首页 > 最新文献

Women In Research最新文献

英文 中文
ECG Steganography to secure patient data in an E-Healthcare System 心电图隐写术在电子医疗保健系统中保护患者数据
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909078
Dolly Meghani, S. Geetha
E-healthcare systems are rapidly gaining importance with the evolution of remote monitoring devices for patient diagnosis. While transmitting patient classified information, it is essential to ensure that patient confidentiality is maintained. ECG signals are used as a medium to mask the patient's confidential data. ECG steganography is achieved by using Discrete Wavelet Transform along with Singular Value Decomposition. To assure that minimal distortion is reported after embedding the data, two distortion metrics namely, Percentage Residual Difference and Bit Error Rate are used. The proposal is implemented on MIT-BIH database and it has been observed that the proposed approach offers minimum distortion hence retaining the authenticity of the original signal.
随着用于患者诊断的远程监控设备的发展,电子医疗保健系统正迅速变得越来越重要。在传递患者分类信息时,必须确保保持患者的机密性。心电信号被用作掩盖病人机密数据的媒介。利用离散小波变换和奇异值分解实现心电隐写。为了确保嵌入数据后报告的失真最小,使用了两个失真指标,即剩余差百分比和误码率。该建议在MIT-BIH数据库上实现,并且已经观察到所提出的方法提供最小的失真,从而保留了原始信号的真实性。
{"title":"ECG Steganography to secure patient data in an E-Healthcare System","authors":"Dolly Meghani, S. Geetha","doi":"10.1145/2909067.2909078","DOIUrl":"https://doi.org/10.1145/2909067.2909078","url":null,"abstract":"E-healthcare systems are rapidly gaining importance with the evolution of remote monitoring devices for patient diagnosis. While transmitting patient classified information, it is essential to ensure that patient confidentiality is maintained. ECG signals are used as a medium to mask the patient's confidential data. ECG steganography is achieved by using Discrete Wavelet Transform along with Singular Value Decomposition. To assure that minimal distortion is reported after embedding the data, two distortion metrics namely, Percentage Residual Difference and Bit Error Rate are used. The proposal is implemented on MIT-BIH database and it has been observed that the proposed approach offers minimum distortion hence retaining the authenticity of the original signal.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126943522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analytical Trends and Practices of Web Intelligence 网络智能的分析趋势与实践
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909090
B. Malathi, K. C. Sekharaiah, H. Jayasree
The web has undergone major transformation during last few years and revolutionized the world we live in. The amount of information and user-generated data on the web is increasing day by day. The major challenge of web research and development is in the effective usage of available data and information on web. Intelligence can be achieved by training the web to learn its content, structure (semantics of web) and by applying intelligent techniques to effectively access the web resources. In this context, Web Intelligence has been recognized as one of the most important as well as the fastest growing research field. This paper provides an overview on the trends and practices of Web Intelligence (WI) that play vital role in meeting the challenges of developing the intelligent web. We also introduce an analysis report on representative references in which the techniques and analytical methods are briefly described.
在过去的几年里,网络经历了重大的变革,彻底改变了我们生活的世界。网络上的信息量和用户生成的数据日益增加。网络研究和发展的主要挑战是如何有效地利用网络上的可用数据和信息。智能可以通过训练网络学习其内容、结构(网络语义)和应用智能技术有效地访问网络资源来实现。在这种背景下,网络智能被认为是最重要的研究领域之一,也是发展最快的研究领域之一。本文概述了网络智能(WI)的发展趋势和实践,它们在应对智能网络发展的挑战中起着至关重要的作用。并介绍了代表性文献的分析报告,简要介绍了分析技术和分析方法。
{"title":"Analytical Trends and Practices of Web Intelligence","authors":"B. Malathi, K. C. Sekharaiah, H. Jayasree","doi":"10.1145/2909067.2909090","DOIUrl":"https://doi.org/10.1145/2909067.2909090","url":null,"abstract":"The web has undergone major transformation during last few years and revolutionized the world we live in. The amount of information and user-generated data on the web is increasing day by day. The major challenge of web research and development is in the effective usage of available data and information on web. Intelligence can be achieved by training the web to learn its content, structure (semantics of web) and by applying intelligent techniques to effectively access the web resources. In this context, Web Intelligence has been recognized as one of the most important as well as the fastest growing research field. This paper provides an overview on the trends and practices of Web Intelligence (WI) that play vital role in meeting the challenges of developing the intelligent web. We also introduce an analysis report on representative references in which the techniques and analytical methods are briefly described.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116065364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving Accuracy for Intrusion Detection through Layered Approach Using Support Vector Machine with Feature Reduction 基于特征约简的支持向量机分层方法提高入侵检测精度
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909100
A. Nema, B. Tiwari, V. Tiwari
Digital information security is the field of information technology which deal with all about identification and protection of information. Whereas, identification of the threat of any Intrusion Detection System (IDS) in the most challenging phase. Threat detection become most promising because rest of the IDS system phase depends on the solely on "what is identified". In this view, a multilayered framework has been discussed which handles the underlying features for the identification of various attack (DoS, R2L, U2R, Probe). The experiments validates the use SVM with genetic approach is efficient.
数字信息安全是涉及信息识别和保护的信息技术领域。然而,识别入侵检测系统(IDS)的威胁是最具挑战性的阶段。威胁检测成为最有希望的,因为IDS系统阶段的其余部分完全取决于“识别什么”。在这个观点中,我们讨论了一个多层框架,它处理识别各种攻击(DoS, R2L, U2R, Probe)的底层特征。实验验证了支持向量机与遗传方法的结合是有效的。
{"title":"Improving Accuracy for Intrusion Detection through Layered Approach Using Support Vector Machine with Feature Reduction","authors":"A. Nema, B. Tiwari, V. Tiwari","doi":"10.1145/2909067.2909100","DOIUrl":"https://doi.org/10.1145/2909067.2909100","url":null,"abstract":"Digital information security is the field of information technology which deal with all about identification and protection of information. Whereas, identification of the threat of any Intrusion Detection System (IDS) in the most challenging phase. Threat detection become most promising because rest of the IDS system phase depends on the solely on \"what is identified\". In this view, a multilayered framework has been discussed which handles the underlying features for the identification of various attack (DoS, R2L, U2R, Probe). The experiments validates the use SVM with genetic approach is efficient.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133778257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Techniques and Approaches for Disease Outbreak Prediction: A Survey 疾病爆发预测的技术和方法:综述
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909085
A. Bharambe, D. Kalbande
As on today, due to rise in pollution and dense population in India, there has been an increase in health related issues with respect to spreading disease. The recent outbreak of diseases like HINI, dengue, malaria etc. have made people to focus on ways to minimize the effect of infectious disease. This can be achieved if early prediction and detection of such diseases are possible. Research is being carried out in building various prediction models to forecast the outbreak of such epidemics. While the traditional techniques were useful in giving the results, inputs from social media enabled us to detect the presence, prevalence and spread of these disease in a much early manner. Social networking Medias and their blogs have also been used for prediction. To handle such variety and size of data, it is required to design a system using big data approach for forecasting. Big Data is one of the need of the hour area of research that is become increasingly popular in prediction. This paper focuses on the survey carried out on available techniques and presents a unified approach to prepare a conceptual forecasting model.
就像今天一样,由于印度污染加剧和人口密集,与疾病传播有关的健康问题有所增加。最近爆发的HINI、登革热、疟疾等疾病使人们关注如何将传染病的影响降到最低。如果能够及早预测和发现这类疾病,就可以实现这一目标。目前正在研究建立各种预测模型,以预测这类流行病的爆发。虽然传统技术在提供结果方面很有用,但社交媒体的投入使我们能够更早地发现这些疾病的存在、流行和传播。社交网络媒体及其博客也被用于预测。为了处理如此多样和规模的数据,需要设计一个使用大数据方法进行预测的系统。大数据是当前研究领域的需求之一,在预测领域越来越受欢迎。本文重点介绍了对现有技术进行的调查,并提出了一种统一的方法来编制概念预测模型。
{"title":"Techniques and Approaches for Disease Outbreak Prediction: A Survey","authors":"A. Bharambe, D. Kalbande","doi":"10.1145/2909067.2909085","DOIUrl":"https://doi.org/10.1145/2909067.2909085","url":null,"abstract":"As on today, due to rise in pollution and dense population in India, there has been an increase in health related issues with respect to spreading disease. The recent outbreak of diseases like HINI, dengue, malaria etc. have made people to focus on ways to minimize the effect of infectious disease. This can be achieved if early prediction and detection of such diseases are possible. Research is being carried out in building various prediction models to forecast the outbreak of such epidemics. While the traditional techniques were useful in giving the results, inputs from social media enabled us to detect the presence, prevalence and spread of these disease in a much early manner. Social networking Medias and their blogs have also been used for prediction. To handle such variety and size of data, it is required to design a system using big data approach for forecasting. Big Data is one of the need of the hour area of research that is become increasingly popular in prediction. This paper focuses on the survey carried out on available techniques and presents a unified approach to prepare a conceptual forecasting model.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125202211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Gesture Recognition for VW & VO: Virtual Writing and Virtual Operation VW & VO的手势识别:虚拟书写和虚拟操作
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909088
A. Dubey, Khushbu Gulabani
Modern era of research is motivated to optimize the hardware parts involved during the process of interaction. The idea is to deploy virtual environment for performing the daily routine tasks and social aspects of people. Virtualization provides the interface for performing the task and there is no need of hardware device space. Due to limited hardware space and human err, researchers emphasize use of virtual environment in computer human interaction. Mostly users prefer hand for giving the input task to the system and they are bounded to directly interact with system. Virtual writing and virtual operation is the ongoing research problem, where industries and laboratory are investing maximum effort. The developed gestured system has a lot of scope for improvements with research gazing at accuracy of recognition. In this paper author give the valuable contribution into gestured recognition. Two threads of gestured characteristics are considered for social application to improve the collaborative interaction of human to system.
现代研究的动机是优化交互过程中涉及的硬件部分。这个想法是部署虚拟环境来执行人们的日常任务和社交方面。虚拟化提供了执行任务的接口,不需要硬件设备空间。由于硬件空间的限制和人为的错误,研究人员强调虚拟环境在人机交互中的应用。大多数用户更喜欢用手把输入任务交给系统,他们被限制在直接与系统交互。虚拟书写和虚拟操作是一个正在进行的研究问题,工业界和实验室都在这方面投入了最大的努力。目前开发的手势识别系统在识别精度方面还有很大的改进空间。本文在手势识别方面做出了有价值的贡献。为提高人与系统的协作交互,考虑了两种手势特征的社会应用。
{"title":"Gesture Recognition for VW & VO: Virtual Writing and Virtual Operation","authors":"A. Dubey, Khushbu Gulabani","doi":"10.1145/2909067.2909088","DOIUrl":"https://doi.org/10.1145/2909067.2909088","url":null,"abstract":"Modern era of research is motivated to optimize the hardware parts involved during the process of interaction. The idea is to deploy virtual environment for performing the daily routine tasks and social aspects of people. Virtualization provides the interface for performing the task and there is no need of hardware device space. Due to limited hardware space and human err, researchers emphasize use of virtual environment in computer human interaction. Mostly users prefer hand for giving the input task to the system and they are bounded to directly interact with system. Virtual writing and virtual operation is the ongoing research problem, where industries and laboratory are investing maximum effort. The developed gestured system has a lot of scope for improvements with research gazing at accuracy of recognition. In this paper author give the valuable contribution into gestured recognition. Two threads of gestured characteristics are considered for social application to improve the collaborative interaction of human to system.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126640052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Machine Learning Algorithms in R software for Diagnosis of ESD Diseases R软件中用于ESD疾病诊断的机器学习算法综述
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909101
S. Kolkur, D. Kalbande
ESD is an acronym for Erythemato-Squamous Diseases, which is a set of six skin diseases [6]. The Erythemato-Squamous Diseases (ESDs) require huge computational efforts to predict the diseases because all the six diseases studied in this group have more than 90% common features. The main focus of this paper is to study the use of machine learning algorithms in R software for prediction of ESD Diseases. In this paper, different algorithms are studied and implemented in R. Accuracy of these algorithms is compared.
ESD是红斑鳞状疾病(Erythemato-Squamous Diseases)的首字母缩写,是六种皮肤病的集合[6]。红斑鳞状疾病(ESDs)需要大量的计算工作来预测疾病,因为该组研究的所有六种疾病都具有90%以上的共同特征。本文的主要重点是研究在R软件中使用机器学习算法来预测ESD疾病。本文研究并在r中实现了不同的算法,比较了这些算法的精度。
{"title":"Review of Machine Learning Algorithms in R software for Diagnosis of ESD Diseases","authors":"S. Kolkur, D. Kalbande","doi":"10.1145/2909067.2909101","DOIUrl":"https://doi.org/10.1145/2909067.2909101","url":null,"abstract":"ESD is an acronym for Erythemato-Squamous Diseases, which is a set of six skin diseases [6]. The Erythemato-Squamous Diseases (ESDs) require huge computational efforts to predict the diseases because all the six diseases studied in this group have more than 90% common features.\u0000 The main focus of this paper is to study the use of machine learning algorithms in R software for prediction of ESD Diseases. In this paper, different algorithms are studied and implemented in R. Accuracy of these algorithms is compared.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Approach Used In Wireless Network to Detect Denial of Service Attack 一种在无线网络中检测拒绝服务攻击的方法
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909069
Rashi Dhagat, P. Jagtap
The shared behavior of wireless network makes it more vulnerable to Denial of Service attack. A Denial of Service (DOS) attack is a planned attempt to make resources unable to the legitimate client. These attacks can easily launch by perpetrator emitting no. of signals that do not follow MAC protocol. A DOS attacks are the significant cause of data corruption and malfunctioning of a wireless network. In this paper, we proposed a new approach to detect denial of service attack in wireless, which not only detect attack, but also differentiate it from the natural condition occur in a network. The proposed method uses different network factor and statistical method to calculate threshold value.
无线网络的共享行为使其更容易受到拒绝服务攻击。拒绝服务(DOS)攻击是一种有计划的尝试,使资源无法访问合法客户端。这些攻击可以很容易地由犯罪者发射no。不遵循MAC协议的信号。DOS攻击是造成无线网络数据损坏和故障的主要原因。本文提出了一种新的无线拒绝服务攻击检测方法,该方法不仅检测攻击,而且将其与网络中发生的自然情况区分开来。该方法采用不同的网络因子和统计方法计算阈值。
{"title":"An Approach Used In Wireless Network to Detect Denial of Service Attack","authors":"Rashi Dhagat, P. Jagtap","doi":"10.1145/2909067.2909069","DOIUrl":"https://doi.org/10.1145/2909067.2909069","url":null,"abstract":"The shared behavior of wireless network makes it more vulnerable to Denial of Service attack. A Denial of Service (DOS) attack is a planned attempt to make resources unable to the legitimate client. These attacks can easily launch by perpetrator emitting no. of signals that do not follow MAC protocol. A DOS attacks are the significant cause of data corruption and malfunctioning of a wireless network. In this paper, we proposed a new approach to detect denial of service attack in wireless, which not only detect attack, but also differentiate it from the natural condition occur in a network. The proposed method uses different network factor and statistical method to calculate threshold value.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124421662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Narrow Band LNA Design Using OGMOSFET for Noise and Gain Analysis 用OGMOSFET设计窄带LNA进行噪声和增益分析
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909084
G. Phade, Sandhya Save, Vivek Ratnapakhari
LNA is the first building block of any receiver circuit. In this paper, a narrow band LNA operating at 2.4 GHz is designed in ADS CAD tool. Device used for LNA design is Optically Gated MOSFET (OGMOSFET). For DC bias, gate voltage is 1.5 V and drain voltage is 2V. Gain and noise analysis of the amplifier is carried out under dark and illumination. It is observed that noise is lowered and gain is improved under illumination as that of dark which are expected characteristics of any LNA.
LNA是任何接收电路的第一个组成部分。本文在ADS CAD工具中设计了一个工作在2.4 GHz的窄带LNA。用于LNA设计的器件是光门控MOSFET (OGMOSFET)。对于直流偏置,栅极电压为1.5 V,漏极电压为2V。在黑暗和光照条件下对放大器进行了增益和噪声分析。观察到,在光照下,噪声降低,增益提高,这是任何LNA的预期特性。
{"title":"Narrow Band LNA Design Using OGMOSFET for Noise and Gain Analysis","authors":"G. Phade, Sandhya Save, Vivek Ratnapakhari","doi":"10.1145/2909067.2909084","DOIUrl":"https://doi.org/10.1145/2909067.2909084","url":null,"abstract":"LNA is the first building block of any receiver circuit. In this paper, a narrow band LNA operating at 2.4 GHz is designed in ADS CAD tool. Device used for LNA design is Optically Gated MOSFET (OGMOSFET). For DC bias, gate voltage is 1.5 V and drain voltage is 2V. Gain and noise analysis of the amplifier is carried out under dark and illumination. It is observed that noise is lowered and gain is improved under illumination as that of dark which are expected characteristics of any LNA.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115331142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Kerberos using DES Algorithm 基于DES算法的Kerberos设计与实现
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909083
Shikha Jindal, Manmohan Sharma
Security is playing a very important and crucial role in the field of network communication system and Internet. Kerberos Authentication Protocol is designed and developed by Massachusetts Institute of Technology (MIT) and it provides authentication by encrypting information and allow clients to access servers in a secure manner. This paper describes the design and implementation of Kerberos using Data Encryption Standard (DES). Data encryption standard (DES) is a private key cryptography system that provides the security in the communication system. Java Development Tool Kit as the front end and ms access as the back end are used for implementation.
在网络通信系统和互联网领域,安全起着至关重要的作用。Kerberos身份验证协议是由麻省理工学院(MIT)设计和开发的,它通过加密信息提供身份验证,并允许客户端以安全的方式访问服务器。本文介绍了基于数据加密标准DES的Kerberos的设计与实现。数据加密标准DES (Data encryption standard)是一种为通信系统提供安全保障的私钥加密系统。采用Java Development Tool Kit作为前端,ms access作为后端进行实现。
{"title":"Design and Implementation of Kerberos using DES Algorithm","authors":"Shikha Jindal, Manmohan Sharma","doi":"10.1145/2909067.2909083","DOIUrl":"https://doi.org/10.1145/2909067.2909083","url":null,"abstract":"Security is playing a very important and crucial role in the field of network communication system and Internet. Kerberos Authentication Protocol is designed and developed by Massachusetts Institute of Technology (MIT) and it provides authentication by encrypting information and allow clients to access servers in a secure manner. This paper describes the design and implementation of Kerberos using Data Encryption Standard (DES). Data encryption standard (DES) is a private key cryptography system that provides the security in the communication system. Java Development Tool Kit as the front end and ms access as the back end are used for implementation.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123390951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Bus stand Monitoring and Control 智能公交站监控
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909072
Shital M. Dharrao, Vijay D. Choudhary, K. Rane
This paper summarizes work on the designing and application of GPS (Global positioning system) based technology clubbed with GSM (Global system for mobile communication) for Bus stand monitoring & control provided for public transportation. This system has been categorized into two modules: 'In-Bus module, Bus-stand module. The control panel at the bus side will give information to the drivers regarding Platform availability,(vacant or un-vacant platform) if the platform is vacant for the same Bus then it will directly go to platform after that Bus travelling schedule will be display on display board. If the actual platform allotted for parking is not vacant then the driver will get information regarding the alternative platform or waiting for platform availability rather than disturbing the actual Bus stand schedule. The drivers will get information of Platform through messages on parity basis so as to reduce the transit time and congestion. The GSM clubbed GPS technology can also be used to get the current location of vehicles and the available seats in it. ARM7 LPC2148 microcontroller is the main controlling device which controls and synchronizes all the operations by receiving the data GSM Module as well as GPS. Such kind of monitoring systems can be used for various public vehicles ranging from auto rickshaws to Buses. Such types of system will assist the travellers, drivers and the Bus stand controller at the control terminals for real time monitoring of the vehicles.
本文综述了基于GPS(全球定位系统)和GSM(全球移动通信系统)的公交站监控技术的设计与应用。本系统分为两个模块:车内模块、车站模块。巴士一侧的控制面板将向司机提供有关站台可用性的信息(空置或未空置的站台),如果同一辆巴士的站台是空置的,那么在该巴士的行驶时间表将显示在显示板上后,它将直接进入站台。如果实际分配的泊车平台没有空置,则司机将获得有关替代平台或等待平台可用的信息,而不会干扰实际的巴士站时间表。司机通过对等信息的方式获取平台信息,减少了通行时间,减少了拥堵。GSM俱乐部GPS技术也可以用来获得车辆的当前位置和可用的座位。ARM7 LPC2148单片机是主要的控制器件,通过接收GSM模块和GPS的数据来控制和同步所有的操作。这种监控系统可以用于各种公共车辆,从机动三轮车到公交车。这类系统将协助乘客、司机和控制终端的巴士站管理员实时监控车辆。
{"title":"Intelligent Bus stand Monitoring and Control","authors":"Shital M. Dharrao, Vijay D. Choudhary, K. Rane","doi":"10.1145/2909067.2909072","DOIUrl":"https://doi.org/10.1145/2909067.2909072","url":null,"abstract":"This paper summarizes work on the designing and application of GPS (Global positioning system) based technology clubbed with GSM (Global system for mobile communication) for Bus stand monitoring & control provided for public transportation. This system has been categorized into two modules: 'In-Bus module, Bus-stand module. The control panel at the bus side will give information to the drivers regarding Platform availability,(vacant or un-vacant platform) if the platform is vacant for the same Bus then it will directly go to platform after that Bus travelling schedule will be display on display board. If the actual platform allotted for parking is not vacant then the driver will get information regarding the alternative platform or waiting for platform availability rather than disturbing the actual Bus stand schedule. The drivers will get information of Platform through messages on parity basis so as to reduce the transit time and congestion. The GSM clubbed GPS technology can also be used to get the current location of vehicles and the available seats in it. ARM7 LPC2148 microcontroller is the main controlling device which controls and synchronizes all the operations by receiving the data GSM Module as well as GPS. Such kind of monitoring systems can be used for various public vehicles ranging from auto rickshaws to Buses. Such types of system will assist the travellers, drivers and the Bus stand controller at the control terminals for real time monitoring of the vehicles.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128852657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Women In Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1