首页 > 最新文献

2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)最新文献

英文 中文
Novel Ranking Approach using Pattern Recognition for Ontology in Semantic Search Engine 基于模式识别的语义搜索引擎本体排序新方法
Neera Chaudhary, Suresh Kumar, Ashok Kumar Yadav, Sugandha Chakraverti
As we know, World Wide Web (WWW) has been developing and it’s performance growth is increasing since last few years. So, it requires the need of fast and precise method to reach the information. Ranking is playing an important role to achieve the goal of receiving relevant information. Search Engines have an important component as ranking. It helps user to retrieve the pages that relates to his/her query. Semantic Web (SW) is the extension of WWW. It is a great technology, which helps search engines to retrieve most relevant pages. So, the concept of SW approach is satisfied, only if the results of retrieval are extremely related to user query. Than only, we can consider that due to best ranking schemes user expectations are increasing. Because by accurate result as per the query the scope of knowledge searching increases and make user to view the relevant need for query on top most.
正如我们所知,万维网(WWW)一直在发展,它的性能增长在过去的几年里不断增加。因此,需要快速准确的方法来获取信息。排名对于实现接收相关信息的目标起着重要的作用。搜索引擎的一个重要组成部分是排名。它帮助用户检索与他/她的查询相关的页面。语义网(SW)是WWW的扩展。这是一项伟大的技术,可以帮助搜索引擎检索最相关的页面。因此,只有当检索结果与用户查询极其相关时,才满足软件方法的概念。不仅如此,我们可以认为,由于最佳排名方案,用户的期望正在增加。因为根据查询得到的准确结果增加了知识搜索的范围,使用户最容易查看到查询所需的相关信息。
{"title":"Novel Ranking Approach using Pattern Recognition for Ontology in Semantic Search Engine","authors":"Neera Chaudhary, Suresh Kumar, Ashok Kumar Yadav, Sugandha Chakraverti","doi":"10.1109/ICICT46931.2019.8977705","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977705","url":null,"abstract":"As we know, World Wide Web (WWW) has been developing and it’s performance growth is increasing since last few years. So, it requires the need of fast and precise method to reach the information. Ranking is playing an important role to achieve the goal of receiving relevant information. Search Engines have an important component as ranking. It helps user to retrieve the pages that relates to his/her query. Semantic Web (SW) is the extension of WWW. It is a great technology, which helps search engines to retrieve most relevant pages. So, the concept of SW approach is satisfied, only if the results of retrieval are extremely related to user query. Than only, we can consider that due to best ranking schemes user expectations are increasing. Because by accurate result as per the query the scope of knowledge searching increases and make user to view the relevant need for query on top most.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134633215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Decade on Script Identification from Natural Images/Videos: A Review 自然影像/录像文字识别的十年回顾
Shilpa Mahajan, Rajneesh Rani
Text present in an image provides high level straight forward information about the image/ video in which it is present. Nowadays, analysis of script identification either in the natural image or document image facilitates benefits to the number of important applications. Automatic script identification is a highly challenging task due to various complexities of the text as well as the image. This paper presents a survey on script identification of different scripts across the world. From the survey, it is noted that research in this area is limited to the document images only. Natural images are yet to be explored for automatic script identification.
图像中的文本提供了有关图像/视频的高级直接信息。目前,无论是对自然图像还是文档图像进行文字识别分析,都有利于许多重要的应用。由于文本和图像的各种复杂性,自动脚本识别是一项极具挑战性的任务。本文综述了世界各国对不同文字的文字识别情况。从调查中可以看出,这方面的研究仅限于文件图像。自然图像尚未被用于自动脚本识别。
{"title":"A Decade on Script Identification from Natural Images/Videos: A Review","authors":"Shilpa Mahajan, Rajneesh Rani","doi":"10.1109/ICICT46931.2019.8977630","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977630","url":null,"abstract":"Text present in an image provides high level straight forward information about the image/ video in which it is present. Nowadays, analysis of script identification either in the natural image or document image facilitates benefits to the number of important applications. Automatic script identification is a highly challenging task due to various complexities of the text as well as the image. This paper presents a survey on script identification of different scripts across the world. From the survey, it is noted that research in this area is limited to the document images only. Natural images are yet to be explored for automatic script identification.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"11 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131539898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secret Key Agreement Schemes in IOT Based Wireless Body Area Network 基于物联网的无线体域网络密钥协议方案
S. Hussain, Manoj Kumar
Internet of Things (IOT) is one of the most emerging technologies that have engrossed a lot of opportunities these days. It offers a huge business scope for organizations and open new ventures for many existing sectors. Wireless Body Area Networks (WBAN) is one such emerging field that provides a remote mechanism to monitor and collect patient’s health related data using IOT based wearable bio-sensors. It has a huge potential to enhance health care delivery significantly by using remote monitoring, disease or performance tracking, and related medical procedures. The collected data is highly private in nature and must therefore be protected while being used by the healthcare professionals and during remote storage in Electronic Healthcare Repository (EHR). Traditional cryptographic techniques are highly greedy in terms of computation, storage, and energy consumption. Their implementations are found to be unsuitable in IOT devices which are highly resource constraints. This work is an effort to analyze security architecture of IOT based WBAN on the basis of security key agreement schemes.
物联网(IOT)是当今最新兴的技术之一,它吸引了很多机会。它为组织提供了巨大的业务范围,并为许多现有部门开辟了新的风险投资。无线体域网络(WBAN)就是这样一个新兴领域,它提供了一种远程机制,利用基于物联网的可穿戴生物传感器来监测和收集患者的健康相关数据。它具有巨大的潜力,可以通过使用远程监测、疾病或绩效跟踪以及相关的医疗程序来显著增强医疗保健服务。所收集的数据本质上是高度私有的,因此在由医疗保健专业人员使用和远程存储在电子医疗存储库(EHR)期间必须加以保护。传统的加密技术在计算、存储和能耗方面都非常贪婪。它们的实现被发现不适合高度资源限制的物联网设备。本文基于安全密钥协议方案,分析了基于物联网的无线宽带网络的安全体系结构。
{"title":"Secret Key Agreement Schemes in IOT Based Wireless Body Area Network","authors":"S. Hussain, Manoj Kumar","doi":"10.1109/ICICT46931.2019.8977632","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977632","url":null,"abstract":"Internet of Things (IOT) is one of the most emerging technologies that have engrossed a lot of opportunities these days. It offers a huge business scope for organizations and open new ventures for many existing sectors. Wireless Body Area Networks (WBAN) is one such emerging field that provides a remote mechanism to monitor and collect patient’s health related data using IOT based wearable bio-sensors. It has a huge potential to enhance health care delivery significantly by using remote monitoring, disease or performance tracking, and related medical procedures. The collected data is highly private in nature and must therefore be protected while being used by the healthcare professionals and during remote storage in Electronic Healthcare Repository (EHR). Traditional cryptographic techniques are highly greedy in terms of computation, storage, and energy consumption. Their implementations are found to be unsuitable in IOT devices which are highly resource constraints. This work is an effort to analyze security architecture of IOT based WBAN on the basis of security key agreement schemes.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"58 30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stockwell Transform Based Algorithm for Processing of Digital Communication Signals to Detect Superimposed Noise Disturbances 基于Stockwell变换的数字通信信号处理算法检测叠加噪声干扰
Monika Mathur, Vivek Upadhyaya, Rahul Srivastava
This research work presents a method using Stockwell transform which is aimed to process the communication signals to detect noise disturbances superimposed on the signals in the communication channel or at the transmitter or the receiver stations. The communication signals with noise disturbances are simulated with the help of mathematical relations. The communication signals with noise disturbance are decomposed with the help of Stockwell Transform and S-matrix is obtained. A summing of absolute values curve is proposed and calculated by summing of absolute values of each columns of S-matrix and plotted against time. A median curve is also proposed and calculated using median of absolute values of each columns of S- matrix. Proposed maximum absolute values plot is calculated using maximum values of absolute values of each columns of S- matrix. On comparing these plots of signal having noise disturbance with corresponding plots of pure sinusoidal communication signal, superimposed noise disturbances have been detected successfully. Proposed study is performed using the MATLAB software.
本研究提出了一种利用斯托克韦尔变换对通信信号进行处理的方法,以检测叠加在通信信道或发射台或接收机信号上的噪声干扰。利用数学关系对有噪声干扰的通信信号进行了仿真。利用斯托克韦尔变换对含噪声干扰的通信信号进行分解,得到s矩阵。通过对s矩阵各列的绝对值求和,并按时间绘制绝对值求和曲线,提出了绝对值求和曲线。利用S-矩阵各列绝对值的中位数,提出并计算了中位数曲线。利用S-矩阵各列绝对值的最大值,计算出建议的最大绝对值图。将这些有噪声干扰的信号图与纯正弦通信信号的相应图进行比较,成功地检测出了叠加噪声干扰。本研究采用MATLAB软件进行。
{"title":"Stockwell Transform Based Algorithm for Processing of Digital Communication Signals to Detect Superimposed Noise Disturbances","authors":"Monika Mathur, Vivek Upadhyaya, Rahul Srivastava","doi":"10.1109/ICICT46931.2019.8977706","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977706","url":null,"abstract":"This research work presents a method using Stockwell transform which is aimed to process the communication signals to detect noise disturbances superimposed on the signals in the communication channel or at the transmitter or the receiver stations. The communication signals with noise disturbances are simulated with the help of mathematical relations. The communication signals with noise disturbance are decomposed with the help of Stockwell Transform and S-matrix is obtained. A summing of absolute values curve is proposed and calculated by summing of absolute values of each columns of S-matrix and plotted against time. A median curve is also proposed and calculated using median of absolute values of each columns of S- matrix. Proposed maximum absolute values plot is calculated using maximum values of absolute values of each columns of S- matrix. On comparing these plots of signal having noise disturbance with corresponding plots of pure sinusoidal communication signal, superimposed noise disturbances have been detected successfully. Proposed study is performed using the MATLAB software.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114067212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Skin Lesions by using Extended-Incremental Convolutional Neural Network 基于扩展增量卷积神经网络的皮肤病变分类
Ankit Chopade
Order of skin sores in different dangerous sort assumes a pivotal job in diagnosing different, neighborhood and quality related, ailments in the field of therapeutic science. Grouping of these sores in a few carcinogenic sorts i.e Melanoma(MEL), Melanomic Neves(NV), Basal Cell Carcinoma(BCC), Actinic Keratosis(AKIEC), Benign Keratosis(BKL )Dermatofibroma(DF) and Vascular Lesion(VASC) gives some understanding about the infection. Skin malignancy is the most deadly kind of malignancy however in the event that these infections are recognized in beginning times, at that point patients can have a high recurrence of recuperation. A few ways to deal with programmed arrangement have been investigated by numerous creators, utilizing different systems and methodologies however this paper proposed an extended version of novel Incremental methodology for Convolution Neural Network on dermoscopy pictures for characterization of skin sores in different skin malignant growths. This is a summed up methodologym subsequently can be executed in different calculations for accomplishing higher exactness. Worldwide Skin Imaging Collaboration (ISIC) 2018 test dataset is utilized in this paper. The methodology utilized in this paper yields an accuracy of more than 95%.
不同危险类型皮肤溃疡的顺序在治疗科学领域中在诊断不同的、邻近的和质量相关的疾病中起着举足轻重的作用。将这些溃疡分为几种致癌类型,即黑色素瘤(MEL)、黑色素瘤(NV)、基底细胞癌(BCC)、光化性角化病(AKIEC)、良性角化病(BKL)、皮肤纤维瘤(DF)和血管病变(VASC),对感染有一些了解。皮肤恶性肿瘤是最致命的恶性肿瘤然而如果这些感染在一开始就被识别出来,那么病人就会有很高的复发率。许多创造者利用不同的系统和方法研究了几种处理程序化排列的方法,然而本文提出了一种扩展版本的新颖增量方法,用于皮肤镜图像上的卷积神经网络,以表征不同皮肤恶性生长的皮肤溃疡。这是一个总结的方法,可以在不同的计算中执行,以达到更高的精度。本文使用的是全球皮肤成像协作(ISIC) 2018测试数据集。本文所采用的方法准确度超过95%。
{"title":"Classification of Skin Lesions by using Extended-Incremental Convolutional Neural Network","authors":"Ankit Chopade","doi":"10.1109/ICICT46931.2019.8977638","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977638","url":null,"abstract":"Order of skin sores in different dangerous sort assumes a pivotal job in diagnosing different, neighborhood and quality related, ailments in the field of therapeutic science. Grouping of these sores in a few carcinogenic sorts i.e Melanoma(MEL), Melanomic Neves(NV), Basal Cell Carcinoma(BCC), Actinic Keratosis(AKIEC), Benign Keratosis(BKL )Dermatofibroma(DF) and Vascular Lesion(VASC) gives some understanding about the infection. Skin malignancy is the most deadly kind of malignancy however in the event that these infections are recognized in beginning times, at that point patients can have a high recurrence of recuperation. A few ways to deal with programmed arrangement have been investigated by numerous creators, utilizing different systems and methodologies however this paper proposed an extended version of novel Incremental methodology for Convolution Neural Network on dermoscopy pictures for characterization of skin sores in different skin malignant growths. This is a summed up methodologym subsequently can be executed in different calculations for accomplishing higher exactness. Worldwide Skin Imaging Collaboration (ISIC) 2018 test dataset is utilized in this paper. The methodology utilized in this paper yields an accuracy of more than 95%.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Attacks, Requirements and Authentication Schemes in VANET VANET中的安全攻击、需求和认证方案
Amit kumar Goyal, Arun Kumar Tripathi, G. Agarwal
Vehicular Ad-hoc Networks (VANET), the promising technique, is getting attention for managing the traffic efficiently and making the road safe. The topographies and its vast applications varying from road safety, to the traffic management, payment service to infotainment. VANETs are characterized as a self-organized, distributed, highly mobile, dynamic topology, unconstrained power, computational and storage networks. The communication in VANET is performed in open-access environment which demands the security issues must be deal with utter importance. Security requirements includes authentication, availability, message confidentiality, message integrity, data availability, access control, privacy, message non-repudiation and real time guarantees of message delivery. In order to have a secure and efficient VANET infrastructure, an extensive overview of characteristics, challenges, security attacks and requirements must be dealt with. The prime objective of this paper is to provide a classification of security requirements, security characteristics and challenges.
车辆自组织网络(Vehicular Ad-hoc Networks, VANET)作为一种很有前途的技术,在有效管理交通和保证道路安全方面正受到人们的关注。地形及其广泛的应用范围从道路安全,到交通管理,支付服务到信息娱乐。vanet的特点是自组织、分布式、高度移动、动态拓扑、不受约束的功率、计算和存储网络。VANET通信是在开放接入环境下进行的,因此安全问题必须得到高度重视。安全需求包括身份验证、可用性、消息机密性、消息完整性、数据可用性、访问控制、隐私性、消息不可否认性和消息传递的实时保证。为了拥有一个安全高效的VANET基础设施,必须对特征、挑战、安全攻击和需求进行广泛的概述。本文的主要目的是对安全需求、安全特征和挑战进行分类。
{"title":"Security Attacks, Requirements and Authentication Schemes in VANET","authors":"Amit kumar Goyal, Arun Kumar Tripathi, G. Agarwal","doi":"10.1109/ICICT46931.2019.8977656","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977656","url":null,"abstract":"Vehicular Ad-hoc Networks (VANET), the promising technique, is getting attention for managing the traffic efficiently and making the road safe. The topographies and its vast applications varying from road safety, to the traffic management, payment service to infotainment. VANETs are characterized as a self-organized, distributed, highly mobile, dynamic topology, unconstrained power, computational and storage networks. The communication in VANET is performed in open-access environment which demands the security issues must be deal with utter importance. Security requirements includes authentication, availability, message confidentiality, message integrity, data availability, access control, privacy, message non-repudiation and real time guarantees of message delivery. In order to have a secure and efficient VANET infrastructure, an extensive overview of characteristics, challenges, security attacks and requirements must be dealt with. The prime objective of this paper is to provide a classification of security requirements, security characteristics and challenges.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131287463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Energy Analysis of University Department Building Using eQUEST Software 基于eQUEST软件的高校系楼能耗分析
Naman Garg, B. Saxena, Sanjeev Mishra
Buildings are one of the major contributors to the consumption of electrical energy generated by power plants. Taking the context of India, out of total generated energy 30% is consumed by building sectors. Therefore, this paper focuses on reducing the total energy demand for a building by applying several improvements like reducing loads, applying insulation, etc. Optimum demand of a department of University is estimated using eQUEST software version 3.65.7175 in this research and comparative results are obtained. The present research focuses on only connected load and improvement methods have been suggested which can save a total of about Rs. 31,507/-. An estimated payback period of 7.9 year is also calculated for the replacement of new equipment’s with the present one.
建筑物是发电厂产生的电能消耗的主要来源之一。以印度为例,建筑行业消耗了总发电量的30%。因此,本文的重点是通过减少负荷,应用绝缘等几种改进来减少建筑物的总能源需求。本研究利用eQUEST软件版本3.65.7175对某高校某院系的最优需求进行估算,并得出对比结果。目前的研究主要集中在连接负载上,提出了改进方法,总共可节省约31,507卢比/-。以现有设备替换新设备的估计投资回收期为7.9年。
{"title":"Energy Analysis of University Department Building Using eQUEST Software","authors":"Naman Garg, B. Saxena, Sanjeev Mishra","doi":"10.1109/ICICT46931.2019.8977663","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977663","url":null,"abstract":"Buildings are one of the major contributors to the consumption of electrical energy generated by power plants. Taking the context of India, out of total generated energy 30% is consumed by building sectors. Therefore, this paper focuses on reducing the total energy demand for a building by applying several improvements like reducing loads, applying insulation, etc. Optimum demand of a department of University is estimated using eQUEST software version 3.65.7175 in this research and comparative results are obtained. The present research focuses on only connected load and improvement methods have been suggested which can save a total of about Rs. 31,507/-. An estimated payback period of 7.9 year is also calculated for the replacement of new equipment’s with the present one.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123475119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of MORTO:Multi-objective Regression test optimization MORTO分析:多目标回归检验优化
Neha Gupta, Arun Sharma, M. K. Pachariya
Whenever a change is done in software, regression testing is done to check that a recent change in code has not created any unwanted defects in the system. As size of regression test suite is very large, optimization algorithms help in selecting, minimizing and prioritizing test suites. Main aim is maximize fault detection ability with less number of test cases. Optimization techniques of various types are available but Multiobjective algorithms are the best choice to use as testing is dependent on many adequacy criteria or surrogates. In this paper, authors have carried out study on research papers where multi-objective algorithms are used in regression testing. Then comparison of performance of multi-objective algorithms is done to identify the best suitable multi-objective algorithm for regression testing.
无论何时在软件中进行更改,都要进行回归测试以检查代码中最近的更改是否在系统中创建了任何不想要的缺陷。由于回归测试套件的规模非常大,优化算法可以帮助选择、最小化测试套件并确定测试套件的优先级。主要目的是在较少的测试用例的情况下最大限度地提高故障检测能力。各种优化技术都是可用的,但多目标算法是使用的最佳选择,因为测试依赖于许多充分性标准或替代品。本文对回归检验中使用多目标算法的研究论文进行了研究。然后对多目标算法进行性能比较,确定最适合进行回归测试的多目标算法。
{"title":"Analysis of MORTO:Multi-objective Regression test optimization","authors":"Neha Gupta, Arun Sharma, M. K. Pachariya","doi":"10.1109/ICICT46931.2019.8977675","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977675","url":null,"abstract":"Whenever a change is done in software, regression testing is done to check that a recent change in code has not created any unwanted defects in the system. As size of regression test suite is very large, optimization algorithms help in selecting, minimizing and prioritizing test suites. Main aim is maximize fault detection ability with less number of test cases. Optimization techniques of various types are available but Multiobjective algorithms are the best choice to use as testing is dependent on many adequacy criteria or surrogates. In this paper, authors have carried out study on research papers where multi-objective algorithms are used in regression testing. Then comparison of performance of multi-objective algorithms is done to identify the best suitable multi-objective algorithm for regression testing.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127153348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Light Weighted Mutual Authentication and Dynamic Key Encryption for IoT Devices Applications 物联网设备应用的轻量级相互认证和动态密钥加密
Anuj Sachan, D. N. Kumar, Adwiteeya Adwiteeya
The unambiguous and unseamed integration of mixed and non-identical end systems are offered by the Internet of Things (IoT). It has been greatly used in many applications such as network automobile, micro-controller, smart farming, smart retail, wearable devices, and industrial internet. In these applications, a substantial number of IoT devices are established that can sense, actuate, evaluate and publicize. There could be a possible violation of the IoT devices also by capturing the servers or the sensors that is, an intruder may affect the sensor and record false data, or an intruder may capture the servers and incorrectly actuate sensors. Therefore, there is significant need of an strong but light weighted mutual authentication scheme. Following this, authentication is done before the data exchange among sensors and the server. Moreover, due to limited capacity of batteries in IoT devices, the mutual authentication protocol is expected to be light weighted. This work proposed an authentication scheme by using the dynamic cipher along with the existing public key encryption, where the client generates the key dynamically, which can only be solved by brute force. The key which is dynamically generated using random function is used for encryption and decryption. Further, an enhancement to the security is proposed by introducing dynamic cipher based authentication. The proposed scheme is evaluated in software environments i.e., IPv6 over low-power wireless personal area networks (6LoWPAN) which is widely used for IoT applications.
物联网(IoT)为混合和非相同的终端系统提供了明确和无缝的集成。在网络汽车、微控制器、智能农业、智能零售、可穿戴设备、工业互联网等领域得到广泛应用。在这些应用中,建立了大量可以感知、驱动、评估和发布的物联网设备。也可能通过捕获服务器或传感器来侵犯物联网设备,也就是说,入侵者可能会影响传感器并记录错误数据,或者入侵者可能会捕获服务器并错误地启动传感器。因此,迫切需要一种强而轻的相互认证方案。在此之后,在传感器和服务器之间交换数据之前进行身份验证。此外,由于物联网设备中电池的容量有限,预计相互认证协议将是轻量级的。本文提出了一种将动态密码与现有公钥加密结合使用的认证方案,其中客户端动态生成密钥,只能通过暴力破解来解决。使用随机函数动态生成的密钥进行加密和解密。在此基础上,提出了一种基于动态密码的认证方法来提高安全性。所提出的方案在软件环境中进行了评估,即低功耗无线个人区域网络(6LoWPAN)上的IPv6,该网络广泛用于物联网应用。
{"title":"Light Weighted Mutual Authentication and Dynamic Key Encryption for IoT Devices Applications","authors":"Anuj Sachan, D. N. Kumar, Adwiteeya Adwiteeya","doi":"10.1109/ICICT46931.2019.8977672","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977672","url":null,"abstract":"The unambiguous and unseamed integration of mixed and non-identical end systems are offered by the Internet of Things (IoT). It has been greatly used in many applications such as network automobile, micro-controller, smart farming, smart retail, wearable devices, and industrial internet. In these applications, a substantial number of IoT devices are established that can sense, actuate, evaluate and publicize. There could be a possible violation of the IoT devices also by capturing the servers or the sensors that is, an intruder may affect the sensor and record false data, or an intruder may capture the servers and incorrectly actuate sensors. Therefore, there is significant need of an strong but light weighted mutual authentication scheme. Following this, authentication is done before the data exchange among sensors and the server. Moreover, due to limited capacity of batteries in IoT devices, the mutual authentication protocol is expected to be light weighted. This work proposed an authentication scheme by using the dynamic cipher along with the existing public key encryption, where the client generates the key dynamically, which can only be solved by brute force. The key which is dynamically generated using random function is used for encryption and decryption. Further, an enhancement to the security is proposed by introducing dynamic cipher based authentication. The proposed scheme is evaluated in software environments i.e., IPv6 over low-power wireless personal area networks (6LoWPAN) which is widely used for IoT applications.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129539735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of Various Classification Methods 各种分类方法分析
Vidushi, Manisha Agarwal, Rekha Rajoria
The process of gaining knowledge from enormous amount of data is called data mining. This paper uses the Weka tool to compare different types of classification methods. Decision tree, Multilayer perceptron, Naïve Bayes, J48 algorithms are used for classification analysis in terms of correctly and incorrectly classified instances and Area of ROC curve. Test option selected is cross validation with 10 folds. Datasets used breast cancer, diabetes from health care industry. In health care industry huge data is available but not so much knowledge extracted.
从海量数据中获取知识的过程被称为数据挖掘。本文使用Weka工具对不同类型的分类方法进行比较。使用决策树、多层感知器、Naïve贝叶斯、J48算法对分类实例的正确和错误分类以及ROC曲线的面积进行分类分析。选择的测试选项是10次交叉验证。数据集使用了来自医疗保健行业的乳腺癌、糖尿病。在医疗保健行业有大量的数据,但没有那么多的知识被提取出来。
{"title":"Analysis of Various Classification Methods","authors":"Vidushi, Manisha Agarwal, Rekha Rajoria","doi":"10.1109/ICICT46931.2019.8977688","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977688","url":null,"abstract":"The process of gaining knowledge from enormous amount of data is called data mining. This paper uses the Weka tool to compare different types of classification methods. Decision tree, Multilayer perceptron, Naïve Bayes, J48 algorithms are used for classification analysis in terms of correctly and incorrectly classified instances and Area of ROC curve. Test option selected is cross validation with 10 folds. Datasets used breast cancer, diabetes from health care industry. In health care industry huge data is available but not so much knowledge extracted.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127275558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1