Analyses show that the absorption band position determines the type of mineral radically. The paper proposes a method of applying GA (Genetic Algorithm) to the selection of the uranium mineral band feature sub-set. First, on the fundamental of the correlation between feature-based metrics: information entropy, information gain, symmetrical uncertainty and type space, the GA which is a random search algorithm uses the four standards as fitness functions to select the best feature points. Then set three different sub-intervals, extend the best feature points to the best feature sub-sets. Finally, the best feature sub-sets are used for classification. Experiments show that information gain and symmetrical uncertainty that based on genetic algorithm are better than based on CFS in classification.
{"title":"Application of Uranium Mineral Band Feature Sub-set Selection Based on Genetic Algorithm","authors":"Yiping Tong, Z. Cai, Jia Wu","doi":"10.1109/CICN.2013.137","DOIUrl":"https://doi.org/10.1109/CICN.2013.137","url":null,"abstract":"Analyses show that the absorption band position determines the type of mineral radically. The paper proposes a method of applying GA (Genetic Algorithm) to the selection of the uranium mineral band feature sub-set. First, on the fundamental of the correlation between feature-based metrics: information entropy, information gain, symmetrical uncertainty and type space, the GA which is a random search algorithm uses the four standards as fitness functions to select the best feature points. Then set three different sub-intervals, extend the best feature points to the best feature sub-sets. Finally, the best feature sub-sets are used for classification. Experiments show that information gain and symmetrical uncertainty that based on genetic algorithm are better than based on CFS in classification.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"16 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we have shown how to monitor the water level of water systems such as water tanks, rivers, ground water table, and bore wells remotely. We have also shown that how to control the working of pump automatically and remotely. It can also be used to remotely monitor the flood areas wirelessly and information can be sent to mobile wirelessly. This project is designed to monitor the water level with the help of water level sensors, Zigbee 802.15.4, 74HC14 inverter and GSM technology. Furthermore, it can monitor the quality of water with the help of water quality sensors such as turbidity sensor and dissolved oxygen sensor. In this monitoring system, sensors monitor the water level, dissolved oxygen, turbidity, temperature and pH level of the water at some predefined sensing interval. This approach would help in reducing the water overflow and home power consumption.
{"title":"Real Time Wireless Monitoring and Control of Water Systems Using Zigbee 802.15.4","authors":"S. Maqbool, N. Chandra","doi":"10.1109/CICN.2013.42","DOIUrl":"https://doi.org/10.1109/CICN.2013.42","url":null,"abstract":"In this paper we have shown how to monitor the water level of water systems such as water tanks, rivers, ground water table, and bore wells remotely. We have also shown that how to control the working of pump automatically and remotely. It can also be used to remotely monitor the flood areas wirelessly and information can be sent to mobile wirelessly. This project is designed to monitor the water level with the help of water level sensors, Zigbee 802.15.4, 74HC14 inverter and GSM technology. Furthermore, it can monitor the quality of water with the help of water quality sensors such as turbidity sensor and dissolved oxygen sensor. In this monitoring system, sensors monitor the water level, dissolved oxygen, turbidity, temperature and pH level of the water at some predefined sensing interval. This approach would help in reducing the water overflow and home power consumption.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124837457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Owing to the increasing popularity of wireless sensor networks, they have become attractive targets for malicious attacks. Due to the adhoc nature and openness of wireless sensor networks, they are susceptible to the identity based attacks like spoofing. The traditional approach to address spoofing attacks is to apply cryptographic authentication, spatial signatures etc. This suffers from the disadvantages of overhead, limited power, bandwidth and other resources available along with the high costs of implementation. In this paper, we have proposed a method named Attack Detection and Localization Scheme (ADLS) to detect and localize the identity-based attacks. An improved algorithm for hashing has also been proposed. We named it as Effective Hashing Technique (EHT). It generates the Hash keys to differentiate an attacker from a normal node and to reduce the occurrences of any false positives or negatives. Also, our localization algorithm efficiently finds out the position estimates for the nodes. With the help of this method we can robustly identify the adversaries and localize them to prevent further large scale network malicious attacks like DoS and resource depletion attacks. We present our simulation for 802.15.4 (Zigbee) based real time home security system and analyse its performance based on NS2.
{"title":"A Novel Scheme for Multiple Spoof Attack Detection and Localization on WSN-based Home Security System","authors":"Ulya Sabeel, N. Chandra, S. Dagadi","doi":"10.1109/CICN.2013.81","DOIUrl":"https://doi.org/10.1109/CICN.2013.81","url":null,"abstract":"Owing to the increasing popularity of wireless sensor networks, they have become attractive targets for malicious attacks. Due to the adhoc nature and openness of wireless sensor networks, they are susceptible to the identity based attacks like spoofing. The traditional approach to address spoofing attacks is to apply cryptographic authentication, spatial signatures etc. This suffers from the disadvantages of overhead, limited power, bandwidth and other resources available along with the high costs of implementation. In this paper, we have proposed a method named Attack Detection and Localization Scheme (ADLS) to detect and localize the identity-based attacks. An improved algorithm for hashing has also been proposed. We named it as Effective Hashing Technique (EHT). It generates the Hash keys to differentiate an attacker from a normal node and to reduce the occurrences of any false positives or negatives. Also, our localization algorithm efficiently finds out the position estimates for the nodes. With the help of this method we can robustly identify the adversaries and localize them to prevent further large scale network malicious attacks like DoS and resource depletion attacks. We present our simulation for 802.15.4 (Zigbee) based real time home security system and analyse its performance based on NS2.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126706244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shalini Jain, Anupam Shukla, B. Pandey, Mayank Kumar
To make smart card much faster, we need efficient data structure. Access time of on chip data depends on how and where we stored. Some Data Structure take maximum time and some take minimum time depending on the space and time complexity of data structure. In this work, we have taken some data structures and find that BST is the best suitable data structure for performing smart card operations in compare to other possible data structures.
{"title":"Efficient Data Structure Based Smart Card Implementation","authors":"Shalini Jain, Anupam Shukla, B. Pandey, Mayank Kumar","doi":"10.1109/CICN.2013.102","DOIUrl":"https://doi.org/10.1109/CICN.2013.102","url":null,"abstract":"To make smart card much faster, we need efficient data structure. Access time of on chip data depends on how and where we stored. Some Data Structure take maximum time and some take minimum time depending on the space and time complexity of data structure. In this work, we have taken some data structures and find that BST is the best suitable data structure for performing smart card operations in compare to other possible data structures.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115540200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces a novel object recognition approach based on the Gabor Wavelet representation of the binarized image that makes use of fuzzy logic for determining the 'soft' class label of the color test images with respect to the gray training templates. The fuzzy membership function used is a Generalized Gaussian function whose exponent value is determined empirically. The use of simple computations for assigning the class label to the query image makes the technique computationally effective. The experimental results on 494 color test images from ten object categories from the Caltech database show a high percentage of classification accuracy with only fifteen gray images from each category used for training. The efficiency of our method is established by comparing our results with that of different classifiers and also with Qiu's Content based Image retrieval (CBIR) system for color images.
{"title":"Object Recognition from Color Images by Fuzzy Classification of Gabor Wavelet Features","authors":"Seba Susan, S. Chandna","doi":"10.1109/CICN.2013.69","DOIUrl":"https://doi.org/10.1109/CICN.2013.69","url":null,"abstract":"This paper introduces a novel object recognition approach based on the Gabor Wavelet representation of the binarized image that makes use of fuzzy logic for determining the 'soft' class label of the color test images with respect to the gray training templates. The fuzzy membership function used is a Generalized Gaussian function whose exponent value is determined empirically. The use of simple computations for assigning the class label to the query image makes the technique computationally effective. The experimental results on 494 color test images from ten object categories from the Caltech database show a high percentage of classification accuracy with only fifteen gray images from each category used for training. The efficiency of our method is established by comparing our results with that of different classifiers and also with Qiu's Content based Image retrieval (CBIR) system for color images.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116411250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ankur Kumar Shrivastava, Abhinav Kumar, A. Rai, Nitisha Payal, A. Tiwari
In this modern world of computerization, lots of data is stored in Computer System & hence requirement to save this data increase day by day. There are lots of Standards which organization can follow to make all the information within their organization safe, but to implement an standard is not easy for every organization, especially with organization which are in the stage of evolution. In this Research Paper we will be presenting a solution using Artificial Intelligence Techniques with the help of which small organization can implement these standards at comparatively low price as well as it will also help organization in Information System Risk Management.
{"title":"ISO 27001 Compliance via Artificial Neural Network","authors":"Ankur Kumar Shrivastava, Abhinav Kumar, A. Rai, Nitisha Payal, A. Tiwari","doi":"10.1109/CICN.2013.77","DOIUrl":"https://doi.org/10.1109/CICN.2013.77","url":null,"abstract":"In this modern world of computerization, lots of data is stored in Computer System & hence requirement to save this data increase day by day. There are lots of Standards which organization can follow to make all the information within their organization safe, but to implement an standard is not easy for every organization, especially with organization which are in the stage of evolution. In this Research Paper we will be presenting a solution using Artificial Intelligence Techniques with the help of which small organization can implement these standards at comparatively low price as well as it will also help organization in Information System Risk Management.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129070084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Steganography is the idea of hiding private, confidential, sensitive data or information within something that appears to be nothing out of the normal. In this paper we describe on how one can use the human vision system and pure steganography to increase the size of the data that we want to embed in the image. In this analysis, we focuses on the property of human vision system that help to increase the amount of data hiding in the bitmap (.bmp) and JPEG (.JPG) images practically. In this work, we enhance the work of LSB and try to come out with a better result for both image quality and the amount of data can be hidden inside it. We come out with two approaches; first one is the 3-3-2 approach without any limitations on the type of images being used and can reach up to 33.3% of size of hidden data, and the second one is the 4-4-4 approach which increase the amount up to 50% of hidden data from the size of image but with certain limitations on the type of images chosen.
{"title":"Analysis of Modified LSB Approaches of Hiding Information in Digital Images","authors":"S. Alam, S. Zakariya, M. Rafiq","doi":"10.1109/CICN.2013.66","DOIUrl":"https://doi.org/10.1109/CICN.2013.66","url":null,"abstract":"Steganography is the idea of hiding private, confidential, sensitive data or information within something that appears to be nothing out of the normal. In this paper we describe on how one can use the human vision system and pure steganography to increase the size of the data that we want to embed in the image. In this analysis, we focuses on the property of human vision system that help to increase the amount of data hiding in the bitmap (.bmp) and JPEG (.JPG) images practically. In this work, we enhance the work of LSB and try to come out with a better result for both image quality and the amount of data can be hidden inside it. We come out with two approaches; first one is the 3-3-2 approach without any limitations on the type of images being used and can reach up to 33.3% of size of hidden data, and the second one is the 4-4-4 approach which increase the amount up to 50% of hidden data from the size of image but with certain limitations on the type of images chosen.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126765428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents the design and simulation of a wideband, medium gain, light weight, wide bandwidth pyramidal horn antenna feed for microwave applications. The horn was designed using approximation method to calculate the gain in mat lab and simulated using CST microwave studio. The proposed antenna operates within 1-2 GHz (L-band). The horn is supported by a rectangular wave guide. It is linearly polarized and shows wide bandwidth with a gain of 15.3dB. The horn is excited with the monopole which is loaded with various top hat loading such as rectangular disc, circular disc, annular disc, L-type, T-type, Cone shape, U-shaped plates etc. and checked their performances for return loss as well as bandwidth. The circular disc and annular ring gives the low return loss and wide bandwidth as well as low VSWR. The annular ring gave good VSWR and return loss compared to the circular disc. The far field radiation pattern is obtained as well as Efield & H-field analysis for L-band pyramidal horn has been observed, simulated and optimized using CST Microwave Studio. The simulation results show that the pyramidal horn structure exhibits low VSWR as well as good radiation pattern over L-band.
{"title":"Design, Implementation, Simulation of a Pyramidal Horn Antenna Excited with Various Top-Hat Loaded Monopoles","authors":"Ranjana Manohar Makam, S. Kulkarni","doi":"10.1109/CICN.2013.24","DOIUrl":"https://doi.org/10.1109/CICN.2013.24","url":null,"abstract":"This paper presents the design and simulation of a wideband, medium gain, light weight, wide bandwidth pyramidal horn antenna feed for microwave applications. The horn was designed using approximation method to calculate the gain in mat lab and simulated using CST microwave studio. The proposed antenna operates within 1-2 GHz (L-band). The horn is supported by a rectangular wave guide. It is linearly polarized and shows wide bandwidth with a gain of 15.3dB. The horn is excited with the monopole which is loaded with various top hat loading such as rectangular disc, circular disc, annular disc, L-type, T-type, Cone shape, U-shaped plates etc. and checked their performances for return loss as well as bandwidth. The circular disc and annular ring gives the low return loss and wide bandwidth as well as low VSWR. The annular ring gave good VSWR and return loss compared to the circular disc. The far field radiation pattern is obtained as well as Efield & H-field analysis for L-band pyramidal horn has been observed, simulated and optimized using CST Microwave Studio. The simulation results show that the pyramidal horn structure exhibits low VSWR as well as good radiation pattern over L-band.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130597098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Our study is about Vendor Management System for Steria. We have collected both primary and secondary data. We have collected the primary data through questionnaires. In this method a questionnaire is sent to the persons concerned with a request to answer the question and return the questionnaire. The analysis is done on the basis of secondary data that is concerned about duplicate payments and delayed payments.
{"title":"Case Study: Steria's Vendor Management System","authors":"Nandita Mishra, J. Patel, S. S. Sarangdevot","doi":"10.1109/CICN.2013.128","DOIUrl":"https://doi.org/10.1109/CICN.2013.128","url":null,"abstract":"Our study is about Vendor Management System for Steria. We have collected both primary and secondary data. We have collected the primary data through questionnaires. In this method a questionnaire is sent to the persons concerned with a request to answer the question and return the questionnaire. The analysis is done on the basis of secondary data that is concerned about duplicate payments and delayed payments.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124160765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
WiMAX is a broadband wireless technology uses radio transmission for high speed direct access to internet. It is similar to Wi-Fi in working but differs in coverage area, bandwidth and many other aspects. The work discusses various security challenges of WiMAX. Moreover, traffic analysis at different packet length is also presented over IEEE 802.16(e) network so as to give a clear picture of traffic flow in a WiMAX network.
{"title":"Traffic Analysis for WiMAX","authors":"A. Bhatele, Ramesh Parajuli, B. Chaurasia","doi":"10.1109/CICN.2013.39","DOIUrl":"https://doi.org/10.1109/CICN.2013.39","url":null,"abstract":"WiMAX is a broadband wireless technology uses radio transmission for high speed direct access to internet. It is similar to Wi-Fi in working but differs in coverage area, bandwidth and many other aspects. The work discusses various security challenges of WiMAX. Moreover, traffic analysis at different packet length is also presented over IEEE 802.16(e) network so as to give a clear picture of traffic flow in a WiMAX network.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121658356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}