E-healthcare systems are rapidly gaining importance with the evolution of remote monitoring devices for patient diagnosis. While transmitting patient classified information, it is essential to ensure that patient confidentiality is maintained. ECG signals are used as a medium to mask the patient's confidential data. ECG steganography is achieved by using Discrete Wavelet Transform along with Singular Value Decomposition. To assure that minimal distortion is reported after embedding the data, two distortion metrics namely, Percentage Residual Difference and Bit Error Rate are used. The proposal is implemented on MIT-BIH database and it has been observed that the proposed approach offers minimum distortion hence retaining the authenticity of the original signal.
{"title":"ECG Steganography to secure patient data in an E-Healthcare System","authors":"Dolly Meghani, S. Geetha","doi":"10.1145/2909067.2909078","DOIUrl":"https://doi.org/10.1145/2909067.2909078","url":null,"abstract":"E-healthcare systems are rapidly gaining importance with the evolution of remote monitoring devices for patient diagnosis. While transmitting patient classified information, it is essential to ensure that patient confidentiality is maintained. ECG signals are used as a medium to mask the patient's confidential data. ECG steganography is achieved by using Discrete Wavelet Transform along with Singular Value Decomposition. To assure that minimal distortion is reported after embedding the data, two distortion metrics namely, Percentage Residual Difference and Bit Error Rate are used. The proposal is implemented on MIT-BIH database and it has been observed that the proposed approach offers minimum distortion hence retaining the authenticity of the original signal.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126943522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The web has undergone major transformation during last few years and revolutionized the world we live in. The amount of information and user-generated data on the web is increasing day by day. The major challenge of web research and development is in the effective usage of available data and information on web. Intelligence can be achieved by training the web to learn its content, structure (semantics of web) and by applying intelligent techniques to effectively access the web resources. In this context, Web Intelligence has been recognized as one of the most important as well as the fastest growing research field. This paper provides an overview on the trends and practices of Web Intelligence (WI) that play vital role in meeting the challenges of developing the intelligent web. We also introduce an analysis report on representative references in which the techniques and analytical methods are briefly described.
{"title":"Analytical Trends and Practices of Web Intelligence","authors":"B. Malathi, K. C. Sekharaiah, H. Jayasree","doi":"10.1145/2909067.2909090","DOIUrl":"https://doi.org/10.1145/2909067.2909090","url":null,"abstract":"The web has undergone major transformation during last few years and revolutionized the world we live in. The amount of information and user-generated data on the web is increasing day by day. The major challenge of web research and development is in the effective usage of available data and information on web. Intelligence can be achieved by training the web to learn its content, structure (semantics of web) and by applying intelligent techniques to effectively access the web resources. In this context, Web Intelligence has been recognized as one of the most important as well as the fastest growing research field. This paper provides an overview on the trends and practices of Web Intelligence (WI) that play vital role in meeting the challenges of developing the intelligent web. We also introduce an analysis report on representative references in which the techniques and analytical methods are briefly described.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116065364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital information security is the field of information technology which deal with all about identification and protection of information. Whereas, identification of the threat of any Intrusion Detection System (IDS) in the most challenging phase. Threat detection become most promising because rest of the IDS system phase depends on the solely on "what is identified". In this view, a multilayered framework has been discussed which handles the underlying features for the identification of various attack (DoS, R2L, U2R, Probe). The experiments validates the use SVM with genetic approach is efficient.
{"title":"Improving Accuracy for Intrusion Detection through Layered Approach Using Support Vector Machine with Feature Reduction","authors":"A. Nema, B. Tiwari, V. Tiwari","doi":"10.1145/2909067.2909100","DOIUrl":"https://doi.org/10.1145/2909067.2909100","url":null,"abstract":"Digital information security is the field of information technology which deal with all about identification and protection of information. Whereas, identification of the threat of any Intrusion Detection System (IDS) in the most challenging phase. Threat detection become most promising because rest of the IDS system phase depends on the solely on \"what is identified\". In this view, a multilayered framework has been discussed which handles the underlying features for the identification of various attack (DoS, R2L, U2R, Probe). The experiments validates the use SVM with genetic approach is efficient.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133778257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As on today, due to rise in pollution and dense population in India, there has been an increase in health related issues with respect to spreading disease. The recent outbreak of diseases like HINI, dengue, malaria etc. have made people to focus on ways to minimize the effect of infectious disease. This can be achieved if early prediction and detection of such diseases are possible. Research is being carried out in building various prediction models to forecast the outbreak of such epidemics. While the traditional techniques were useful in giving the results, inputs from social media enabled us to detect the presence, prevalence and spread of these disease in a much early manner. Social networking Medias and their blogs have also been used for prediction. To handle such variety and size of data, it is required to design a system using big data approach for forecasting. Big Data is one of the need of the hour area of research that is become increasingly popular in prediction. This paper focuses on the survey carried out on available techniques and presents a unified approach to prepare a conceptual forecasting model.
{"title":"Techniques and Approaches for Disease Outbreak Prediction: A Survey","authors":"A. Bharambe, D. Kalbande","doi":"10.1145/2909067.2909085","DOIUrl":"https://doi.org/10.1145/2909067.2909085","url":null,"abstract":"As on today, due to rise in pollution and dense population in India, there has been an increase in health related issues with respect to spreading disease. The recent outbreak of diseases like HINI, dengue, malaria etc. have made people to focus on ways to minimize the effect of infectious disease. This can be achieved if early prediction and detection of such diseases are possible. Research is being carried out in building various prediction models to forecast the outbreak of such epidemics. While the traditional techniques were useful in giving the results, inputs from social media enabled us to detect the presence, prevalence and spread of these disease in a much early manner. Social networking Medias and their blogs have also been used for prediction. To handle such variety and size of data, it is required to design a system using big data approach for forecasting. Big Data is one of the need of the hour area of research that is become increasingly popular in prediction. This paper focuses on the survey carried out on available techniques and presents a unified approach to prepare a conceptual forecasting model.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125202211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Modern era of research is motivated to optimize the hardware parts involved during the process of interaction. The idea is to deploy virtual environment for performing the daily routine tasks and social aspects of people. Virtualization provides the interface for performing the task and there is no need of hardware device space. Due to limited hardware space and human err, researchers emphasize use of virtual environment in computer human interaction. Mostly users prefer hand for giving the input task to the system and they are bounded to directly interact with system. Virtual writing and virtual operation is the ongoing research problem, where industries and laboratory are investing maximum effort. The developed gestured system has a lot of scope for improvements with research gazing at accuracy of recognition. In this paper author give the valuable contribution into gestured recognition. Two threads of gestured characteristics are considered for social application to improve the collaborative interaction of human to system.
{"title":"Gesture Recognition for VW & VO: Virtual Writing and Virtual Operation","authors":"A. Dubey, Khushbu Gulabani","doi":"10.1145/2909067.2909088","DOIUrl":"https://doi.org/10.1145/2909067.2909088","url":null,"abstract":"Modern era of research is motivated to optimize the hardware parts involved during the process of interaction. The idea is to deploy virtual environment for performing the daily routine tasks and social aspects of people. Virtualization provides the interface for performing the task and there is no need of hardware device space. Due to limited hardware space and human err, researchers emphasize use of virtual environment in computer human interaction. Mostly users prefer hand for giving the input task to the system and they are bounded to directly interact with system. Virtual writing and virtual operation is the ongoing research problem, where industries and laboratory are investing maximum effort. The developed gestured system has a lot of scope for improvements with research gazing at accuracy of recognition. In this paper author give the valuable contribution into gestured recognition. Two threads of gestured characteristics are considered for social application to improve the collaborative interaction of human to system.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126640052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ESD is an acronym for Erythemato-Squamous Diseases, which is a set of six skin diseases [6]. The Erythemato-Squamous Diseases (ESDs) require huge computational efforts to predict the diseases because all the six diseases studied in this group have more than 90% common features. The main focus of this paper is to study the use of machine learning algorithms in R software for prediction of ESD Diseases. In this paper, different algorithms are studied and implemented in R. Accuracy of these algorithms is compared.
{"title":"Review of Machine Learning Algorithms in R software for Diagnosis of ESD Diseases","authors":"S. Kolkur, D. Kalbande","doi":"10.1145/2909067.2909101","DOIUrl":"https://doi.org/10.1145/2909067.2909101","url":null,"abstract":"ESD is an acronym for Erythemato-Squamous Diseases, which is a set of six skin diseases [6]. The Erythemato-Squamous Diseases (ESDs) require huge computational efforts to predict the diseases because all the six diseases studied in this group have more than 90% common features.\u0000 The main focus of this paper is to study the use of machine learning algorithms in R software for prediction of ESD Diseases. In this paper, different algorithms are studied and implemented in R. Accuracy of these algorithms is compared.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The shared behavior of wireless network makes it more vulnerable to Denial of Service attack. A Denial of Service (DOS) attack is a planned attempt to make resources unable to the legitimate client. These attacks can easily launch by perpetrator emitting no. of signals that do not follow MAC protocol. A DOS attacks are the significant cause of data corruption and malfunctioning of a wireless network. In this paper, we proposed a new approach to detect denial of service attack in wireless, which not only detect attack, but also differentiate it from the natural condition occur in a network. The proposed method uses different network factor and statistical method to calculate threshold value.
{"title":"An Approach Used In Wireless Network to Detect Denial of Service Attack","authors":"Rashi Dhagat, P. Jagtap","doi":"10.1145/2909067.2909069","DOIUrl":"https://doi.org/10.1145/2909067.2909069","url":null,"abstract":"The shared behavior of wireless network makes it more vulnerable to Denial of Service attack. A Denial of Service (DOS) attack is a planned attempt to make resources unable to the legitimate client. These attacks can easily launch by perpetrator emitting no. of signals that do not follow MAC protocol. A DOS attacks are the significant cause of data corruption and malfunctioning of a wireless network. In this paper, we proposed a new approach to detect denial of service attack in wireless, which not only detect attack, but also differentiate it from the natural condition occur in a network. The proposed method uses different network factor and statistical method to calculate threshold value.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124421662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
LNA is the first building block of any receiver circuit. In this paper, a narrow band LNA operating at 2.4 GHz is designed in ADS CAD tool. Device used for LNA design is Optically Gated MOSFET (OGMOSFET). For DC bias, gate voltage is 1.5 V and drain voltage is 2V. Gain and noise analysis of the amplifier is carried out under dark and illumination. It is observed that noise is lowered and gain is improved under illumination as that of dark which are expected characteristics of any LNA.
{"title":"Narrow Band LNA Design Using OGMOSFET for Noise and Gain Analysis","authors":"G. Phade, Sandhya Save, Vivek Ratnapakhari","doi":"10.1145/2909067.2909084","DOIUrl":"https://doi.org/10.1145/2909067.2909084","url":null,"abstract":"LNA is the first building block of any receiver circuit. In this paper, a narrow band LNA operating at 2.4 GHz is designed in ADS CAD tool. Device used for LNA design is Optically Gated MOSFET (OGMOSFET). For DC bias, gate voltage is 1.5 V and drain voltage is 2V. Gain and noise analysis of the amplifier is carried out under dark and illumination. It is observed that noise is lowered and gain is improved under illumination as that of dark which are expected characteristics of any LNA.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115331142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security is playing a very important and crucial role in the field of network communication system and Internet. Kerberos Authentication Protocol is designed and developed by Massachusetts Institute of Technology (MIT) and it provides authentication by encrypting information and allow clients to access servers in a secure manner. This paper describes the design and implementation of Kerberos using Data Encryption Standard (DES). Data encryption standard (DES) is a private key cryptography system that provides the security in the communication system. Java Development Tool Kit as the front end and ms access as the back end are used for implementation.
在网络通信系统和互联网领域,安全起着至关重要的作用。Kerberos身份验证协议是由麻省理工学院(MIT)设计和开发的,它通过加密信息提供身份验证,并允许客户端以安全的方式访问服务器。本文介绍了基于数据加密标准DES的Kerberos的设计与实现。数据加密标准DES (Data encryption standard)是一种为通信系统提供安全保障的私钥加密系统。采用Java Development Tool Kit作为前端,ms access作为后端进行实现。
{"title":"Design and Implementation of Kerberos using DES Algorithm","authors":"Shikha Jindal, Manmohan Sharma","doi":"10.1145/2909067.2909083","DOIUrl":"https://doi.org/10.1145/2909067.2909083","url":null,"abstract":"Security is playing a very important and crucial role in the field of network communication system and Internet. Kerberos Authentication Protocol is designed and developed by Massachusetts Institute of Technology (MIT) and it provides authentication by encrypting information and allow clients to access servers in a secure manner. This paper describes the design and implementation of Kerberos using Data Encryption Standard (DES). Data encryption standard (DES) is a private key cryptography system that provides the security in the communication system. Java Development Tool Kit as the front end and ms access as the back end are used for implementation.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123390951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper summarizes work on the designing and application of GPS (Global positioning system) based technology clubbed with GSM (Global system for mobile communication) for Bus stand monitoring & control provided for public transportation. This system has been categorized into two modules: 'In-Bus module, Bus-stand module. The control panel at the bus side will give information to the drivers regarding Platform availability,(vacant or un-vacant platform) if the platform is vacant for the same Bus then it will directly go to platform after that Bus travelling schedule will be display on display board. If the actual platform allotted for parking is not vacant then the driver will get information regarding the alternative platform or waiting for platform availability rather than disturbing the actual Bus stand schedule. The drivers will get information of Platform through messages on parity basis so as to reduce the transit time and congestion. The GSM clubbed GPS technology can also be used to get the current location of vehicles and the available seats in it. ARM7 LPC2148 microcontroller is the main controlling device which controls and synchronizes all the operations by receiving the data GSM Module as well as GPS. Such kind of monitoring systems can be used for various public vehicles ranging from auto rickshaws to Buses. Such types of system will assist the travellers, drivers and the Bus stand controller at the control terminals for real time monitoring of the vehicles.
{"title":"Intelligent Bus stand Monitoring and Control","authors":"Shital M. Dharrao, Vijay D. Choudhary, K. Rane","doi":"10.1145/2909067.2909072","DOIUrl":"https://doi.org/10.1145/2909067.2909072","url":null,"abstract":"This paper summarizes work on the designing and application of GPS (Global positioning system) based technology clubbed with GSM (Global system for mobile communication) for Bus stand monitoring & control provided for public transportation. This system has been categorized into two modules: 'In-Bus module, Bus-stand module. The control panel at the bus side will give information to the drivers regarding Platform availability,(vacant or un-vacant platform) if the platform is vacant for the same Bus then it will directly go to platform after that Bus travelling schedule will be display on display board. If the actual platform allotted for parking is not vacant then the driver will get information regarding the alternative platform or waiting for platform availability rather than disturbing the actual Bus stand schedule. The drivers will get information of Platform through messages on parity basis so as to reduce the transit time and congestion. The GSM clubbed GPS technology can also be used to get the current location of vehicles and the available seats in it. ARM7 LPC2148 microcontroller is the main controlling device which controls and synchronizes all the operations by receiving the data GSM Module as well as GPS. Such kind of monitoring systems can be used for various public vehicles ranging from auto rickshaws to Buses. Such types of system will assist the travellers, drivers and the Bus stand controller at the control terminals for real time monitoring of the vehicles.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128852657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}