首页 > 最新文献

2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)最新文献

英文 中文
An Energy-Efficient Allocation Technique for Distributing Resources in a Heterogeneous Data Center 一种异构数据中心资源高效分配技术
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079973
Mohd Mursleen, Yogesh Kothyari
Now a days currently there is a lot of power consumption in data centers due to high demand in cloud services like online data storage services, software services on cloud like Google Apps, Sales force and platform as a service on cloud. Due to heavy usage of all these services over the Cloud, now a day's Data Centers are consuming a heavy amount of Energy. This heavy Energy Consumption by data centers is not only including the higher running cost of data centers but it is also effecting the environment inversely. There are basically two ways in which we can reduce energy consumption in Data Centers, first way is by minimising the parameter of data centers while the second method is by exercising an efficiently constructed asset allocation technique to get the optimal balance between energy consumption and performance of the data centers. In this paper, we are dealing with the second approach which is a software based approach i.e. designing an efficient resource allocation technique while the first approach is a hardware based approach. Furthermore, here we will not only deal with homogeneous data centers but we are also considering the heterogeneous data centers. So, our prime focus of this research work is to allocate the resources in homogeneous and heterogeneous data centers in such a manner that energy consumed by data centers usage becomes optimal and energy consumption is reduced without effecting in the performance of data centers. Therefore, for the above we have come up with a novel algorithm toward energy efficiency in such a way that it takes care of scheduling the algorithm fairly while allocating the resources of data centers.
现在,由于云服务(如在线数据存储服务)、云上软件服务(如Google Apps)、销售团队和平台即服务)的高需求,数据中心目前有大量的电力消耗。由于在云上大量使用所有这些服务,现在每天的数据中心都在消耗大量的能源。数据中心的大量能源消耗不仅包括数据中心较高的运行成本,而且还会对环境产生相反的影响。基本上有两种方法可以减少数据中心的能源消耗,第一种方法是通过最小化数据中心的参数,第二种方法是通过行使有效构建的资产分配技术来获得数据中心的能源消耗和性能之间的最佳平衡。在本文中,我们讨论了第二种方法,即基于软件的方法,即设计一种有效的资源分配技术,而第一种方法是基于硬件的方法。此外,这里我们不仅要处理同构数据中心,还要考虑异构数据中心。因此,本研究工作的主要重点是在不影响数据中心性能的情况下,将同构和异构数据中心的资源进行合理分配,使数据中心使用能耗达到最优,降低能耗。因此,针对上述问题,我们提出了一种针对能源效率的新算法,在分配数据中心资源的同时,它可以公平地调度算法。
{"title":"An Energy-Efficient Allocation Technique for Distributing Resources in a Heterogeneous Data Center","authors":"Mohd Mursleen, Yogesh Kothyari","doi":"10.1109/ICACCE46606.2019.9079973","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079973","url":null,"abstract":"Now a days currently there is a lot of power consumption in data centers due to high demand in cloud services like online data storage services, software services on cloud like Google Apps, Sales force and platform as a service on cloud. Due to heavy usage of all these services over the Cloud, now a day's Data Centers are consuming a heavy amount of Energy. This heavy Energy Consumption by data centers is not only including the higher running cost of data centers but it is also effecting the environment inversely. There are basically two ways in which we can reduce energy consumption in Data Centers, first way is by minimising the parameter of data centers while the second method is by exercising an efficiently constructed asset allocation technique to get the optimal balance between energy consumption and performance of the data centers. In this paper, we are dealing with the second approach which is a software based approach i.e. designing an efficient resource allocation technique while the first approach is a hardware based approach. Furthermore, here we will not only deal with homogeneous data centers but we are also considering the heterogeneous data centers. So, our prime focus of this research work is to allocate the resources in homogeneous and heterogeneous data centers in such a manner that energy consumed by data centers usage becomes optimal and energy consumption is reduced without effecting in the performance of data centers. Therefore, for the above we have come up with a novel algorithm toward energy efficiency in such a way that it takes care of scheduling the algorithm fairly while allocating the resources of data centers.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big Data Retrieval using HDFS with LZO Compression 基于LZO压缩的HDFS大数据检索
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079993
T. Prasanth, K. Aarthi, M. Gunasekaran
Any type of organization depends on accurate data analytics to make better decisions. Users of these organizations request access from different resources like processes or executors. When processing this request of users, the data retrieval speed is low and also data is inaccurate for some conditions. To solve this issue, a system may be proposed having Hadoop Distributed File system (HDFS) with Lempel-Ziv-Oberhumer(LZO). The first step in the proposed technique is to retrieve and mine the data from respective database. The next step is to cluster the extracted data and optimize it using HDFS and LZO compression method. In the last step, if the compressed data is found similar to user requested data, the final data has to be visualized to the user. The proposed retrieving process in big data gives better performance and reduced execution time.
任何类型的组织都依赖于准确的数据分析来做出更好的决策。这些组织的用户从不同的资源(如流程或执行者)请求访问。在处理用户的这一请求时,数据检索速度较慢,而且在某些情况下数据不准确。为了解决这个问题,一个系统可能会被提议使用具有LZO (Lempel-Ziv-Oberhumer)特性的HDFS (Hadoop Distributed File system)。该技术的第一步是从各自的数据库中检索和挖掘数据。下一步是将提取的数据进行聚类,并使用HDFS和LZO压缩方法进行优化。在最后一步中,如果发现压缩数据与用户请求的数据相似,则必须将最终数据可视化给用户。提出的大数据检索流程具有更好的性能和更短的执行时间。
{"title":"Big Data Retrieval using HDFS with LZO Compression","authors":"T. Prasanth, K. Aarthi, M. Gunasekaran","doi":"10.1109/ICACCE46606.2019.9079993","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079993","url":null,"abstract":"Any type of organization depends on accurate data analytics to make better decisions. Users of these organizations request access from different resources like processes or executors. When processing this request of users, the data retrieval speed is low and also data is inaccurate for some conditions. To solve this issue, a system may be proposed having Hadoop Distributed File system (HDFS) with Lempel-Ziv-Oberhumer(LZO). The first step in the proposed technique is to retrieve and mine the data from respective database. The next step is to cluster the extracted data and optimize it using HDFS and LZO compression method. In the last step, if the compressed data is found similar to user requested data, the final data has to be visualized to the user. The proposed retrieving process in big data gives better performance and reduced execution time.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114267978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Minutiae Matching Algorithm for Fingerprint Recognition 指纹识别的高效细节匹配算法
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079971
K. Nirmalakumari, H. Rajaguru, P. Rajkumar
Recognition of human fingerprint verifies the match among two fingerprints in an automatic way and it is applied in various fields. The fingerprints are unique and its pattern will remain the same for the lifetime. The minutiae points represent the features of fingerprint that aids in the authentication of fingerprints. The main aim of this paper is to improve a scheme for verification of fingerprint by means of feature extraction and matching techniques. The initial step is preprocessing that involves image enhancement and binarization processes for the poor quality input fingerprint images. The fingerprint verification involves two main steps namely minutiae extraction and minutiae matching. The false minutiae points are to be removed and only efficient minutiae points are to be considered for further process. In this work, two publically available fingerprint datasets are utilized and the accuracy of fingerprint recognition is evaluated using the performance measures namely False Matching Ratio (FMR), False Non Matching Ratio (FNMR) and Threshold. From the results, it is clear that our work provides better results in fingerprint recognition.
人体指纹识别是一种自动验证两枚指纹是否匹配的方法,被广泛应用于各个领域。指纹是独一无二的,它的图案将永远保持不变。指纹细节点代表指纹的特征,有助于指纹的认证。本文的主要目的是改进一种基于特征提取和匹配技术的指纹验证方案。首先是预处理,包括对质量较差的输入指纹图像进行图像增强和二值化处理。指纹验证主要包括特征提取和特征匹配两个步骤。假的细节点将被移除,只有有效的细节点将被考虑用于进一步的处理。在这项工作中,利用两个公开可用的指纹数据集,并使用虚假匹配率(FMR),虚假不匹配率(FNMR)和阈值等性能指标来评估指纹识别的准确性。从结果来看,我们的工作在指纹识别方面提供了更好的结果。
{"title":"Efficient Minutiae Matching Algorithm for Fingerprint Recognition","authors":"K. Nirmalakumari, H. Rajaguru, P. Rajkumar","doi":"10.1109/ICACCE46606.2019.9079971","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079971","url":null,"abstract":"Recognition of human fingerprint verifies the match among two fingerprints in an automatic way and it is applied in various fields. The fingerprints are unique and its pattern will remain the same for the lifetime. The minutiae points represent the features of fingerprint that aids in the authentication of fingerprints. The main aim of this paper is to improve a scheme for verification of fingerprint by means of feature extraction and matching techniques. The initial step is preprocessing that involves image enhancement and binarization processes for the poor quality input fingerprint images. The fingerprint verification involves two main steps namely minutiae extraction and minutiae matching. The false minutiae points are to be removed and only efficient minutiae points are to be considered for further process. In this work, two publically available fingerprint datasets are utilized and the accuracy of fingerprint recognition is evaluated using the performance measures namely False Matching Ratio (FMR), False Non Matching Ratio (FNMR) and Threshold. From the results, it is clear that our work provides better results in fingerprint recognition.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114413520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Supplier Management and Selection System considering Sustainability for a Thermal Power Heavy Industry 考虑可持续性的火电重工供应商管理与选择系统
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079966
P. Kathirvel, P. Parthiban
An Indian thermal power heavy industry has to focus more on sustainable supply chain activities. To increase the sustainable recitation of a supply chain, the SSCM experts should select their suppliers prudently in relation to their own stratagem. Sustainability supply chain management can be maintained by reducing the influence of the barriers of Economic stability, Social Ethics, and Environmental Conservation. These three factors are called the Triple Bottom Line (TBL) concept of the sustainable supply chain management. The factor is considered from the previous research and the team of experts evaluate the factors and factors are given weights accordingly. The barriers of the economic social and environmental are the cost of implementation, lack of potential to save money, Infrastructure, Absence of incentive policies and lack of preparation, understanding & knowledge, Organizational culture also lack awareness of existing environmental regulations, expertise, and understanding of strategies to address environmental issues etc. This research helps to assess an assortment of the suppliers of the thermal power heavy industry based on their performance of The MCDM tool TOPSIS is used to rank the suppliers in thermal power heavy industry. The research also developing healthy competition among the suppliers and improving performance.
印度的火电重工业必须更多地关注可持续供应链活动。为了提高供应链的可持续性,供应链管理专家应该根据自己的战略谨慎地选择供应商。可持续供应链管理可以通过减少经济稳定、社会伦理和环境保护障碍的影响来维持。这三个因素被称为可持续供应链管理的三重底线(TBL)概念。该因素从以往的研究中考虑,由专家团队对各因素进行评价,并赋予各因素相应的权重。经济、社会和环境的障碍是实施成本,缺乏节省资金的潜力,基础设施,缺乏激励政策和缺乏准备,理解和知识,组织文化也缺乏对现有环境法规的认识,专业知识,以及对解决环境问题的战略的理解等。本研究有助于评估基于其性能的火力重工业供应商的分类。MCDM工具TOPSIS用于对火力重工业供应商进行排名。研究还包括促进供应商之间的良性竞争,提高绩效。
{"title":"Supplier Management and Selection System considering Sustainability for a Thermal Power Heavy Industry","authors":"P. Kathirvel, P. Parthiban","doi":"10.1109/ICACCE46606.2019.9079966","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079966","url":null,"abstract":"An Indian thermal power heavy industry has to focus more on sustainable supply chain activities. To increase the sustainable recitation of a supply chain, the SSCM experts should select their suppliers prudently in relation to their own stratagem. Sustainability supply chain management can be maintained by reducing the influence of the barriers of Economic stability, Social Ethics, and Environmental Conservation. These three factors are called the Triple Bottom Line (TBL) concept of the sustainable supply chain management. The factor is considered from the previous research and the team of experts evaluate the factors and factors are given weights accordingly. The barriers of the economic social and environmental are the cost of implementation, lack of potential to save money, Infrastructure, Absence of incentive policies and lack of preparation, understanding & knowledge, Organizational culture also lack awareness of existing environmental regulations, expertise, and understanding of strategies to address environmental issues etc. This research helps to assess an assortment of the suppliers of the thermal power heavy industry based on their performance of The MCDM tool TOPSIS is used to rank the suppliers in thermal power heavy industry. The research also developing healthy competition among the suppliers and improving performance.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Bidirectional Converter for PV System with Battery Storage 电池储能光伏系统的改进型双向变换器
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079982
J. Lakshmi, N. Shankar, K. Maheswari, S. Manivannan
Solar energy is the most popular renewable energy source in the recent times. The use of solar energy for electricity generation is limited and it's non- continuous availability makes the solar power unreliable for critical applications. These problems can be overcome by using other resources in parallel with the solar energy and making it to operate when the solar power is not available. One such solution includes the usage of Hybrid Energy Storage System along with solar power. HESS has different configurations and includes different resources. Here the battery is used as a backup source along with solar. The battery gets charged during the time when solar power is available and the load is supplied by the battery storage while the solar power is unavailable. This system is discussed in detail in this paper. The power flow in both the direction will be controlled by the bidirectional converter. This paper also discusses the simulated results of this proposed system in detail.
太阳能是近年来最受欢迎的可再生能源。太阳能发电的利用是有限的,它的非连续可用性使得太阳能在关键应用中不可靠。这些问题可以通过与太阳能并行不悖的使用其他资源来克服,并使其在太阳能不可用时运行。其中一个解决方案包括使用混合能源存储系统和太阳能。HESS有不同的配置,包含不同的资源。在这里,电池和太阳能一起被用作备用电源。电池在太阳能可用的时候充电,当太阳能不可用的时候,负载由电池存储提供。本文对该系统进行了详细的论述。两个方向的功率流将由双向变换器控制。文中还详细讨论了该系统的仿真结果。
{"title":"Improved Bidirectional Converter for PV System with Battery Storage","authors":"J. Lakshmi, N. Shankar, K. Maheswari, S. Manivannan","doi":"10.1109/ICACCE46606.2019.9079982","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079982","url":null,"abstract":"Solar energy is the most popular renewable energy source in the recent times. The use of solar energy for electricity generation is limited and it's non- continuous availability makes the solar power unreliable for critical applications. These problems can be overcome by using other resources in parallel with the solar energy and making it to operate when the solar power is not available. One such solution includes the usage of Hybrid Energy Storage System along with solar power. HESS has different configurations and includes different resources. Here the battery is used as a backup source along with solar. The battery gets charged during the time when solar power is available and the load is supplied by the battery storage while the solar power is unavailable. This system is discussed in detail in this paper. The power flow in both the direction will be controlled by the bidirectional converter. This paper also discusses the simulated results of this proposed system in detail.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129198056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Detection of Lung Cancer Identification using ENNPSO Classification 基于nnpso分类的肺癌识别自动检测
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079963
B. Hemalatha, S. Yuvaraj, K. Kiruthikaa, V. Viswanathan
The main source of lung cancer is to gasping the tobacco smoke regularly, which affects around 90% of lung cancers. Cancer cells are to be carried to and from the lungs within the blood or lymph fluid ambience the lung tissue. Early diagnosis and treatment can save life. In this, the image processing techniques have been utilized to identify the lung cancer. Initially, the CT scan image is pre-processed for removing the unwanted signals and smoothing them by employing Improved Kaun Filter (IKF). Subsequently, the preprocessed image is portioned by an Active contour method to get exactness of segmented results. Next, specific features are extracted to raise the anticipated accuracy. At last, the tumour has been categorized by Elman Neural Network (ENN) and weights are optimized with PSO and compared the accuracy results with SVM, RBFN and ANFIS.
肺癌的主要来源是经常吸烟,约90%的肺癌是由吸烟引起的。癌细胞在肺组织的血液或淋巴液环境中进出肺部。早期诊断和治疗可以挽救生命。在这方面,图像处理技术已被用于肺癌的识别。首先,对CT扫描图像进行预处理,去除不需要的信号,并采用改进的考恩滤波器(IKF)对其进行平滑处理。然后,利用主动轮廓法对预处理后的图像进行分割,以保证分割结果的准确性。接下来,提取特定的特征以提高预期的准确性。最后,利用Elman神经网络(ENN)对肿瘤进行分类,利用粒子群算法(PSO)对权重进行优化,并与SVM、RBFN和ANFIS进行准确率比较。
{"title":"Automatic Detection of Lung Cancer Identification using ENNPSO Classification","authors":"B. Hemalatha, S. Yuvaraj, K. Kiruthikaa, V. Viswanathan","doi":"10.1109/ICACCE46606.2019.9079963","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079963","url":null,"abstract":"The main source of lung cancer is to gasping the tobacco smoke regularly, which affects around 90% of lung cancers. Cancer cells are to be carried to and from the lungs within the blood or lymph fluid ambience the lung tissue. Early diagnosis and treatment can save life. In this, the image processing techniques have been utilized to identify the lung cancer. Initially, the CT scan image is pre-processed for removing the unwanted signals and smoothing them by employing Improved Kaun Filter (IKF). Subsequently, the preprocessed image is portioned by an Active contour method to get exactness of segmented results. Next, specific features are extracted to raise the anticipated accuracy. At last, the tumour has been categorized by Elman Neural Network (ENN) and weights are optimized with PSO and compared the accuracy results with SVM, RBFN and ANFIS.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robustness Evaluation of Cyber Physical Systems through Network Protocol Fuzzing 基于网络协议模糊的网络物理系统鲁棒性评估
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079995
T. Ananda, Gitanjali Simran T, S. T, S. D, R. P.
With the technological explosion of Internet of Things(IoT) and the conception of every particle being tied to the Internet, the “security” of these globally connected nodes is critical. The availability and reliability of these networked nodes can be guaranteed by securing the physical nodes and the data associated with them but more importantly by ensuring the network security associated with their communication stack. Thus, in this paper we evaluate the security robustness of the Network protocols associated with these networking capable devices through Fuzzing or corner case checks. Through the Fuzz assessments, we can assess the node behavior when the various applications are under fuzz and establish the security damage/robustness associated with it. This supplies a point of node vulnerability to be fixed before the node connects with a global network.
随着物联网(IoT)技术的爆炸式发展,以及每个粒子都与互联网相连的概念,这些全球连接节点的“安全”至关重要。这些网络节点的可用性和可靠性可以通过保护物理节点和与之相关的数据来保证,但更重要的是通过确保与其通信堆栈相关的网络安全性来保证。因此,在本文中,我们通过模糊或角落案例检查来评估与这些具有网络功能的设备相关的网络协议的安全稳健性。通过模糊评估,我们可以评估节点在各种应用处于模糊状态时的行为,并建立与之相关的安全损害/鲁棒性。这提供了一个节点漏洞点,在节点连接到全局网络之前进行修复。
{"title":"Robustness Evaluation of Cyber Physical Systems through Network Protocol Fuzzing","authors":"T. Ananda, Gitanjali Simran T, S. T, S. D, R. P.","doi":"10.1109/ICACCE46606.2019.9079995","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079995","url":null,"abstract":"With the technological explosion of Internet of Things(IoT) and the conception of every particle being tied to the Internet, the “security” of these globally connected nodes is critical. The availability and reliability of these networked nodes can be guaranteed by securing the physical nodes and the data associated with them but more importantly by ensuring the network security associated with their communication stack. Thus, in this paper we evaluate the security robustness of the Network protocols associated with these networking capable devices through Fuzzing or corner case checks. Through the Fuzz assessments, we can assess the node behavior when the various applications are under fuzz and establish the security damage/robustness associated with it. This supplies a point of node vulnerability to be fixed before the node connects with a global network.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114357215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
E-learning services: Insights from Twitter Analytics 电子学习服务:来自Twitter分析的见解
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9080001
P. Vanitha, Sreejith Alathur
Electronic learning is a formalized teaching-learning service using electronic resources. With the help of Information and Communication Technologies (ICTs), knowledge can be shared via the Internet anywhere, anytime. Although, the massive growth of technologies available, e-learning service may not distribute equally in developing countries like India. The objective of the study is to explore the technological challenges of e-learning services in the Indian context. In the present study, the real-time feedback about the technological challenges is collected directly from Twitter social media. Initially, the tweets were extracted based on the hashtags, and the location-based analysis is performed using geocoding. In this study, various types of technological challenges are identified, and the most influential factor is determined. It gives better results when this research is carried on developing countries like India. The suggestion provided in this research will help to decrease the technological challenges in the e-learning service.
电子学习是利用电子资源进行形式化的教学服务。在信息通信技术(ict)的帮助下,知识可以随时随地通过互联网共享。尽管可用技术的大量增长,但电子学习服务在印度等发展中国家的分布可能并不均衡。本研究的目的是探讨印度环境下电子学习服务的技术挑战。在本研究中,直接从Twitter社交媒体收集有关技术挑战的实时反馈。最初,根据标签提取推文,并使用地理编码执行基于位置的分析。在本研究中,识别了各种类型的技术挑战,并确定了最具影响力的因素。如果在印度这样的发展中国家进行这项研究,结果会更好。本研究提供的建议将有助于减少电子学习服务的技术挑战。
{"title":"E-learning services: Insights from Twitter Analytics","authors":"P. Vanitha, Sreejith Alathur","doi":"10.1109/ICACCE46606.2019.9080001","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9080001","url":null,"abstract":"Electronic learning is a formalized teaching-learning service using electronic resources. With the help of Information and Communication Technologies (ICTs), knowledge can be shared via the Internet anywhere, anytime. Although, the massive growth of technologies available, e-learning service may not distribute equally in developing countries like India. The objective of the study is to explore the technological challenges of e-learning services in the Indian context. In the present study, the real-time feedback about the technological challenges is collected directly from Twitter social media. Initially, the tweets were extracted based on the hashtags, and the location-based analysis is performed using geocoding. In this study, various types of technological challenges are identified, and the most influential factor is determined. It gives better results when this research is carried on developing countries like India. The suggestion provided in this research will help to decrease the technological challenges in the e-learning service.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121931085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trigger Event and Hate Content: Insights from Twitter Analytics 触发事件和仇恨内容:来自Twitter分析的见解
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079952
Naganna Chetty, Sreejith Alathur
The problematic act damages the target and seeds the fear in the neighborhood. Social media sites are used for planning and coordinating problematic acts. The problematic act is a trigger event which influences hatred feeling. The objective of the paper is to analyze the aftermath of a recent problematic incident in the southern part of the Asian continent from Twitter content. After the problematic incident, citizens used to share their views over social media sites. A total of 48,819 opinions shared through Twitter social media are collected and analyzed using the software developed in the R programming language. The results show hatred against the problematic act through different related emotions. Results also contain more negative tweets which are almost thrice the positive tweets. Fear and anger emotions exhibit a high degree of emotions than the other.
这种有问题的行为会损害目标,并在社区中播下恐惧的种子。社交媒体网站被用来策划和协调有问题的行为。问题行为是影响仇恨情绪的触发事件。本文的目的是从推特内容分析亚洲大陆南部最近发生的问题事件的后果。在这一问题事件发生后,市民们过去常常在社交媒体网站上分享他们的观点。使用R编程语言开发的软件,收集并分析了Twitter社交媒体上分享的48,819条意见。结果表明,对问题行为的憎恨是通过不同的相关情绪表现出来的。结果也包含更多的负面推文,几乎是正面推文的三倍。恐惧和愤怒情绪比其他情绪表现出更高的情绪程度。
{"title":"Trigger Event and Hate Content: Insights from Twitter Analytics","authors":"Naganna Chetty, Sreejith Alathur","doi":"10.1109/ICACCE46606.2019.9079952","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079952","url":null,"abstract":"The problematic act damages the target and seeds the fear in the neighborhood. Social media sites are used for planning and coordinating problematic acts. The problematic act is a trigger event which influences hatred feeling. The objective of the paper is to analyze the aftermath of a recent problematic incident in the southern part of the Asian continent from Twitter content. After the problematic incident, citizens used to share their views over social media sites. A total of 48,819 opinions shared through Twitter social media are collected and analyzed using the software developed in the R programming language. The results show hatred against the problematic act through different related emotions. Results also contain more negative tweets which are almost thrice the positive tweets. Fear and anger emotions exhibit a high degree of emotions than the other.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132773171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of E-Mail Spam Classification using different Machine Learning Techniques 使用不同机器学习技术的垃圾邮件分类性能分析
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9080000
V. Vinitha, D. Renuka
Most of the business and general communication is done through email because of its cost effectiveness. This efficiency leads email exposed to various attacks including spamming. Nowadays spam email is the foremost concern for email users. These spams are used for sending fake proposals, advertisements, and harmful contents in the form of executable file to attack user systems or the link to the malicious websites resulting in the unessential consumption of network bandwidth. This paper elucidates the different Machine Learning Techniques such as J48 classifier, Adaboost, K-Nearest Neighbor, Naive Bayes, Artificial Neural Network, Support Vector Machine, and Random Forests algorithm for filtering spam emails using different email dataset. However, here the comparison of different spam email classification technique is presented and summarizes the overall scenario regarding accuracy rate of different existing approaches.
大多数业务和一般通信都是通过电子邮件完成的,因为它的成本效益。这种效率导致电子邮件暴露于各种攻击,包括垃圾邮件。如今,垃圾邮件是电子邮件用户最关心的问题。这些垃圾邮件以可执行文件的形式发送虚假提案、广告和有害内容,攻击用户系统或恶意网站的链接,造成不必要的网络带宽消耗。本文阐述了J48分类器、Adaboost、k近邻、朴素贝叶斯、人工神经网络、支持向量机和随机森林算法等不同的机器学习技术在过滤垃圾邮件时使用的不同的电子邮件数据集。然而,本文对不同的垃圾邮件分类技术进行了比较,并总结了不同现有方法的准确率总体情况。
{"title":"Performance Analysis of E-Mail Spam Classification using different Machine Learning Techniques","authors":"V. Vinitha, D. Renuka","doi":"10.1109/ICACCE46606.2019.9080000","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9080000","url":null,"abstract":"Most of the business and general communication is done through email because of its cost effectiveness. This efficiency leads email exposed to various attacks including spamming. Nowadays spam email is the foremost concern for email users. These spams are used for sending fake proposals, advertisements, and harmful contents in the form of executable file to attack user systems or the link to the malicious websites resulting in the unessential consumption of network bandwidth. This paper elucidates the different Machine Learning Techniques such as J48 classifier, Adaboost, K-Nearest Neighbor, Naive Bayes, Artificial Neural Network, Support Vector Machine, and Random Forests algorithm for filtering spam emails using different email dataset. However, here the comparison of different spam email classification technique is presented and summarizes the overall scenario regarding accuracy rate of different existing approaches.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134398170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1