现有机制都是高度递归的,对于资源约束节点来说,执行较长时间的运行实际上是不可行的。因此,它将导致传感器节点资源的过度缩短,从而降低通信和安全标准。在无线传感器网络(WSN)中,攻击者的行为非常不同,当他们滑入互联网通信信道时,他们的行为如何从未被检查过。因此,需要一个强大的安全方案来保护网关节点和传感器节点,使其免受物联网网络及其各自应用中日益增加的威胁。本文的主要目的是介绍一种物联网中的安全通信系统。
{"title":"Secure Communication Between Sensors in IoT","authors":"Ewit","doi":"10.30534/ijccn/2018/02742018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/02742018","url":null,"abstract":" Wireless Sensor Networks (WSNs) are the foremost module of IoT that gather information from the surroundings and send the data to the destinations. A wide Varity of devices can be included in the IOT. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being front-and-center as much of the collected information will be exposed to a wide and often unknown audience. Majority of the existing mechanisms are highly recursive that is actually not feasible for a resource-constraint node to execute for a longer run. Therefore, it will lead to an excessive shortening of resource from the sensor node thereby degrading both communication and security standard. The adversaries acts very differently in wireless sensor networks (WSN) and it has never been checked how they behave when they slipped to internet communication channel. Hence, a robust security scheme is required for securing both gateway node as well as sensor node from being prone to ever increasing level of threats in IoT network and its respective applications. The main aim of this paper is to introduce a secure communication system in IoT.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129817628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
INTERNET OF THING (IoT): AN OVERVIWE BASED ON SECURITY CHALLENGE 物联网:基于安全挑战的概述
Pub Date : 2018-12-31 DOI: 10.30534/IJCCN/2018/01742018
Saudi
{"title":"INTERNET OF THING (IoT): AN OVERVIWE BASED ON SECURITY CHALLENGE","authors":"Saudi","doi":"10.30534/IJCCN/2018/01742018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/01742018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114953178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on the Performance Analysis of EAACK, TSTMC, AB-UBTM and HSCT for Intrusion Detection in Mobile Ad-Hoc Network 移动Ad-Hoc网络中EAACK、TSTMC、AB-UBTM和HSCT入侵检测性能分析综述
Pub Date : 2018-09-15 DOI: 10.30534/ijccn/2018/01732018
Dr. V. Umadevi
An efficient design of network architecture for intrusion detection using Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism in MANET is provided. The construction of spanning tree using Tuning Tutte polynomial operation in mobile ad-hoc network improves the classification rate of abnormal nodes in MANET. The spanning tree based classification using breadth first search reduces the time complexity in detecting abnormal activities and significantly reduces the packet delay rate. To enhance the security level for different mobile nodes in ad hoc network, the Uninterrupted Bayesian Time Mobile algorithm is designed. Adaptive Boosting algorithm improves the resource utilization factor using probability of success and failure factor. Next, an Uninterrupted Bayesian Time Mobile (UBTM) is designed depending on the node class state to increase the trust accuracy rate. Hybrid Symmetric Cryptography Technique is provided based on the novel mixture of two symmetric cryptographic techniques using SP-AES algorithm and MD5-MAR for MANET. This technique reduces packet delay time and improves the true positive rate on abnormal activities in Mobile Ad Hoc Network.The experiments of intrusion detection system are conducted for Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism, Adaptive Boosting with Uninterrupted Bayesian Time Mobile (AB-UBTM) Networks, Hybrid Symmetric Cryptography Technique (HSCT) with the existing method named as Enhanced Adaptive ACKnowledgement (EAACK) illustrated by Elhadi M. Shakshuki., et al., 2013. Some of the parameter used for analyzing the intrusion in mobile networks was security, packet delay time, true positive rate, trust accuracy, resource utilization factor, classification sensitivity rate and multiclass error
提出了一种基于自适应多类分类器(TSTMC)机制的入侵检测网络结构设计方法。在移动自组网中使用Tuning Tutte多项式运算构建生成树,提高了MANET中异常节点的分类率。采用广度优先搜索的基于生成树的分类方法降低了检测异常活动的时间复杂度,显著降低了数据包延迟率。为了提高自组织网络中不同移动节点的安全级别,设计了不间断贝叶斯时间移动算法。自适应增强算法利用成功概率和失败因子来提高资源利用率。其次,根据节点分类状态设计了不间断贝叶斯时间移动算法(UBTM),提高了信任准确率。混合对称密码技术是基于SP-AES算法和MD5-MAR的两种对称密码技术的新颖混合而成的。该技术减少了分组延迟时间,提高了移动自组网中异常活动的真阳性率。对入侵检测系统进行了优化生成树多类分类器(TSTMC)机制、不间断贝叶斯时间移动网络(AB-UBTM)自适应增强、混合对称密码技术(HSCT)和增强自适应确认(EAACK)方法的实验。,等,2013。用于分析移动网络入侵的参数包括安全性、数据包延迟时间、真阳性率、信任准确性、资源利用率、分类灵敏度和多类错误
{"title":"A Review on the Performance Analysis of EAACK, TSTMC, AB-UBTM and HSCT for Intrusion Detection in Mobile Ad-Hoc Network","authors":"Dr. V. Umadevi","doi":"10.30534/ijccn/2018/01732018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/01732018","url":null,"abstract":"An efficient design of network architecture for intrusion detection using Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism in MANET is provided. The construction of spanning tree using Tuning Tutte polynomial operation in mobile ad-hoc network improves the classification rate of abnormal nodes in MANET. The spanning tree based classification using breadth first search reduces the time complexity in detecting abnormal activities and significantly reduces the packet delay rate. To enhance the security level for different mobile nodes in ad hoc network, the Uninterrupted Bayesian Time Mobile algorithm is designed. Adaptive Boosting algorithm improves the resource utilization factor using probability of success and failure factor. Next, an Uninterrupted Bayesian Time Mobile (UBTM) is designed depending on the node class state to increase the trust accuracy rate. Hybrid Symmetric Cryptography Technique is provided based on the novel mixture of two symmetric cryptographic techniques using SP-AES algorithm and MD5-MAR for MANET. This technique reduces packet delay time and improves the true positive rate on abnormal activities in Mobile Ad Hoc Network.The experiments of intrusion detection system are conducted for Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism, Adaptive Boosting with Uninterrupted Bayesian Time Mobile (AB-UBTM) Networks, Hybrid Symmetric Cryptography Technique (HSCT) with the existing method named as Enhanced Adaptive ACKnowledgement (EAACK) illustrated by Elhadi M. Shakshuki., et al., 2013. Some of the parameter used for analyzing the intrusion in mobile networks was security, packet delay time, true positive rate, trust accuracy, resource utilization factor, classification sensitivity rate and multiclass error","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129916587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computing, Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1