首页 > 最新文献

2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)最新文献

英文 中文
Object oriented approach to SQL injection preventer 面向对象方法的SQL注入防护器
D. Giri, S. P. Kumar, L. Prasannakumar, R. Murthy
Many web applications can be exposed to a variety of Web-based attacks. One of these attacks is SQL injection, which can give attackers unrestricted access to the databases and has become increasingly frequent and serious. This paper presents a new highly automated approach for protecting Web applications against SQL injection that has both theoretical and practical advantages over most existing techniques. From a theoretical view, the approach is based on the idea of positive tainting and on the concept of syntax-aware evaluation. From a practical view, our technique is efficient, has minimal deployment requirements, and has a negligible performance overhead in most cases. We have implemented our techniques in the Web Application SQL-injection Preventer (WASP) tool, where a wide range of Web applications were subjected to a large and varied set of attacks and legal accesses. We considered login validation of user in an online banking system. WASP was able to stop all of these attacks and did not generate any false positives.
许多web应用程序都可能受到各种基于web的攻击。其中一种攻击是SQL注入,它可以使攻击者不受限制地访问数据库,并且变得越来越频繁和严重。本文提出了一种新的高度自动化的方法,用于保护Web应用程序免受SQL注入的侵害,与大多数现有技术相比,它在理论和实践上都具有优势。从理论的角度来看,该方法是基于积极污染的思想和语法感知评价的概念。从实用的角度来看,我们的技术是高效的,具有最小的部署需求,并且在大多数情况下具有可忽略的性能开销。我们已经在Web应用程序sql注入防护器(WASP)工具中实现了我们的技术,在该工具中,大量Web应用程序遭受了大量不同的攻击和合法访问。我们考虑了在线银行系统中用户的登录验证。WASP能够阻止所有这些攻击,并且没有产生任何误报。
{"title":"Object oriented approach to SQL injection preventer","authors":"D. Giri, S. P. Kumar, L. Prasannakumar, R. Murthy","doi":"10.1109/ICCCNT.2012.6395979","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395979","url":null,"abstract":"Many web applications can be exposed to a variety of Web-based attacks. One of these attacks is SQL injection, which can give attackers unrestricted access to the databases and has become increasingly frequent and serious. This paper presents a new highly automated approach for protecting Web applications against SQL injection that has both theoretical and practical advantages over most existing techniques. From a theoretical view, the approach is based on the idea of positive tainting and on the concept of syntax-aware evaluation. From a practical view, our technique is efficient, has minimal deployment requirements, and has a negligible performance overhead in most cases. We have implemented our techniques in the Web Application SQL-injection Preventer (WASP) tool, where a wide range of Web applications were subjected to a large and varied set of attacks and legal accesses. We considered login validation of user in an online banking system. WASP was able to stop all of these attacks and did not generate any false positives.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel approach to predict diabetes by Cascading Clustering and Classification 基于级联聚类和分类的糖尿病预测新方法
P. Hemant, T. Pushpavathi
Knowledge of incidence and prevalence of a disease is vital in Community Medicine to control a disease. It is important in Internal Medicine for clinical diagnosis and presumptive treatment on a probability model. Prevalence informs the total case load at a given time. Incidence yields a pointer to extent of attention required and choice of measures. Initially K-means clustering is used to group the disease related data into clusters and assigns classes to clusters. Subsequently multiple different classification algorithms are trained on the result set to build the final classifier model based on K-fold cross validation method. This methodology is evaluated using 768 raw diabetes data obtained from a city hospital. The best accuracy for the given dataset is achieved in bagging algorithm compared to other classifiers. The proposed approach helps doctors in their diagnosis decisions and also in their treatment planning procedures for different categories.
了解疾病的发病率和流行程度对社区医学控制疾病至关重要。概率模型对内科临床诊断和推测治疗具有重要意义。流行率反映了某一特定时间的总病例量。发生率表明需要注意的程度和措施的选择。最初使用K-means聚类将疾病相关数据分组,并为聚类分配类。然后在结果集上训练多个不同的分类算法,建立基于K-fold交叉验证方法的最终分类器模型。使用从一家城市医院获得的768份原始糖尿病数据对该方法进行了评估。与其他分类器相比,套袋算法对给定数据集的准确率最高。提出的方法有助于医生在他们的诊断决策,也在他们的治疗计划程序的不同类别。
{"title":"A novel approach to predict diabetes by Cascading Clustering and Classification","authors":"P. Hemant, T. Pushpavathi","doi":"10.1109/ICCCNT.2012.6396069","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396069","url":null,"abstract":"Knowledge of incidence and prevalence of a disease is vital in Community Medicine to control a disease. It is important in Internal Medicine for clinical diagnosis and presumptive treatment on a probability model. Prevalence informs the total case load at a given time. Incidence yields a pointer to extent of attention required and choice of measures. Initially K-means clustering is used to group the disease related data into clusters and assigns classes to clusters. Subsequently multiple different classification algorithms are trained on the result set to build the final classifier model based on K-fold cross validation method. This methodology is evaluated using 768 raw diabetes data obtained from a city hospital. The best accuracy for the given dataset is achieved in bagging algorithm compared to other classifiers. The proposed approach helps doctors in their diagnosis decisions and also in their treatment planning procedures for different categories.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127764577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Performance analysis of OFDMA in LTE LTE中OFDMA的性能分析
S. Prasad, C. Shukla, R. F. Chisab
The Long Term Evolution (LTE) takes the Orthogonal Frequency Division Multiple Access (OFDMA) as the multiple access technique for downlink to transmit data from base station to the Mobile Users (MUs) because of its ability to improve the spectrum efficiency, it has flexible user resource allocation, it can overcome the problems of Inter Symbol Interchange (ISI) and Inter Carrier Interchange (ICI). This paper introduces the properties of orthogonal frequency division multiplexing, discusses the strength, weakness of OFDMA, and highlights the factor that leverages the performance of OFDMA in LTE. The graphical result shows the relation between SNR, BER, Pe with the type of modulation used in LTE.
长期演进技术(LTE)采用正交频分多址(OFDMA)作为下行链路向移动用户传输数据的多址接入技术,具有提高频谱效率、灵活分配用户资源、克服码间交换(ISI)和载波间交换(ICI)等缺点的优点。介绍了正交频分复用技术的特点,讨论了OFDMA技术的优缺点,重点介绍了在LTE中影响OFDMA技术性能的因素。图形结果显示了信噪比、误码率、误码率与LTE中使用的调制类型之间的关系。
{"title":"Performance analysis of OFDMA in LTE","authors":"S. Prasad, C. Shukla, R. F. Chisab","doi":"10.1109/ICCCNT.2012.6395933","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395933","url":null,"abstract":"The Long Term Evolution (LTE) takes the Orthogonal Frequency Division Multiple Access (OFDMA) as the multiple access technique for downlink to transmit data from base station to the Mobile Users (MUs) because of its ability to improve the spectrum efficiency, it has flexible user resource allocation, it can overcome the problems of Inter Symbol Interchange (ISI) and Inter Carrier Interchange (ICI). This paper introduces the properties of orthogonal frequency division multiplexing, discusses the strength, weakness of OFDMA, and highlights the factor that leverages the performance of OFDMA in LTE. The graphical result shows the relation between SNR, BER, Pe with the type of modulation used in LTE.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128621785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Novel algorithm for segmentation and automatic identification of pests on plants using image processing 基于图像处理的植物害虫分割与自动识别新算法
S. Huddar, S. Gowri, K. Keerthana, S. Vasanthi, S. R. Rupanagudi
Enormous agricultural yield is lost every year, due to rapid infestation by pests and insects. A lot of research is being carried out worldwide to identify scientific methodologies for early detection/identification of these bio-aggressors. In the recent past, several approaches based on automation and image processing have come to light to address this issue. Most of the algorithms concentrate on pest identification and detection, limited to a greenhouse environment. Also, they involve several complex calculations to achieve the same. In this paper, we propose a novel and unique algorithm to segregate and detect pests using image processing. The proposed methodology involves reduced computational complexity and aims at pest detection not only in a greenhouse environment but also in a farm environment as well. The whitefly, a bio-aggressor which poses a threat to a multitude of crops, was chosen as the pest of interest in this paper. The algorithm was tested for several whiteflies affecting different leaves and an accuracy of 96% of whitefly detection was achieved. The algorithm was developed and implemented using MATLAB programming language on MATLAB 7.1 build 2011a.
由于害虫和昆虫的迅速侵袭,每年都损失巨大的农业产量。全世界正在进行大量研究,以确定早期发现/识别这些生物侵略者的科学方法。在最近的过去,基于自动化和图像处理的几种方法已经出现来解决这个问题。大多数算法集中于害虫识别和检测,仅限于温室环境。而且,它们需要进行一些复杂的计算才能达到相同的效果。本文提出了一种基于图像处理的害虫分离与检测算法。所提出的方法涉及降低计算复杂性,旨在不仅在温室环境中而且在农场环境中进行害虫检测。白蝇是一种危害多种作物的生物害虫,本文选取白蝇作为研究对象。对影响不同叶片的几种白蝇进行了测试,白蝇检测准确率达到96%。该算法在MATLAB 7.1 build 2011a上使用MATLAB编程语言开发和实现。
{"title":"Novel algorithm for segmentation and automatic identification of pests on plants using image processing","authors":"S. Huddar, S. Gowri, K. Keerthana, S. Vasanthi, S. R. Rupanagudi","doi":"10.1109/ICCCNT.2012.6396012","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396012","url":null,"abstract":"Enormous agricultural yield is lost every year, due to rapid infestation by pests and insects. A lot of research is being carried out worldwide to identify scientific methodologies for early detection/identification of these bio-aggressors. In the recent past, several approaches based on automation and image processing have come to light to address this issue. Most of the algorithms concentrate on pest identification and detection, limited to a greenhouse environment. Also, they involve several complex calculations to achieve the same. In this paper, we propose a novel and unique algorithm to segregate and detect pests using image processing. The proposed methodology involves reduced computational complexity and aims at pest detection not only in a greenhouse environment but also in a farm environment as well. The whitefly, a bio-aggressor which poses a threat to a multitude of crops, was chosen as the pest of interest in this paper. The algorithm was tested for several whiteflies affecting different leaves and an accuracy of 96% of whitefly detection was achieved. The algorithm was developed and implemented using MATLAB programming language on MATLAB 7.1 build 2011a.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128737300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
SAPM: ANFIS based prediction of student academic performance metric SAPM:基于ANFIS的学生学习成绩指标预测
N. M. Zuviria, S. L. Mary, V. Kuppammal
A methodology for evaluating the academic performance metric of students is proposed in this paper based on their performance in periodic assessment tests, attendance and complexity of the question set. These are the major features determining the students learning efficiency evaluation. The impact of these metrics plays a major role in predicting the final grade of a student. The application of adaptive neuro fuzzy inference system helps to model the frame work for evaluating Student Academic Performance Metric(SAPM). The outcome of this methodology can be used to classify the students based on their academic skill and helpful in predicting the probability of their success in the final examinations.
本文提出了一种基于学生在定期评估测试中的表现、出勤率和问题集复杂性来评估学生学业成绩指标的方法。这些是决定学生学习效率评价的主要特征。这些指标的影响在预测学生的最终成绩方面起着重要作用。自适应神经模糊推理系统的应用有助于建立学生学业成绩评价框架的模型。这种方法的结果可以用来根据他们的学术技能对学生进行分类,并有助于预测他们在期末考试中成功的概率。
{"title":"SAPM: ANFIS based prediction of student academic performance metric","authors":"N. M. Zuviria, S. L. Mary, V. Kuppammal","doi":"10.1109/ICCCNT.2012.6396065","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396065","url":null,"abstract":"A methodology for evaluating the academic performance metric of students is proposed in this paper based on their performance in periodic assessment tests, attendance and complexity of the question set. These are the major features determining the students learning efficiency evaluation. The impact of these metrics plays a major role in predicting the final grade of a student. The application of adaptive neuro fuzzy inference system helps to model the frame work for evaluating Student Academic Performance Metric(SAPM). The outcome of this methodology can be used to classify the students based on their academic skill and helpful in predicting the probability of their success in the final examinations.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114293290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Smart bank simulation using Context awareness 使用上下文感知的智能银行模拟
J. Madhusudanan, V. Prasanna Venkatesan, P. Karthikeyan, S. Shilpa Devi
Ubiquitous computing provides access to information and computing resources for the users in the place where they are, anywhere and anytime. In Ubiquitous Computing, every applications uses Context awareness as the most important properties. In particular, for smart bank, context awareness attempts to bring the best services to the bank customers. Since bank is the place where most of the people have to access the service, Smart Bank aims to provide the best services it can to the bank customer. In this paper, we propose ISBS, an Interactive Smart Bank Simulator system which aims at scheduling and simulating the behavior of an intelligent banking activity. This system aims at understanding the needs of the customers and provides the best service to the customers using an interactive simulation system. In reality it is hard to implement those systems in real time bank systems. Hence a simulation bank environment is used with virtual sensors instead of physical devices. In this research, the smart bank is considered as an environment made up of independent and distributed devices interacting to support customer services. Therefore, by using ISBS, the developer can realize the relationship among virtual device, surrounded environment, its use and bank appliances.
普适计算为用户提供了随时随地获取信息和计算资源的途径。在普适计算中,每个应用程序都将上下文感知作为最重要的属性。特别是对于智能银行来说,上下文感知试图为银行客户带来最好的服务。由于银行是大多数人获得服务的地方,智能银行的目标是为银行客户提供最好的服务。在本文中,我们提出了ISBS,一个交互式智能银行模拟器系统,旨在调度和模拟智能银行活动的行为。该系统旨在了解客户的需求,并通过交互式仿真系统为客户提供最好的服务。在现实中,很难在实时银行系统中实现这些系统。因此,模拟银行环境与虚拟传感器一起使用,而不是物理设备。在本研究中,智能银行被认为是一个由相互作用的独立和分布式设备组成的环境,以支持客户服务。因此,通过使用ISBS,开发人员可以实现虚拟设备、周围环境、其使用和银行设备之间的关系。
{"title":"Smart bank simulation using Context awareness","authors":"J. Madhusudanan, V. Prasanna Venkatesan, P. Karthikeyan, S. Shilpa Devi","doi":"10.1109/ICCCNT.2012.6395892","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395892","url":null,"abstract":"Ubiquitous computing provides access to information and computing resources for the users in the place where they are, anywhere and anytime. In Ubiquitous Computing, every applications uses Context awareness as the most important properties. In particular, for smart bank, context awareness attempts to bring the best services to the bank customers. Since bank is the place where most of the people have to access the service, Smart Bank aims to provide the best services it can to the bank customer. In this paper, we propose ISBS, an Interactive Smart Bank Simulator system which aims at scheduling and simulating the behavior of an intelligent banking activity. This system aims at understanding the needs of the customers and provides the best service to the customers using an interactive simulation system. In reality it is hard to implement those systems in real time bank systems. Hence a simulation bank environment is used with virtual sensors instead of physical devices. In this research, the smart bank is considered as an environment made up of independent and distributed devices interacting to support customer services. Therefore, by using ISBS, the developer can realize the relationship among virtual device, surrounded environment, its use and bank appliances.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127436726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on performance, reliability and future proposal of Cognitive Radio under wireless computing 无线计算下认知无线电的性能、可靠性及未来建议综述
A. Umamaheswari, V. Subashini, P. Subhapriya
In daily life internet plays a vital role in every aspects of web usage by the end users. Its essential purpose is information retrieval, packet transmission, communication between networks via wired and wireless mode. Subsequently wireless data networks and transmission are renowned by a fixed spectrum obligation policy and therefore that spectrum utilization becomes very significant one, in which new communication techniques are keep on increasing and the spectrum bandwidth remains limited because of unlicensed users. Cognitive radio is an innovatory technology to make use of the limited spectrum more successful. Cognitive Radio (CR) aspires to look up for the spectrum utilization by taking improvement of licensed user or primary user, which are so-called unused spectrum. Cognitive Radio has extensive applications together with dynamic spectrum access allocation and interference management, which will largely blow the NeXt Generation Network (xG) for wireless devices and networks. This new networking model is referred to as NeXt Generation (xG) Network as well as known as Dynamic Spectrum Access (DSA) and Cognitive Radio Networks. Eventually the performance and reliability of CR can be increased through the cross-layer design approach in the (xG) networks. In this paper, we carry out a survey on CR networks from various portions such as waveform, spectrum management and sensing, similarities between intelligent antenna and CR, performance and reliability evaluations etc.
在日常生活中,互联网在最终用户使用网络的各个方面起着至关重要的作用。它的本质目的是通过有线和无线方式进行信息检索、分组传输和网络之间的通信。随着无线数据网络和传输以固定的频谱义务政策而闻名,因此频谱利用变得非常重要,其中新的通信技术不断增加,频谱带宽因无许可用户而受到限制。认知无线电是一种创新技术,可以更有效地利用有限的频谱。认知无线电(Cognitive Radio, CR)希望通过改进授权用户或主用户,即所谓的未使用频谱来查找频谱利用率。认知无线电与动态频谱接入分配和干扰管理一起具有广泛的应用,将在很大程度上推动无线设备和网络的下一代网络(xG)。这种新的网络模式被称为下一代(xG)网络,也被称为动态频谱接入(DSA)和认知无线电网络。最终,在(xG)网络中,通过跨层设计方法可以提高CR的性能和可靠性。本文从波形、频谱管理和感知、智能天线与CR的相似性、性能和可靠性评估等方面对CR网络进行了研究。
{"title":"Survey on performance, reliability and future proposal of Cognitive Radio under wireless computing","authors":"A. Umamaheswari, V. Subashini, P. Subhapriya","doi":"10.1109/ICCCNT.2012.6395960","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395960","url":null,"abstract":"In daily life internet plays a vital role in every aspects of web usage by the end users. Its essential purpose is information retrieval, packet transmission, communication between networks via wired and wireless mode. Subsequently wireless data networks and transmission are renowned by a fixed spectrum obligation policy and therefore that spectrum utilization becomes very significant one, in which new communication techniques are keep on increasing and the spectrum bandwidth remains limited because of unlicensed users. Cognitive radio is an innovatory technology to make use of the limited spectrum more successful. Cognitive Radio (CR) aspires to look up for the spectrum utilization by taking improvement of licensed user or primary user, which are so-called unused spectrum. Cognitive Radio has extensive applications together with dynamic spectrum access allocation and interference management, which will largely blow the NeXt Generation Network (xG) for wireless devices and networks. This new networking model is referred to as NeXt Generation (xG) Network as well as known as Dynamic Spectrum Access (DSA) and Cognitive Radio Networks. Eventually the performance and reliability of CR can be increased through the cross-layer design approach in the (xG) networks. In this paper, we carry out a survey on CR networks from various portions such as waveform, spectrum management and sensing, similarities between intelligent antenna and CR, performance and reliability evaluations etc.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125839102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A complete mobile security architecture using client and server driven protocols (WMN) 使用客户端和服务器驱动协议(WMN)的完整移动安全架构
N. Suresh Kumar, S. Selvakani
Wireless mesh networks are fast becoming the preferred way to deliver voice, video and data in outdoor environments. A wireless mesh can deliver the same network capacity, reliability and security that were once reserved for wired networks - but with the flexibility of wireless. With today's state-of-the-art solutions, municipalities, public safety agencies, port authorities, and industrial organizations can rely on mesh networks to provide essential connectivity to their workers and constituents. However, many technical issues still exist in this field. In order to provide a better understanding of the research challenges of WMNs, this article presents a detailed investigation of current state-of-the-art protocols and algorithms for WMNs. In this paper we propose MobiSEC, a complete security architecture that provides both access controls for mesh users and routers as well as a key distribution schemes that supports layer-2 encryption to ensure security and data confidentiality of all communications that occur in the WMN.
无线网状网络正迅速成为在户外环境中传输语音、视频和数据的首选方式。无线网络可以提供与有线网络相同的网络容量、可靠性和安全性,但同时又具有无线网络的灵活性。借助当今最先进的解决方案,市政当局、公共安全机构、港务局和工业组织可以依靠网状网络为其工人和选民提供必要的连接。然而,该领域仍存在许多技术问题。为了更好地理解wmn的研究挑战,本文对当前最先进的wmn协议和算法进行了详细的研究。在本文中,我们提出了MobiSEC,这是一个完整的安全架构,它为网状用户和路由器提供访问控制,以及支持第二层加密的密钥分发方案,以确保在WMN中发生的所有通信的安全性和数据保密性。
{"title":"A complete mobile security architecture using client and server driven protocols (WMN)","authors":"N. Suresh Kumar, S. Selvakani","doi":"10.1109/ICCCNT.2012.6395905","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395905","url":null,"abstract":"Wireless mesh networks are fast becoming the preferred way to deliver voice, video and data in outdoor environments. A wireless mesh can deliver the same network capacity, reliability and security that were once reserved for wired networks - but with the flexibility of wireless. With today's state-of-the-art solutions, municipalities, public safety agencies, port authorities, and industrial organizations can rely on mesh networks to provide essential connectivity to their workers and constituents. However, many technical issues still exist in this field. In order to provide a better understanding of the research challenges of WMNs, this article presents a detailed investigation of current state-of-the-art protocols and algorithms for WMNs. In this paper we propose MobiSEC, a complete security architecture that provides both access controls for mesh users and routers as well as a key distribution schemes that supports layer-2 encryption to ensure security and data confidentiality of all communications that occur in the WMN.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124910380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach for evaluation of changes in web services business logic 一种评估web服务业务逻辑更改的新方法
M. Thirumaran, P. Dhavachelvan, G. Naga Venkata Kiran
In today's ever-changing Business world, increasing market demand and meeting it through service technology has made change management an inevitable one. Although there are many change management issues and solutions, there is no proper support for efficient change evaluation and monitoring. In this paper, we propose a dependency analysis approach for evaluating the changes specified by the analyst in an effective manner. This measure of change evaluation ensures that the business analyst has a direct control over the changes he makes and provides a sophistic environment which notifies the analyst about the outcome of change progress in a meaningful way. We propose a set of change factors based on which the dependency relation existing between the business rules, functions and parameters are analyzed. These change factors evaluated as part of the change evaluation leads the change management process in efficient and controlled manner. We develop a prototype system of the proposed model to demonstrate its effectiveness. We also conduct an experimental study to assess the performance of the change management along with the change measure as an output.
在当今瞬息万变的商业世界中,不断增长的市场需求和通过服务技术来满足市场需求使得变革管理成为必然。尽管存在许多变更管理问题和解决方案,但是对于有效的变更评估和监视没有适当的支持。在本文中,我们提出了一种依赖分析方法,以有效的方式评估分析师指定的更改。变更评估的度量确保业务分析人员能够直接控制他所做的变更,并提供一个复杂的环境,以一种有意义的方式通知分析人员变更进展的结果。在此基础上,分析了业务规则、功能和参数之间存在的依赖关系。作为变更评估的一部分评估的这些变更因素以有效和可控的方式引导变更管理过程。我们开发了一个原型系统来证明该模型的有效性。我们还进行了一项实验研究,以评估变更管理的绩效以及作为输出的变更度量。
{"title":"A novel approach for evaluation of changes in web services business logic","authors":"M. Thirumaran, P. Dhavachelvan, G. Naga Venkata Kiran","doi":"10.1109/ICCCNT.2012.6395877","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395877","url":null,"abstract":"In today's ever-changing Business world, increasing market demand and meeting it through service technology has made change management an inevitable one. Although there are many change management issues and solutions, there is no proper support for efficient change evaluation and monitoring. In this paper, we propose a dependency analysis approach for evaluating the changes specified by the analyst in an effective manner. This measure of change evaluation ensures that the business analyst has a direct control over the changes he makes and provides a sophistic environment which notifies the analyst about the outcome of change progress in a meaningful way. We propose a set of change factors based on which the dependency relation existing between the business rules, functions and parameters are analyzed. These change factors evaluated as part of the change evaluation leads the change management process in efficient and controlled manner. We develop a prototype system of the proposed model to demonstrate its effectiveness. We also conduct an experimental study to assess the performance of the change management along with the change measure as an output.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced LSB technique for audio steganography 用于音频隐写的增强LSB技术
H. Kumar, Anuradha
The idea of this paper is to invent a new strategy in Steganography to get the minimum effect in audio which is used to hide data into it. “Progress always involves risk” Fredrick Wilcox observed that technological progress of computer science and the Internet altered the way we lived, and will continue to cast our life[1] . In this paper we have presented a Steganography method of embedding text data in an audio file. The basic approach behind this paper is to provide a good, well-organized method for hiding the data and sent to the destination in safer manner. In the proposed technique first the audio file is sampled and then appropriate bit is modified. In selected sample one bit is modified at least significant bit .The remaining bits may be used but it may be cause noise. We have attempted to provide an overview, theoretical framework about audio Steganography techniques and a novel approach to hide data in an audio using least significant bit (LSB).
本文的思想是发明一种新的隐写策略,以使音频中隐藏数据的效果最小。“进步总是伴随着风险”Fredrick Wilcox观察到计算机科学和互联网的技术进步改变了我们的生活方式,并将继续影响我们的生活[1]。本文提出了一种在音频文件中嵌入文本数据的隐写方法。本文背后的基本方法是提供一个良好的,组织良好的方法来隐藏数据,并以更安全的方式发送到目的地。在该技术中,首先对音频文件进行采样,然后对适当的位进行修改。在所选采样中,至少有一位被修改为有效位,其余的位可以使用,但可能会产生噪声。我们试图提供关于音频隐写技术的概述,理论框架和一种使用最低有效位(LSB)隐藏音频数据的新方法。
{"title":"Enhanced LSB technique for audio steganography","authors":"H. Kumar, Anuradha","doi":"10.1109/ICCCNT.2012.6395978","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395978","url":null,"abstract":"The idea of this paper is to invent a new strategy in Steganography to get the minimum effect in audio which is used to hide data into it. “Progress always involves risk” Fredrick Wilcox observed that technological progress of computer science and the Internet altered the way we lived, and will continue to cast our life[1] . In this paper we have presented a Steganography method of embedding text data in an audio file. The basic approach behind this paper is to provide a good, well-organized method for hiding the data and sent to the destination in safer manner. In the proposed technique first the audio file is sampled and then appropriate bit is modified. In selected sample one bit is modified at least significant bit .The remaining bits may be used but it may be cause noise. We have attempted to provide an overview, theoretical framework about audio Steganography techniques and a novel approach to hide data in an audio using least significant bit (LSB).","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125531104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
期刊
2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1