首页 > 最新文献

2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)最新文献

英文 中文
Heat Transfer Modeling And Analysis of Annular Diffuser With and Without Double Tapered Struts 带与不带双锥形支板的环形扩散器传热建模与分析
K. Muninathan, R. R. Thirumaniraj, M. A. Suryanarayanan
Exhaust diffusers are critical components of gas turbines in both propulsion and power system applications. The factors influencing their performance are predominantly the area ratio, divergence angle and the length of the flow path over which diffusion occurs. Pressure recovery and pressure loss coefficients, relationships between static and total pressure and performance maps are generally used to determine diffuser’s performance. The main aim of the present work is to make a detailed analysis on various flow characteristics of the annular diffuser and determine the effect of struts on both the flow parameters and the overall performance of the exhaust diffuser. The cases under consideration are the annular diffuser with two different strut configuration namely the baseline and the tapered struts, and their comparison with the same diffuser model without any strut in the flow path. The diffuser is modeled and meshed using the pre-processor tool CATIA. In the present investigation, numerical simulation is carried out using STAR−CCM+, computational fluid dynamics software, which is based on the finite volume method and solves the three-dimensional Reynolds averaged Navier-Stokes equations, to predict the flow characteristics inside the diffuser and analyses the effect of struts. The details of the numerical simulation, solution procedure, turbulence model, boundary conditions, results obtained and the conclusions arrived at the results were discussed in detail.
在推进和动力系统中,排气扩散器是燃气轮机的关键部件。影响其性能的主要因素是面积比、发散角和发生扩散的流道长度。压力恢复系数和压力损失系数、静压和总压之间的关系以及性能图通常用于确定扩散器的性能。本文的主要目的是对环形扩压器的各种流动特性进行详细的分析,确定支板对排气扩压器流动参数和整体性能的影响。考虑了两种不同结构的环空扩压器,即基线型和锥形型扩压器,以及它们与流道中没有任何结构的相同扩压器模型的比较。利用预处理工具CATIA对扩散器进行建模和网格划分。本文采用STAR−CCM+计算流体力学软件,基于有限体积法,求解三维Reynolds平均Navier-Stokes方程,对扩压器内部流动特性进行了数值模拟,并分析了支板的影响。详细讨论了数值模拟的细节、求解过程、湍流模型、边界条件、得到的结果和得出的结论。
{"title":"Heat Transfer Modeling And Analysis of Annular Diffuser With and Without Double Tapered Struts","authors":"K. Muninathan, R. R. Thirumaniraj, M. A. Suryanarayanan","doi":"10.1109/ICSCAN.2018.8541227","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541227","url":null,"abstract":"Exhaust diffusers are critical components of gas turbines in both propulsion and power system applications. The factors influencing their performance are predominantly the area ratio, divergence angle and the length of the flow path over which diffusion occurs. Pressure recovery and pressure loss coefficients, relationships between static and total pressure and performance maps are generally used to determine diffuser’s performance. The main aim of the present work is to make a detailed analysis on various flow characteristics of the annular diffuser and determine the effect of struts on both the flow parameters and the overall performance of the exhaust diffuser. The cases under consideration are the annular diffuser with two different strut configuration namely the baseline and the tapered struts, and their comparison with the same diffuser model without any strut in the flow path. The diffuser is modeled and meshed using the pre-processor tool CATIA. In the present investigation, numerical simulation is carried out using STAR−CCM+, computational fluid dynamics software, which is based on the finite volume method and solves the three-dimensional Reynolds averaged Navier-Stokes equations, to predict the flow characteristics inside the diffuser and analyses the effect of struts. The details of the numerical simulation, solution procedure, turbulence model, boundary conditions, results obtained and the conclusions arrived at the results were discussed in detail.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115662554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cascade-Forward Neural Network in Identification of Plant Species of Desert Based on Wild Flowers 基于野花的级联前向神经网络在荒漠植物种类识别中的应用
M. Thilagavathi, S. Abirami
Tremendous improvements in Flower image description induced much interest in image based plant species identification. Rare species of desert plants are at risk and it is necessary to maintain record for their existence, which can be done by applying image processing techniques for object classification. This paper focuses on the automatic recognition of plant species from Sonoran desert regions through their flower images. The dataset contains 609 individuals of 25 species. The image preprocessing begins with median filter to remove the noise. The color and texture features are obtained from the flower images for classification. HSV color space is used to extract the color features and Center-Symmetric Local Binary Pattern (CS-LBP) for texture features. The extracted features are incorporated in Cascade-Forward Neural Network to classify the species which outperforms an accuracy of 96.8%.
花图像描述的巨大进步引起了人们对基于图像的植物物种识别的兴趣。荒漠植物的珍稀物种处于濒危状态,有必要对其进行生存记录,这可以通过图像处理技术进行物象分类来实现。本文主要研究了索诺兰沙漠地区植物种类的花卉图像自动识别技术。该数据集包含25个物种的609个个体。图像预处理从中值滤波开始,去除噪声。从花朵图像中提取颜色和纹理特征进行分类。利用HSV颜色空间提取颜色特征,利用CS-LBP提取纹理特征。将提取的特征与级联前向神经网络相结合进行物种分类,准确率达到96.8%。
{"title":"Cascade-Forward Neural Network in Identification of Plant Species of Desert Based on Wild Flowers","authors":"M. Thilagavathi, S. Abirami","doi":"10.1109/ICSCAN.2018.8541172","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541172","url":null,"abstract":"Tremendous improvements in Flower image description induced much interest in image based plant species identification. Rare species of desert plants are at risk and it is necessary to maintain record for their existence, which can be done by applying image processing techniques for object classification. This paper focuses on the automatic recognition of plant species from Sonoran desert regions through their flower images. The dataset contains 609 individuals of 25 species. The image preprocessing begins with median filter to remove the noise. The color and texture features are obtained from the flower images for classification. HSV color space is used to extract the color features and Center-Symmetric Local Binary Pattern (CS-LBP) for texture features. The extracted features are incorporated in Cascade-Forward Neural Network to classify the species which outperforms an accuracy of 96.8%.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124781749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evolutionary Survey On Data Security In Cloud Computing Using Blockchain 基于区块链的云计算数据安全演进研究
S. Prianga, R. Sagana, E. Sharon
In recent times, data has become an inevitable factor in cloud computing. The word data eventually seeks its issue on privacy and security. With the rise of new technologies, the need for data storage has increased. Massive increase in the datasets has led to the evolution of cloud storage. The benefits of cloud computing are immense, but on the contrary there is an increasing risk to the security of the data stored in the cloud. This paper deals with a survey on the security issues which highlights the effectiveness of security that has been implied in the forms of cloud computing and blockchain technologies. The survey also includes a deep understanding of a PoW–based blockchain model using the blockchain technology. The idea behind this work is to provide a detailed survey about the blockchain technology which is growing tremendously.
近年来,数据已成为云计算中不可避免的因素。“数据”这个词最终寻求的是它的隐私和安全问题。随着新技术的兴起,对数据存储的需求也在增加。数据集的大量增加导致了云存储的发展。云计算的好处是巨大的,但与此相反,存储在云中的数据的安全性面临越来越大的风险。本文对安全问题进行了调查,强调了云计算和区块链技术形式中隐含的安全性的有效性。该调查还包括对使用区块链技术的基于pow的区块链模型的深入理解。这项工作背后的想法是提供一个关于区块链技术的详细调查,该技术正在迅速发展。
{"title":"Evolutionary Survey On Data Security In Cloud Computing Using Blockchain","authors":"S. Prianga, R. Sagana, E. Sharon","doi":"10.1109/ICSCAN.2018.8541258","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541258","url":null,"abstract":"In recent times, data has become an inevitable factor in cloud computing. The word data eventually seeks its issue on privacy and security. With the rise of new technologies, the need for data storage has increased. Massive increase in the datasets has led to the evolution of cloud storage. The benefits of cloud computing are immense, but on the contrary there is an increasing risk to the security of the data stored in the cloud. This paper deals with a survey on the security issues which highlights the effectiveness of security that has been implied in the forms of cloud computing and blockchain technologies. The survey also includes a deep understanding of a PoW–based blockchain model using the blockchain technology. The idea behind this work is to provide a detailed survey about the blockchain technology which is growing tremendously.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123423657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Gold/Polypyrrole (Au/PPy) Bimorph Actuator for Underwater Robotic Motion 用于水下机器人运动的金/聚吡咯(Au/PPy)双晶片驱动器
S. Panda, D. Bandopadhya
Recent developments in smart materials gained attention for developing underwater micro robots for various applications like scanning, surveillance and defense. Polypyrrole, ionic electro-active polymer (EAP) actuators has shown its effectiveness in miniaturized bio-inspired robots because of its incompetent characteristics like light weight, flexibility, large strain and bending deformation with low input voltage, high work density and natural muscle like behavior and performances. However, low operational life and bending displacement limits its underwater application, in this paper, we have fabricated a low cost PPy bimorph actuator and demonstrated its underwater performances and application by developing a PPy actuator based tadpole robot. The actuator is fabricated by using multi-layer electrochemical polymerization and performance evaluation by underwater bending experiment followed by the prototype development and operations. The actuator tip displacement, force and generated thrust are evaluated from the bending of actuator in quiescent water. It has been seen that the actuator can bend upto 5.4mm with 4.2mN of tip force upon applying a low voltage of nearly 1.3V. Further the response of the actuator is significantly fast and can continuously work upto 12 hrs without reporting any significant failure. Then the prototype is developed similar to natural tadpole by considering its morphological parameters and conduct further experiment for its swimming capabilities in terms of thrust, speed and efficiency. The performance parameters of the current robot are compared with the natural tadpole and existing models for validation of the present model. It can be believes that the present actuator can be used for real time underwater robotics applications like scanning and surveillance.
智能材料的最新发展引起了人们对水下微型机器人的关注,这些机器人可用于扫描、监视和防御等各种应用。聚吡咯离子电活性聚合物(EAP)驱动器具有重量轻、柔韧性好、应变大、弯曲变形大、输入电压低、工作密度高、具有天然的肌肉行为和性能等优点,在小型化仿生机器人中得到了广泛应用。然而,低使用寿命和弯曲位移限制了其在水下的应用,本文制作了一种低成本的PPy双晶片驱动器,并通过开发一种基于PPy驱动器的蝌蚪机器人来展示其水下性能和应用。采用多层电化学聚合法制备了该驱动器,并通过水下弯曲实验对其性能进行了评价。通过静水中致动器的弯曲,计算致动器的尖端位移、力和产生的推力。可以看到,在施加近1.3V的低电压时,执行器可以在4.2mN的尖端力下弯曲5.4mm。此外,执行器的响应速度非常快,可以连续工作长达12小时而不会报告任何重大故障。然后根据蝌蚪的形态参数,研制出与天然蝌蚪相似的原型,并对其在推力、速度、效率等方面的游泳能力进行进一步实验。将该机器人的性能参数与天然蝌蚪和现有模型进行了比较,验证了该模型的有效性。可以相信,目前的驱动器可以用于实时水下机器人应用,如扫描和监视。
{"title":"Gold/Polypyrrole (Au/PPy) Bimorph Actuator for Underwater Robotic Motion","authors":"S. Panda, D. Bandopadhya","doi":"10.1109/ICSCAN.2018.8541175","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541175","url":null,"abstract":"Recent developments in smart materials gained attention for developing underwater micro robots for various applications like scanning, surveillance and defense. Polypyrrole, ionic electro-active polymer (EAP) actuators has shown its effectiveness in miniaturized bio-inspired robots because of its incompetent characteristics like light weight, flexibility, large strain and bending deformation with low input voltage, high work density and natural muscle like behavior and performances. However, low operational life and bending displacement limits its underwater application, in this paper, we have fabricated a low cost PPy bimorph actuator and demonstrated its underwater performances and application by developing a PPy actuator based tadpole robot. The actuator is fabricated by using multi-layer electrochemical polymerization and performance evaluation by underwater bending experiment followed by the prototype development and operations. The actuator tip displacement, force and generated thrust are evaluated from the bending of actuator in quiescent water. It has been seen that the actuator can bend upto 5.4mm with 4.2mN of tip force upon applying a low voltage of nearly 1.3V. Further the response of the actuator is significantly fast and can continuously work upto 12 hrs without reporting any significant failure. Then the prototype is developed similar to natural tadpole by considering its morphological parameters and conduct further experiment for its swimming capabilities in terms of thrust, speed and efficiency. The performance parameters of the current robot are compared with the natural tadpole and existing models for validation of the present model. It can be believes that the present actuator can be used for real time underwater robotics applications like scanning and surveillance.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125358437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Website Attack Prevention Using E-Shield as a IDPS Tool 利用E-Shield作为IDPS工具防范网站攻击
Rishabh Jamar, Aditi Sogani, S. Mudgal, Yash Bhadra, Prathamesh P. Churi
This paper holds the essence of preventing a system from attacks using honeypot integrated IDS in detail. Security breaches have soared high at an accelerating rate with the growing technological changes. Only detection cannot help solve the problem that the websites face. Eliminating the attacks is very paramount. The paper talks about how E-Shield (a system created to identify, intercept and eject the attacks) occuring on a website works. A system does not know whether the user is a good user or a bad user. A bad user, that is an attacker could harm the system, its resources, and misuse it in multiple ways. While there exist a variety of attacks, the paper focuses only on the 5 frequent attacks, besides listing all the major attributes of the user such as the source of attack, the status of the system’s security. Starting with the basic signup and logging in feature, to storing the credentials along with solving the intricacies related to it, to the ultimate step of preventing and avoiding the hazardous threat of data loss, all the system’s needs are catered to. The paper also discusses how the system tracks the user’s activities over a specified period of time and analyses and records them. Henceforth, leading to the betterment of cyber security, creating a pathway for online investments.
本文详细阐述了利用蜜罐集成入侵防御系统攻击的本质。随着技术变革的不断发展,安全漏洞以更快的速度飙升。只有检测并不能帮助解决网站所面临的问题。消除攻击是至关重要的。这篇论文讨论了E-Shield(一种用于识别、拦截和驱逐攻击的系统)是如何在网站上工作的。系统不知道用户是好用户还是坏用户。不良用户(即攻击者)可能以多种方式损害系统及其资源并滥用系统。虽然存在各种各样的攻击,但本文除了列出攻击源、系统安全状态等用户的所有主要属性外,只关注5种频繁的攻击。从基本的注册和登录功能开始,到存储凭据以及解决与之相关的复杂问题,再到防止和避免数据丢失的危险威胁的最终步骤,满足了系统的所有需求。本文还讨论了系统如何在指定的时间段内跟踪用户的活动,并对其进行分析和记录。从此,导致网络安全的改善,为在线投资创造了一条途径。
{"title":"Website Attack Prevention Using E-Shield as a IDPS Tool","authors":"Rishabh Jamar, Aditi Sogani, S. Mudgal, Yash Bhadra, Prathamesh P. Churi","doi":"10.1109/ICSCAN.2018.8541152","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541152","url":null,"abstract":"This paper holds the essence of preventing a system from attacks using honeypot integrated IDS in detail. Security breaches have soared high at an accelerating rate with the growing technological changes. Only detection cannot help solve the problem that the websites face. Eliminating the attacks is very paramount. The paper talks about how E-Shield (a system created to identify, intercept and eject the attacks) occuring on a website works. A system does not know whether the user is a good user or a bad user. A bad user, that is an attacker could harm the system, its resources, and misuse it in multiple ways. While there exist a variety of attacks, the paper focuses only on the 5 frequent attacks, besides listing all the major attributes of the user such as the source of attack, the status of the system’s security. Starting with the basic signup and logging in feature, to storing the credentials along with solving the intricacies related to it, to the ultimate step of preventing and avoiding the hazardous threat of data loss, all the system’s needs are catered to. The paper also discusses how the system tracks the user’s activities over a specified period of time and analyses and records them. Henceforth, leading to the betterment of cyber security, creating a pathway for online investments.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121403264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisited Design of Short-pulse Power Gated Approach of Subthreshold Leakage Reduction Technique in Combinational Circuits 组合电路中亚阈值减漏技术的短脉冲功率门控方法重新设计
G. Amuthavalli, R. Gunasundari
Low power consumption is the ultimate goal of the circuit designers of any application and specifically, the life time of event-driven nature of low duty cycle applications like Wireless Sensor Networks (WSN) relies on the design of power-stringent battery-operated devices. At all the hierarchical level of the sensor nodes, low duty cycling is the practicing solution in saving the unwanted power consumption. However, the rapid power squanderer at the sleep state of the circuit is the subthreshold leakage. The exact saving of the leakage can be done by suppressing the short-channel effects of the transistors only at the circuit-level and the two techniques Modified Power Gating (MPG) and Short-pulse POwer Gated Approach (SPOGA, hereafter called as SPOGA_old) are proposed and implemented in the combinational circuits in the previous works of the research. In spite of good subthreshold leakage reduction, the limitations of the proposed techniques are loading effect, state-retention and leakage estimation method. In order to provide an efficient sleep state subthreshold leakage reduction in combinational circuits of low duty cycle application, the limitations are addressed with a revisited design of SPOGA_old, called as SPOGA technique. The illustration of the proposed SPOGA technique with CMOS inverter is done using Cadence GPDK090. From the simulation results, it is clearly seen that the Subthreshold Leakage Reduction Ratio (SLRR) is high and proved the efficacy of the SPOGA technique in subthreshold leakage reduction.
低功耗是任何应用程序电路设计人员的最终目标,特别是,事件驱动性质的低占空比应用程序(如无线传感器网络(WSN))的寿命依赖于功率严格的电池供电设备的设计。在传感器节点的所有层次上,低占空比是节省不必要功耗的实践解决方案。然而,在电路休眠状态下,快速耗电的是亚阈值漏电。仅在电路级抑制晶体管的短通道效应就能准确地节省漏电,前人的研究工作提出并在组合电路中实现了修正功率门控(MPG)和短脉冲功率门控方法(SPOGA,以下简称SPOGA_old)两种技术。尽管该方法具有较好的亚阈值泄漏抑制效果,但其局限性在于加载效应、状态保持和泄漏估计方法。为了在低占空比应用的组合电路中提供有效的睡眠状态亚阈值泄漏减少,通过重新设计SPOGA_old(称为SPOGA技术)来解决这些限制。本文以Cadence GPDK090为例,对所提出的基于CMOS逆变器的SPOGA技术进行了说明。仿真结果表明,SPOGA技术的亚阈值泄漏降低率(SLRR)较高,证明了SPOGA技术在亚阈值泄漏降低方面的有效性。
{"title":"Revisited Design of Short-pulse Power Gated Approach of Subthreshold Leakage Reduction Technique in Combinational Circuits","authors":"G. Amuthavalli, R. Gunasundari","doi":"10.1109/ICSCAN.2018.8541204","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541204","url":null,"abstract":"Low power consumption is the ultimate goal of the circuit designers of any application and specifically, the life time of event-driven nature of low duty cycle applications like Wireless Sensor Networks (WSN) relies on the design of power-stringent battery-operated devices. At all the hierarchical level of the sensor nodes, low duty cycling is the practicing solution in saving the unwanted power consumption. However, the rapid power squanderer at the sleep state of the circuit is the subthreshold leakage. The exact saving of the leakage can be done by suppressing the short-channel effects of the transistors only at the circuit-level and the two techniques Modified Power Gating (MPG) and Short-pulse POwer Gated Approach (SPOGA, hereafter called as SPOGA_old) are proposed and implemented in the combinational circuits in the previous works of the research. In spite of good subthreshold leakage reduction, the limitations of the proposed techniques are loading effect, state-retention and leakage estimation method. In order to provide an efficient sleep state subthreshold leakage reduction in combinational circuits of low duty cycle application, the limitations are addressed with a revisited design of SPOGA_old, called as SPOGA technique. The illustration of the proposed SPOGA technique with CMOS inverter is done using Cadence GPDK090. From the simulation results, it is clearly seen that the Subthreshold Leakage Reduction Ratio (SLRR) is high and proved the efficacy of the SPOGA technique in subthreshold leakage reduction.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130720694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigation of Malware Detection Techniques on Smart Phones 智能手机恶意软件检测技术研究
G. Shanmugasundaram, S. Balaji, T. Mugilan
Smartphones are rapidly becoming a necessity in our life’s and Android is one of the most popular operating system. Android operating system is widespread in today’s smart phone market due to its open source model, its easy functionality and huge number of apps. There is a tendency of app user to trust on Android OS is for securing the data but it has been proved that Android OS is more vulnerable. Malware detection for Android OS has becoming an upcoming research problem of interest. The objective of this article is to investigate about the various attributes involved in malware detection. Further it explores about the malware detection techniques. Existing detection mechanism uses algorithms such as Naïve bayes algorithm, Bayesian algorithm, Hybrid algorithm, Ada grad algorithm and other machine learning algorithms to train the sets and to detect the malware This article concludes with challenges which are not yet addressed.
智能手机正迅速成为我们生活中的必需品,安卓是最受欢迎的操作系统之一。由于其开源模式、简单的功能和大量的应用程序,Android操作系统在当今的智能手机市场上非常普遍。应用程序用户倾向于信任Android操作系统是为了保护数据,但事实证明Android操作系统更容易受到攻击。Android操作系统的恶意软件检测已经成为一个即将到来的研究问题。本文的目的是研究恶意软件检测中涉及的各种属性。进一步探讨了恶意软件检测技术。现有的检测机制使用Naïve贝叶斯算法、贝叶斯算法、混合算法、Ada梯度算法等机器学习算法来训练集合并检测恶意软件。本文总结了尚未解决的挑战。
{"title":"Investigation of Malware Detection Techniques on Smart Phones","authors":"G. Shanmugasundaram, S. Balaji, T. Mugilan","doi":"10.1109/ICSCAN.2018.8541197","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541197","url":null,"abstract":"Smartphones are rapidly becoming a necessity in our life’s and Android is one of the most popular operating system. Android operating system is widespread in today’s smart phone market due to its open source model, its easy functionality and huge number of apps. There is a tendency of app user to trust on Android OS is for securing the data but it has been proved that Android OS is more vulnerable. Malware detection for Android OS has becoming an upcoming research problem of interest. The objective of this article is to investigate about the various attributes involved in malware detection. Further it explores about the malware detection techniques. Existing detection mechanism uses algorithms such as Naïve bayes algorithm, Bayesian algorithm, Hybrid algorithm, Ada grad algorithm and other machine learning algorithms to train the sets and to detect the malware This article concludes with challenges which are not yet addressed.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Car Parking with Monitoring System 智能停车监控系统
M. Swatha, K. Pooja
Nowadays, the total amount of traffic is increased rapidly and parking space getting smaller. It’s to design a drive less car by using RTOS (Real Time Operating System) and a smartphone. It is motivated to configure the guidance system of a flexible (Automated Guided Vehicle) AGV. The driver finds very difficult to park their vehicle in a narrow garage, so it helps to park the vehicle using smartphone via Bluetooth with the range of 100 m, ranges between the car and the smartphone and GPS (Global Positioning System) is also used to know the location. This GPS system will help the user to easily identify the car location. "Car Assist" technology is used to monitor the car driving path and the things happening around the car can be viewed in the smartphone via GPS. It supports live time preview to monitor the car parking garage. The users need not to be present inside the car like some previous generation systems. The proposed work is compared with bench work results and yield very less time to monitor and park the vehicles against the existing system.
如今,交通总量迅速增加,停车位越来越小。它是利用实时操作系统(RTOS)和智能手机设计一辆无人驾驶汽车。对柔性自动导引车(AGV)导引系统的配置进行了研究。司机很难把车停在狭窄的车库里,因此可以通过蓝牙通过智能手机停车,距离为100米,汽车和智能手机之间的距离以及GPS(全球定位系统)也可以知道位置。这个GPS系统将帮助用户方便地识别汽车位置。“汽车辅助”技术用于监控汽车行驶路线,通过GPS可以在智能手机上查看汽车周围发生的事情。它支持实时预览,以监控汽车停车场。用户不需要像上一代系统那样出现在车内。将所提出的工作与台架工作结果进行了比较,根据现有系统对车辆进行监控和停放所需的时间非常少。
{"title":"Smart Car Parking with Monitoring System","authors":"M. Swatha, K. Pooja","doi":"10.1109/ICSCAN.2018.8541196","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541196","url":null,"abstract":"Nowadays, the total amount of traffic is increased rapidly and parking space getting smaller. It’s to design a drive less car by using RTOS (Real Time Operating System) and a smartphone. It is motivated to configure the guidance system of a flexible (Automated Guided Vehicle) AGV. The driver finds very difficult to park their vehicle in a narrow garage, so it helps to park the vehicle using smartphone via Bluetooth with the range of 100 m, ranges between the car and the smartphone and GPS (Global Positioning System) is also used to know the location. This GPS system will help the user to easily identify the car location. \"Car Assist\" technology is used to monitor the car driving path and the things happening around the car can be viewed in the smartphone via GPS. It supports live time preview to monitor the car parking garage. The users need not to be present inside the car like some previous generation systems. The proposed work is compared with bench work results and yield very less time to monitor and park the vehicles against the existing system.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134385016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PREDICTION OF EMPLOYEE ATTRITION USING DATAMINING 利用数据挖掘预测员工流失
Shiva Shankar Reddy, J. Rajanikanth, V. Sivaramaraju, K. VSSR Murthy
Now a day’s Employee Attrition prediction become a major problem in the organizations. Employee Attrition is a big issue for the organizations specially when trained, technical and key employees leave for a better opportunity from the organization. This results in financial loss to replace a trained employee. Therefore, we use the current and past employee data to analyze the common reasons for employee attrition or attrition. For the prevention of employee attrition, we applied a well known classification methods, that is, Decision tree, Logistic Regression, SVM, KNN, Random Forest, Naive bayes methods on the human resource data. For this we implement feature selection method on the data and analysis the results to prevent employee attrition. This is helpful to companies to predict employee attrition, and also helpful to their economic growth by reducing their human resource cost.
如今,员工流失率预测已成为企业面临的一个重大问题。员工流失对组织来说是一个大问题,特别是当受过培训的技术和关键员工离开组织寻找更好的机会时。这导致了更换训练有素的员工的经济损失。因此,我们使用当前和过去的员工数据来分析员工流失或离职的常见原因。为了防止员工流失,我们对人力资源数据应用了众所周知的分类方法,即决策树、逻辑回归、支持向量机、KNN、随机森林、朴素贝叶斯等方法。为此,我们对数据实施特征选择方法,并对结果进行分析,以防止员工流失。这有助于企业预测员工流失,也有助于企业通过降低人力资源成本来实现经济增长。
{"title":"PREDICTION OF EMPLOYEE ATTRITION USING DATAMINING","authors":"Shiva Shankar Reddy, J. Rajanikanth, V. Sivaramaraju, K. VSSR Murthy","doi":"10.1109/ICSCAN.2018.8541242","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541242","url":null,"abstract":"Now a day’s Employee Attrition prediction become a major problem in the organizations. Employee Attrition is a big issue for the organizations specially when trained, technical and key employees leave for a better opportunity from the organization. This results in financial loss to replace a trained employee. Therefore, we use the current and past employee data to analyze the common reasons for employee attrition or attrition. For the prevention of employee attrition, we applied a well known classification methods, that is, Decision tree, Logistic Regression, SVM, KNN, Random Forest, Naive bayes methods on the human resource data. For this we implement feature selection method on the data and analysis the results to prevent employee attrition. This is helpful to companies to predict employee attrition, and also helpful to their economic growth by reducing their human resource cost.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132235830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Big data Analytics of cyber attacks: a review 网络攻击的大数据分析:综述
M. Suraj, Nikhil Kumar Singh, D. Tomar
Cyber crime over big data is expand with unprecedented rate that badly affects the Internet industry and the global data. Progressively sophisticated attack and offensive methods used by cyber attacker and the growing role of data-driven and intelligence-driven adversaries demonstrate that traditional approaches to mitigate cyber threats are becoming ineffective. Big Data in wide areas also freely available for Marketing, Criminal activities and Fraud detection, Epidemic Intelligence etc. It is tedious job to analysis big data on traditional database, NoSQL have been developed as a scalable platform to store and process large amount of data. In this paper, different types of attacks on big data, its storage mechanism and real time analytics approaches are discussed.Also taking social media data as a big data, studies different social network attacks and provided a problem statement based on the study.
基于大数据的网络犯罪正以前所未有的速度扩张,严重影响着互联网产业和全球数据。网络攻击者使用的日益复杂的攻击和进攻方法,以及数据驱动和情报驱动的对手日益增长的作用表明,缓解网络威胁的传统方法正在变得无效。广泛领域的大数据也可免费用于市场营销、犯罪活动和欺诈侦查、流行病情报等。在传统数据库上分析大数据是一项繁琐的工作,NoSQL作为一种可扩展的平台被开发出来,用于存储和处理大量数据。本文讨论了不同类型的大数据攻击、大数据的存储机制和实时分析方法。同样以社交媒体数据为大数据,研究不同的社交网络攻击,并在研究的基础上提出问题陈述。
{"title":"Big data Analytics of cyber attacks: a review","authors":"M. Suraj, Nikhil Kumar Singh, D. Tomar","doi":"10.1109/ICSCAN.2018.8541263","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541263","url":null,"abstract":"Cyber crime over big data is expand with unprecedented rate that badly affects the Internet industry and the global data. Progressively sophisticated attack and offensive methods used by cyber attacker and the growing role of data-driven and intelligence-driven adversaries demonstrate that traditional approaches to mitigate cyber threats are becoming ineffective. Big Data in wide areas also freely available for Marketing, Criminal activities and Fraud detection, Epidemic Intelligence etc. It is tedious job to analysis big data on traditional database, NoSQL have been developed as a scalable platform to store and process large amount of data. In this paper, different types of attacks on big data, its storage mechanism and real time analytics approaches are discussed.Also taking social media data as a big data, studies different social network attacks and provided a problem statement based on the study.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1