首页 > 最新文献

2016 2nd International Conference on Next Generation Computing Technologies (NGCT)最新文献

英文 中文
Comparative analysis of sentiment orientation using SVM and Naive Bayes techniques 基于支持向量机和朴素贝叶斯技术的情感倾向比较分析
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877399
S. Rana, Archana Singh
In the recent few years several efforts were dedicated for mining opinions and sentiment automatically from natural language in online networking messages, news and business product reviews. In this paper, we have explored sentiment orientation considering the positive and negative sentiments using film user reviews. We applied the technique Naive Bayes' classifier.). We have performed the sentiment analysis on the reviews using the algorithms like Naive Bayes, Linear SVM and Synthetic words. Our experimental results indicate that the Linear SVM has provided the best accuracy which is followed by the Synthetic words approach. The result also evaluate that the highest accuracy rate is of drama.
最近几年,人们致力于从在线网络消息、新闻和商业产品评论中的自然语言中自动挖掘观点和情感。在本文中,我们利用电影用户评论来探讨考虑正面和负面情绪的情感取向。我们应用了朴素贝叶斯的分类器技术。我们使用朴素贝叶斯、线性支持向量机和合成词等算法对评论进行了情感分析。实验结果表明,线性支持向量机的准确率最高,其次是合成词方法。结果还表明,准确率最高的是戏剧。
{"title":"Comparative analysis of sentiment orientation using SVM and Naive Bayes techniques","authors":"S. Rana, Archana Singh","doi":"10.1109/NGCT.2016.7877399","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877399","url":null,"abstract":"In the recent few years several efforts were dedicated for mining opinions and sentiment automatically from natural language in online networking messages, news and business product reviews. In this paper, we have explored sentiment orientation considering the positive and negative sentiments using film user reviews. We applied the technique Naive Bayes' classifier.). We have performed the sentiment analysis on the reviews using the algorithms like Naive Bayes, Linear SVM and Synthetic words. Our experimental results indicate that the Linear SVM has provided the best accuracy which is followed by the Synthetic words approach. The result also evaluate that the highest accuracy rate is of drama.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116773415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Encoding passwords using QR image for authentication 使用QR图像编码密码进行身份验证
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877523
Salim Istyaq, M. S. Umar
Today, the world is moving beyond the imagination of the people, day by day new era in technology comes which create huge impact on their lives. As the invention of the computer takes place, now most of the work is performed with the help of computer. In order to protect the main resource of the people, it is important to make the modification in older technology or create a new one. Level of security such as textual password, biometric etc. are imposed. But there is some disadvantage i.e. textual password is easy to remember. On the other hand by using graphical approach, we can give the best alternative to the passwords as done in this paper. We presented a system based on the graphical scheme that uses QR code and the basic methodology is inside the levels of encryption in QR code. Our aim is to give the more complexity to the high yielding encryption in graphical passwords.
今天,世界正在超越人们的想象,技术的新时代一天天到来,对人们的生活产生了巨大的影响。随着计算机的发明,现在大部分的工作都是借助计算机来完成的。为了保护人民的主要资源,重要的是对旧技术进行修改或创造新的技术。安全级别,如文本密码,生物识别等是强加的。但也有一些缺点,即文本密码容易记忆。另一方面,通过图形化的方法,我们可以给出本文所做的密码的最佳替代方案。我们提出了一个基于图形方案的系统,该系统使用QR码,其基本方法是在QR码的加密层内。我们的目标是给图形密码的高收益加密提供更多的复杂性。
{"title":"Encoding passwords using QR image for authentication","authors":"Salim Istyaq, M. S. Umar","doi":"10.1109/NGCT.2016.7877523","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877523","url":null,"abstract":"Today, the world is moving beyond the imagination of the people, day by day new era in technology comes which create huge impact on their lives. As the invention of the computer takes place, now most of the work is performed with the help of computer. In order to protect the main resource of the people, it is important to make the modification in older technology or create a new one. Level of security such as textual password, biometric etc. are imposed. But there is some disadvantage i.e. textual password is easy to remember. On the other hand by using graphical approach, we can give the best alternative to the passwords as done in this paper. We presented a system based on the graphical scheme that uses QR code and the basic methodology is inside the levels of encryption in QR code. Our aim is to give the more complexity to the high yielding encryption in graphical passwords.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125335725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The video hiding technique based on DWT and genetic algorithm with boolean functions 基于小波变换和布尔函数遗传算法的视频隐藏技术
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877528
G. Sowmya, K. Meghana, B. Subbarayudu, R. Naidu, G. Keerthi
Steganography is a method of hiding a secret message within an ordinary message, where as the goal of cryptography is to make data unreadable by an unauthorized persons. Video steganography is expansion of image steganography where video files can simply viewed in a sequence of images. There are many difference between video and image steganography. As the video content is very dynamic and have less chances of detecting the hiding data compare to image steganography. So it is helpful than other existing stegnographic techniques because of it high security. It can also hold large amount of secret data. We introduced a technique called Discrete Wavelet Transformation (DWT) and Genetic algorithm to convert the data into a video file to make the video Steganography, which is an efficient method of embedding information into a carrier file. The DWT technique convert the cover image as 4 × 4 level of blocks in which each levels LL, LH, HL, and HH sub band images are developed. The current paper uses the DWT technique where the data is hidden in specific location of selected structure. Genetic algorithm is also introduced to minimize the selected frame and improve the security so that probability of detecting the hidden information into cover media is difficult. Boolean functions have been generated from different position arrays and measures the quality of the video indifferent byte streams by stego video.
隐写术是一种在普通消息中隐藏秘密消息的方法,而密码学的目标是使未经授权的人无法读取数据。视频隐写术是图像隐写术的扩展,视频文件可以简单地在一系列图像中查看。视频隐写和图像隐写有许多不同之处。由于视频内容是动态的,与图像隐写相比,发现隐藏数据的机会更小。与现有的其他隐写技术相比,它具有较高的安全性。它还可以保存大量的秘密数据。采用离散小波变换(DWT)和遗传算法将数据转换成视频文件进行视频隐写,是一种有效的将信息嵌入到载体文件中的方法。DWT技术将覆盖图像转换为4 × 4级的块,在每个层上开发LL、LH、HL和HH子带图像。本文采用小波变换技术,将数据隐藏在选定结构的特定位置。采用遗传算法最小化所选帧,提高了安全性,使得隐藏信息被检测到覆盖介质的概率变大。从不同的位置数组生成布尔函数,并通过隐写视频度量视频无关字节流的质量。
{"title":"The video hiding technique based on DWT and genetic algorithm with boolean functions","authors":"G. Sowmya, K. Meghana, B. Subbarayudu, R. Naidu, G. Keerthi","doi":"10.1109/NGCT.2016.7877528","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877528","url":null,"abstract":"Steganography is a method of hiding a secret message within an ordinary message, where as the goal of cryptography is to make data unreadable by an unauthorized persons. Video steganography is expansion of image steganography where video files can simply viewed in a sequence of images. There are many difference between video and image steganography. As the video content is very dynamic and have less chances of detecting the hiding data compare to image steganography. So it is helpful than other existing stegnographic techniques because of it high security. It can also hold large amount of secret data. We introduced a technique called Discrete Wavelet Transformation (DWT) and Genetic algorithm to convert the data into a video file to make the video Steganography, which is an efficient method of embedding information into a carrier file. The DWT technique convert the cover image as 4 × 4 level of blocks in which each levels LL, LH, HL, and HH sub band images are developed. The current paper uses the DWT technique where the data is hidden in specific location of selected structure. Genetic algorithm is also introduced to minimize the selected frame and improve the security so that probability of detecting the hidden information into cover media is difficult. Boolean functions have been generated from different position arrays and measures the quality of the video indifferent byte streams by stego video.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PassNeighbor: A shoulder surfing resistant scheme PassNeighbor:抗肩部冲浪方案
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877519
Swaleha Saeed, M. S. Umar
Information security is the rapidly rising area of concern in today's world of network technology. Traditionally, secure access to information is guarded by combination of username and password. The idea of graphical password as an alternative to text based approach was proposed by Blonder in 1996 motivated by the fact called as “picture superiority effect” i.e. tendency of human brain to memorize images far better than text. In this paper, we have proposed a new secure graphical password technique of authentication, which conceals information about the user's password without sacrificing the usability. The technique exploits indirect entry of password image by creating a delusion to select nearby neighbor which makes it difficult for a shoulder-surfer to identify the user's actual password. The simulation result and user study proved that the scheme is easier to use, faster, secure, reliable and can be easily adopted in various security applications like ATMs, mobile phones etc. without requiring any additional hardware.
信息安全是当今世界网络技术关注的一个迅速上升的领域。传统上,对信息的安全访问由用户名和密码的组合来保护。1996年,Blonder提出了使用图形密码替代文本密码的想法,其动机是“图像优势效应”,即人脑对图像的记忆能力远远超过对文本的记忆能力。本文提出了一种新的安全图形密码认证技术,该技术在不牺牲可用性的前提下隐藏了用户的密码信息。该技术利用密码图像的间接输入,制造一个选择附近邻居的错觉,使肩部冲冲者难以识别用户的实际密码。仿真结果和用户研究表明,该方案使用简单、速度快、安全可靠,无需任何额外硬件即可轻松应用于atm、手机等各种安全应用中。
{"title":"PassNeighbor: A shoulder surfing resistant scheme","authors":"Swaleha Saeed, M. S. Umar","doi":"10.1109/NGCT.2016.7877519","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877519","url":null,"abstract":"Information security is the rapidly rising area of concern in today's world of network technology. Traditionally, secure access to information is guarded by combination of username and password. The idea of graphical password as an alternative to text based approach was proposed by Blonder in 1996 motivated by the fact called as “picture superiority effect” i.e. tendency of human brain to memorize images far better than text. In this paper, we have proposed a new secure graphical password technique of authentication, which conceals information about the user's password without sacrificing the usability. The technique exploits indirect entry of password image by creating a delusion to select nearby neighbor which makes it difficult for a shoulder-surfer to identify the user's actual password. The simulation result and user study proved that the scheme is easier to use, faster, secure, reliable and can be easily adopted in various security applications like ATMs, mobile phones etc. without requiring any additional hardware.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128073773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Implementation of RSSI indexed look up table based AGC for improved dynamic range of DSSS based wireless rf transceivers 基于RSSI索引查找表的AGC实现,提高了基于DSSS的无线射频收发器的动态范围
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877444
H. K. Boyapati, Rajeev Kumar Elubudi, Sailaja Ungati, Manoj Jain
The military wireless systems often have specific constraints such as achieving very good receiver sensitivity, very high tolerance to frequency shifts and best possible dynamic range. Direct spread spectrum (DSS) is the proven threat free technology in many militarized wireless systems, which will also gives the advantage of good receiver sensitivity because of spreading gain it offers. The RF dynamic range of the receiver is defined as the range of signal strength values for which receiver works without packet loss. Improving the RF dynamic range is one of the important challenges. Because of power variations, Doppler variation (or) any other wireless channel effect received signal power varies. In worst cases, the received signal power can vary with a dynamic range of 70 dB to 80 dB depending on the distance between a transmitter and a receiver. In this paper, we have implemented RSSI indexed Look Up Table (LUT) based approach of automatic gain control. The results show improvement in dynamic range with simplicity in implementation.
军用无线系统通常具有特定的限制,例如实现非常好的接收器灵敏度,非常高的频率漂移容忍度和最佳动态范围。直接扩频(DSS)技术在许多军用无线系统中已经被证明是一种无威胁的技术,由于它提供的扩频增益,它还将具有良好的接收机灵敏度。接收机的射频动态范围定义为接收机工作时不丢包的信号强度值范围。提高射频动态范围是其中一个重要的挑战。由于功率的变化,多普勒变化(或)任何其他无线信道效应接收到的信号功率也会变化。在最坏的情况下,根据发射器和接收器之间的距离,接收到的信号功率可以在70 dB到80 dB的动态范围内变化。本文实现了基于RSSI索引查找表(LUT)的自动增益控制方法。结果表明,动态范围得到改善,实现简单。
{"title":"Implementation of RSSI indexed look up table based AGC for improved dynamic range of DSSS based wireless rf transceivers","authors":"H. K. Boyapati, Rajeev Kumar Elubudi, Sailaja Ungati, Manoj Jain","doi":"10.1109/NGCT.2016.7877444","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877444","url":null,"abstract":"The military wireless systems often have specific constraints such as achieving very good receiver sensitivity, very high tolerance to frequency shifts and best possible dynamic range. Direct spread spectrum (DSS) is the proven threat free technology in many militarized wireless systems, which will also gives the advantage of good receiver sensitivity because of spreading gain it offers. The RF dynamic range of the receiver is defined as the range of signal strength values for which receiver works without packet loss. Improving the RF dynamic range is one of the important challenges. Because of power variations, Doppler variation (or) any other wireless channel effect received signal power varies. In worst cases, the received signal power can vary with a dynamic range of 70 dB to 80 dB depending on the distance between a transmitter and a receiver. In this paper, we have implemented RSSI indexed Look Up Table (LUT) based approach of automatic gain control. The results show improvement in dynamic range with simplicity in implementation.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124846409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
XSS vulnerability assessment and prevention in web application web应用XSS漏洞评估与防范
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877529
Ankita Shrivastava, S. Choudhary, Ashish Kumar
Cross site scripting (XSS) is a type of scripting attack on web pages and account as one of the unsafe vulnerability existed in web applications. Once the vulnerability is oppressed, an intruder advances intended access of the authenticate user's web-browser and may perform session-hijacking, cookie-stealing, malicious redirection and malware-spreading. As prevention against such attacks, it is essential to implement security measures that certainly block the third party intrusion. Recently the most dangerous attacks are reflected and DOM based cross-site scripting attacks because in both cases attacker attack using server side scripting and do forgery over the network, it is hard to detect and therefore it must be prevented. Vulnerabilities of websites are exploited over the network through web request using GET and POST method. In this paper, we are focusing on injection, detection, and prevention of stored based XSS reflected XSS and DOM based XSS.
跨站脚本(XSS)是一种针对网页和帐户的脚本攻击,是web应用中存在的不安全漏洞之一。一旦这个漏洞被攻破,入侵者就会进入认证用户的网络浏览器,并可能进行会话劫持、窃取cookie、恶意重定向和恶意软件传播。为了防止此类攻击,必须实施能够阻止第三方入侵的安全措施。最近最危险的攻击是基于DOM的跨站点脚本攻击,因为在这两种情况下,攻击者使用服务器端脚本攻击并在网络上进行伪造,很难检测到,因此必须加以防止。利用GET和POST方法的web请求,在网络上利用网站的漏洞。本文主要研究基于存储的XSS、基于反射的XSS和基于DOM的XSS的注入、检测和预防。
{"title":"XSS vulnerability assessment and prevention in web application","authors":"Ankita Shrivastava, S. Choudhary, Ashish Kumar","doi":"10.1109/NGCT.2016.7877529","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877529","url":null,"abstract":"Cross site scripting (XSS) is a type of scripting attack on web pages and account as one of the unsafe vulnerability existed in web applications. Once the vulnerability is oppressed, an intruder advances intended access of the authenticate user's web-browser and may perform session-hijacking, cookie-stealing, malicious redirection and malware-spreading. As prevention against such attacks, it is essential to implement security measures that certainly block the third party intrusion. Recently the most dangerous attacks are reflected and DOM based cross-site scripting attacks because in both cases attacker attack using server side scripting and do forgery over the network, it is hard to detect and therefore it must be prevented. Vulnerabilities of websites are exploited over the network through web request using GET and POST method. In this paper, we are focusing on injection, detection, and prevention of stored based XSS reflected XSS and DOM based XSS.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131697237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A novel design of stair cased shaped fractal antenna for wireless applications 一种用于无线应用的新型阶梯状分形天线设计
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877449
Ghriti Khanna, N. Sharma
The paper exhibits a novel design of stair cased shaped fractal antenna for multiband applications. The antenna is designed on FR4 glass epoxy substrate with parameters like thickness 1.6mm, dielectric constant 4.4 and resonant frequency 3.8GHz. Proposed antenna is simulated and coaxial feed is used to analyze its performance. Maximum value of gain observed is 7.51dB. The HFSS version 13 software is used for designing and simulating the antenna. Designed antenna can be used for several wireless communication applications like S-band (2.67–2.87GHz), WiMAX (4.5–4.6 GHz), WiMAX (5.2–5.5 GHz), C-band (6.95–7.4 GHz) and X-band (8.6–8.65 GHz).
本文提出了一种适用于多波段应用的阶梯状分形天线的新设计。天线设计在厚度1.6mm、介电常数4.4、谐振频率3.8GHz的FR4玻璃环氧基板上。对该天线进行了仿真,并采用同轴馈电对其性能进行了分析。观测到的增益最大值为7.51dB。采用HFSS 13版软件对天线进行设计和仿真。设计的天线可用于多种无线通信应用,如s波段(2.67-2.87GHz), WiMAX (4.5-4.6 GHz), WiMAX (5.2-5.5 GHz), c波段(6.95-7.4 GHz)和x波段(8.6-8.65 GHz)。
{"title":"A novel design of stair cased shaped fractal antenna for wireless applications","authors":"Ghriti Khanna, N. Sharma","doi":"10.1109/NGCT.2016.7877449","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877449","url":null,"abstract":"The paper exhibits a novel design of stair cased shaped fractal antenna for multiband applications. The antenna is designed on FR4 glass epoxy substrate with parameters like thickness 1.6mm, dielectric constant 4.4 and resonant frequency 3.8GHz. Proposed antenna is simulated and coaxial feed is used to analyze its performance. Maximum value of gain observed is 7.51dB. The HFSS version 13 software is used for designing and simulating the antenna. Designed antenna can be used for several wireless communication applications like S-band (2.67–2.87GHz), WiMAX (4.5–4.6 GHz), WiMAX (5.2–5.5 GHz), C-band (6.95–7.4 GHz) and X-band (8.6–8.65 GHz).","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130537962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Resource reliability using fault tolerance in cloud computing 云计算中基于容错的资源可靠性
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877391
Talwana Jonathan Charity, Gu Chun Hua
Cloud computing offers variety of services from software instance to resource provisioning. As the user demands increase, there is a necessity to enhance cloud offerings. But still in some cases fault-tolerance is the major challenge for cloud environment. Multiple request to access the same server sometime leads to server over loaded and may increase faults and cause unreliability for the server. Few fault-tolerance techniques like self-healing, job migration, static load balancing and replication are existed but they are not fully reliable and effective for cloud environment. In this paper, we propose pro-active approach for fault-tolerance based on Processing power, Memory and Network parameters to increase resource reliability. Through this approach, we first calculate the reliability of each Virtual Machine (VM) based on success rate of task execution and then schedule the task on highly reliable VM. This approach provides comparatively good results for the VM reliability and system stability.
云计算提供从软件实例到资源配置的各种服务。随着用户需求的增加,有必要增强云服务。但是在某些情况下,容错仍然是云环境的主要挑战。多次请求访问同一台服务器,有时会导致服务器过载,可能会增加故障,导致服务器不可靠。像自修复、作业迁移、静态负载平衡和复制这样的容错技术很少,但它们对于云环境来说并不完全可靠和有效。本文提出了一种基于处理能力、内存和网络参数的主动容错方法,以提高资源可靠性。通过该方法,我们首先根据任务执行的成功率计算每个虚拟机的可靠性,然后在高可靠性的虚拟机上调度任务。该方法在虚拟机可靠性和系统稳定性方面取得了较好的效果。
{"title":"Resource reliability using fault tolerance in cloud computing","authors":"Talwana Jonathan Charity, Gu Chun Hua","doi":"10.1109/NGCT.2016.7877391","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877391","url":null,"abstract":"Cloud computing offers variety of services from software instance to resource provisioning. As the user demands increase, there is a necessity to enhance cloud offerings. But still in some cases fault-tolerance is the major challenge for cloud environment. Multiple request to access the same server sometime leads to server over loaded and may increase faults and cause unreliability for the server. Few fault-tolerance techniques like self-healing, job migration, static load balancing and replication are existed but they are not fully reliable and effective for cloud environment. In this paper, we propose pro-active approach for fault-tolerance based on Processing power, Memory and Network parameters to increase resource reliability. Through this approach, we first calculate the reliability of each Virtual Machine (VM) based on success rate of task execution and then schedule the task on highly reliable VM. This approach provides comparatively good results for the VM reliability and system stability.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124696218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Credential and security issues of cloud service models 云服务模型的凭证和安全问题
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877536
B. Dewangan, A. Agarwal, Venkatadri, Ashutosh Pasricha
Accessing of data from cloud storage is growing as many users are getting in to the internet use. Data are stored in at multiple locations and can access services of different layers. Hackers and malicious intruders are active always and confidential data can be using in other ways. This led to decrease the trust of users from Cloud Service Provider (CSP). Cloud storage security and efficient access of data are main concern of this paper. In current scenario, chunk calculation, distributed hash table and bloom filter has contributed to load balancing management are common techniques of cloud storage in cloud computing systems. To maintain the trust between CSP and user, removal of duplication of data is very essential. This paper reviews the existing model of data de-duplication in cloud computing research.
随着越来越多的用户开始使用互联网,从云存储中访问数据的数量也在增长。数据存储在多个位置,可以访问不同层的服务。黑客和恶意入侵者总是活跃的,机密数据可以以其他方式使用。这导致用户对云服务提供商(CSP)的信任度下降。云存储的安全性和数据的高效访问是本文主要关注的问题。在当前的场景中,块计算、分布式哈希表和布隆过滤器为负载均衡管理做出了贡献,是云计算系统中常用的云存储技术。为了保持CSP和用户之间的信任,删除重复数据是非常必要的。本文综述了云计算研究中现有的重复数据删除模型。
{"title":"Credential and security issues of cloud service models","authors":"B. Dewangan, A. Agarwal, Venkatadri, Ashutosh Pasricha","doi":"10.1109/NGCT.2016.7877536","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877536","url":null,"abstract":"Accessing of data from cloud storage is growing as many users are getting in to the internet use. Data are stored in at multiple locations and can access services of different layers. Hackers and malicious intruders are active always and confidential data can be using in other ways. This led to decrease the trust of users from Cloud Service Provider (CSP). Cloud storage security and efficient access of data are main concern of this paper. In current scenario, chunk calculation, distributed hash table and bloom filter has contributed to load balancing management are common techniques of cloud storage in cloud computing systems. To maintain the trust between CSP and user, removal of duplication of data is very essential. This paper reviews the existing model of data de-duplication in cloud computing research.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121332620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Rapid computation and analysis using a multiple core to enhance SSVEP based system 采用多核快速计算和分析增强基于SSVEP的系统
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877405
Mustafa Aljshamee, R. Hassani, P. Luksch
Brain-computer interface (BCI) technology is communication system is rely a pathway to explore the brain activities to external world. The BCI technique make possible to monitor some physical processes that occur within the brain activity that correspond to certain forms of flickering light through stimuli. Observed a thousand of brain activities are firing instantaneous which allowed the BCI system to explicit one or more signals are controlled on computer command or dominance any other devices. Electroencephalogram (EEG) signal based BCI facing a serious challenge in online applications which are slower reaction and consume more time at computational analysis and extraction. Prosperous advance techniques based on EEG raw-data to extract feature with distributed computing system which are offered a promises result that overcomes these gaps. Therefore, have been developed a BCI prototype that realized by reliable capability which take decision in real time or predicted an inclination in real life application. In previous studies were employed a single CPU system, which is revealed decent performance for smaller dataset; in other hand the open multi-processing (OpenMP) platform provide a high performance computing in more accuracy and supplemental precisely outcome within a large datasets. The main concept of parallelize computing that can be separate the tasks individually which is allowed to parallelized process based on multiple cores. In this, work conclude two approaches which are utilized a high performance computing (HPC) to realize a faster analysis reaction of brain activities and recognition based on evoked SSVEP signal by exploring the Hilbert transform (HT) and quadrature amplitude demodulation (QAD) techniques depend on patterns detection; however have been employed a five frequencies to extract short-term Fourier transform (STFT) feature based on four type filters using windowing function. Both approaches were adapted into HPC technique to distinguish the extraction and execution time.
脑机接口(BCI)技术是通信系统探索大脑活动与外部世界的重要途径。脑机接口技术可以监测大脑活动中发生的一些物理过程,这些活动与通过刺激产生的某些形式的闪烁光相对应。观察到一千个大脑活动是瞬间发射的,这使得BCI系统明确了一个或多个信号是由计算机命令控制的,或支配任何其他设备。基于脑电图(EEG)信号的脑机接口(BCI)在在线应用中面临着反应速度较慢、计算分析和提取时间较长的严峻挑战。基于脑电原始数据和分布式计算系统的特征提取技术的发展为克服这些缺陷提供了一个有希望的结果。因此,本文开发了一种具有可靠的实时决策能力或在实际应用中预测倾角的脑机接口原型。在以前的研究中,我们使用单个CPU系统,这在较小的数据集上显示出良好的性能;另一方面,开放多处理(OpenMP)平台在大数据集内提供了更高精度和补充精确结果的高性能计算。并行计算的主要概念是可以将任务单独分离,从而允许在多核基础上并行化处理。本文总结了两种基于模式检测的希尔伯特变换(HT)和正交振幅解调(QAD)技术,利用高性能计算(HPC)实现基于诱发SSVEP信号的更快的脑活动分析反应和识别的方法;然而,采用了五种频率提取短时傅里叶变换(STFT)特征基于四种类型的滤波器使用窗函数。将这两种方法应用到HPC技术中,以区分提取时间和执行时间。
{"title":"Rapid computation and analysis using a multiple core to enhance SSVEP based system","authors":"Mustafa Aljshamee, R. Hassani, P. Luksch","doi":"10.1109/NGCT.2016.7877405","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877405","url":null,"abstract":"Brain-computer interface (BCI) technology is communication system is rely a pathway to explore the brain activities to external world. The BCI technique make possible to monitor some physical processes that occur within the brain activity that correspond to certain forms of flickering light through stimuli. Observed a thousand of brain activities are firing instantaneous which allowed the BCI system to explicit one or more signals are controlled on computer command or dominance any other devices. Electroencephalogram (EEG) signal based BCI facing a serious challenge in online applications which are slower reaction and consume more time at computational analysis and extraction. Prosperous advance techniques based on EEG raw-data to extract feature with distributed computing system which are offered a promises result that overcomes these gaps. Therefore, have been developed a BCI prototype that realized by reliable capability which take decision in real time or predicted an inclination in real life application. In previous studies were employed a single CPU system, which is revealed decent performance for smaller dataset; in other hand the open multi-processing (OpenMP) platform provide a high performance computing in more accuracy and supplemental precisely outcome within a large datasets. The main concept of parallelize computing that can be separate the tasks individually which is allowed to parallelized process based on multiple cores. In this, work conclude two approaches which are utilized a high performance computing (HPC) to realize a faster analysis reaction of brain activities and recognition based on evoked SSVEP signal by exploring the Hilbert transform (HT) and quadrature amplitude demodulation (QAD) techniques depend on patterns detection; however have been employed a five frequencies to extract short-term Fourier transform (STFT) feature based on four type filters using windowing function. Both approaches were adapted into HPC technique to distinguish the extraction and execution time.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120937456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 2nd International Conference on Next Generation Computing Technologies (NGCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1