The ticketing system of public transport system is mainly manual and in some areas semi-automatic which is tedious, stressful and involves a lot of time, effort & manpower. Besides, this is highly inadequate to handle the humongous commuter volume. The traveler has to spend lots of time in queue for buying tickets, tokens and smart cards as well as recharging the smart card specifically during picks hours. To get rid of this hurdle we are proposing a Mobile ticketing model for public transport system. In this paper we are using the Cell phone (Mobile) of a commuter. The Mobile Ticketing model comprises of a registered mobile subscription either Prepaid or postpaid for the traveler's identity by scanning mobile phone number at the entrance/exit of the vehicle or stations and deducting the fare from the Mobile number immediately in case of prepaid connection and sending the information to the service provider of the Mobile connection in case of post paid mobile connection.
{"title":"Mobile Ticketing System for Automatic Fare Collection Model for Public Transport","authors":"D. G. Chandra, R. Prakash, S. Lamdharia","doi":"10.1109/CICN.2013.131","DOIUrl":"https://doi.org/10.1109/CICN.2013.131","url":null,"abstract":"The ticketing system of public transport system is mainly manual and in some areas semi-automatic which is tedious, stressful and involves a lot of time, effort & manpower. Besides, this is highly inadequate to handle the humongous commuter volume. The traveler has to spend lots of time in queue for buying tickets, tokens and smart cards as well as recharging the smart card specifically during picks hours. To get rid of this hurdle we are proposing a Mobile ticketing model for public transport system. In this paper we are using the Cell phone (Mobile) of a commuter. The Mobile Ticketing model comprises of a registered mobile subscription either Prepaid or postpaid for the traveler's identity by scanning mobile phone number at the entrance/exit of the vehicle or stations and deducting the fare from the Mobile number immediately in case of prepaid connection and sending the information to the service provider of the Mobile connection in case of post paid mobile connection.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123810212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recent advances in the trend of development of small and powerful battery backed sensor node. These sensor nodes are deployed for various surveillance activities and thus forming a network. There has been numerous amount of research work for the development of power efficient routing protocols for the network of these limited power sensor nodes. This paper provides a survey of these routing protocols on basis and concludes with grading each protocol on energy saving.
{"title":"Evaluation of Wireless Sensor Network Routing Protocols with Respect to Power Efficiency","authors":"Shounak Chakraborty, Ajoy Kumar Khan","doi":"10.1109/CICN.2013.36","DOIUrl":"https://doi.org/10.1109/CICN.2013.36","url":null,"abstract":"Recent advances in the trend of development of small and powerful battery backed sensor node. These sensor nodes are deployed for various surveillance activities and thus forming a network. There has been numerous amount of research work for the development of power efficient routing protocols for the network of these limited power sensor nodes. This paper provides a survey of these routing protocols on basis and concludes with grading each protocol on energy saving.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122278847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social Network Analysis (SNA) is a technique for modeling the communication patterns between individuals in a way that illuminates the structure of the network and the importance of individuals within the network. SNA has gained a recent importance due to the appearance of various web 2.0 platforms like blogs, wikis, content and media sharing sites which consists of a huge collection of data. These data are vast, noisy, unstructured and dynamic in nature, so mining is performed on such data by various SNA methods and tools in order to extract actionable patterns which are useful for business, consumers, and users. This study is a part of the growing body of research on Social Network Analysis and uncovers hidden relationships in a facebook network. It gives a prospective view of the hidden attributes of the high degree nodes (users having greater number of friends) in the Facebook network. Results show that there is little association among high degree nodes.
{"title":"Analysis of Facebook Social Network","authors":"N. Akhtar, Hira Javed, Geetanjali Sengar","doi":"10.1109/CICN.2013.99","DOIUrl":"https://doi.org/10.1109/CICN.2013.99","url":null,"abstract":"Social Network Analysis (SNA) is a technique for modeling the communication patterns between individuals in a way that illuminates the structure of the network and the importance of individuals within the network. SNA has gained a recent importance due to the appearance of various web 2.0 platforms like blogs, wikis, content and media sharing sites which consists of a huge collection of data. These data are vast, noisy, unstructured and dynamic in nature, so mining is performed on such data by various SNA methods and tools in order to extract actionable patterns which are useful for business, consumers, and users. This study is a part of the growing body of research on Social Network Analysis and uncovers hidden relationships in a facebook network. It gives a prospective view of the hidden attributes of the high degree nodes (users having greater number of friends) in the Facebook network. Results show that there is little association among high degree nodes.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today's business rely completely on IT network and their connections with the global Internet as the backbone of their sales, sourcing, operating and financial systems. In a similar way many aspects of our lives rely on internet and computers including communications (email, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation), government (birth/death records, Social Security, licensing, tax records), finance (bank accounts, loans, electronic paychecks), medicine (equipment, medical records), and education (virtual classrooms, online report cards, research). In this 21st century no government, business, nongovernmental organizations are purely invulnerable to the cyber attacks. Password based attacks are more popular kinds of attacks that can harm the firm/organization. So, here we present the prevention of a password based attacks. Our main focus was to know about the security breaches in an organization and how are they handled by them. Inspired by such facts, the project revolves around security breaches in the organization and their respective counter measures.
{"title":"Security Breaches in an Organization and Their Countermeasures","authors":"Pavitra Chauhan, Nikita Singh, N. Chandra","doi":"10.1109/CICN.2013.79","DOIUrl":"https://doi.org/10.1109/CICN.2013.79","url":null,"abstract":"Today's business rely completely on IT network and their connections with the global Internet as the backbone of their sales, sourcing, operating and financial systems. In a similar way many aspects of our lives rely on internet and computers including communications (email, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation), government (birth/death records, Social Security, licensing, tax records), finance (bank accounts, loans, electronic paychecks), medicine (equipment, medical records), and education (virtual classrooms, online report cards, research). In this 21st century no government, business, nongovernmental organizations are purely invulnerable to the cyber attacks. Password based attacks are more popular kinds of attacks that can harm the firm/organization. So, here we present the prevention of a password based attacks. Our main focus was to know about the security breaches in an organization and how are they handled by them. Inspired by such facts, the project revolves around security breaches in the organization and their respective counter measures.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Cloud computing environment is rising as a natural platform to provide support to online systems. Therefore, there is a need to redefine and redesign the whole educational system which meets the current educational need in the light of cloud. The advent of computers with sophisticated software has made it possible to solve many complex problems very fast and at a lower cost. This paper introduces the characteristics of the current E-Learning and then analyses the concept of cloud computing and describes the architecture of cloud computing platform by combining the features of E-Learning. The authors have tried to introduce cloud computing to e-learning, build an e-learning cloud, and make an active research and exploration in this area. The present scenario of e-learning has certain limitations to it, in order to overcome those limitations there is a paradigm shift in internet based e-learning to the cloud environment.
{"title":"Impact of Cloud on E-Learning","authors":"Kritika Verma, M. A. Rizvi","doi":"10.1109/CICN.2013.105","DOIUrl":"https://doi.org/10.1109/CICN.2013.105","url":null,"abstract":"The Cloud computing environment is rising as a natural platform to provide support to online systems. Therefore, there is a need to redefine and redesign the whole educational system which meets the current educational need in the light of cloud. The advent of computers with sophisticated software has made it possible to solve many complex problems very fast and at a lower cost. This paper introduces the characteristics of the current E-Learning and then analyses the concept of cloud computing and describes the architecture of cloud computing platform by combining the features of E-Learning. The authors have tried to introduce cloud computing to e-learning, build an e-learning cloud, and make an active research and exploration in this area. The present scenario of e-learning has certain limitations to it, in order to overcome those limitations there is a paradigm shift in internet based e-learning to the cloud environment.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128222748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes a dynamic reconfiguration algorithm for a hybrid fiber wireless network, which takes advantage of dynamic reconfiguration in WDM based optical networks to provide bandwidth on the fly. The WDM technique for optical networks allows network operators to extend the existing capacity of passive optical networks manifolds. However presently, WDM networks were used mostly in long haul backbone networks and recently have been put to use in metropolitan networks (MAN). But till now not much work has been done on use of WDM networks in MAN. We use wireless technology to solve the Last mile problem of WDM networks. Wireless networks on the other hand are always constrained by need of bandwidth and we use WDM based optical networks to provide that. So both network technologies complement each other. Our proposed approach allows providing bandwidth on demand. It also allows for service differentiation by service providers, and sharing of infrastructure by several service providers.
{"title":"Hybrid Optical Wireless Access Networks","authors":"A. Katara, A. Bapat, A. Selokar, R. Chalse","doi":"10.1109/CICN.2013.41","DOIUrl":"https://doi.org/10.1109/CICN.2013.41","url":null,"abstract":"This paper describes a dynamic reconfiguration algorithm for a hybrid fiber wireless network, which takes advantage of dynamic reconfiguration in WDM based optical networks to provide bandwidth on the fly. The WDM technique for optical networks allows network operators to extend the existing capacity of passive optical networks manifolds. However presently, WDM networks were used mostly in long haul backbone networks and recently have been put to use in metropolitan networks (MAN). But till now not much work has been done on use of WDM networks in MAN. We use wireless technology to solve the Last mile problem of WDM networks. Wireless networks on the other hand are always constrained by need of bandwidth and we use WDM based optical networks to provide that. So both network technologies complement each other. Our proposed approach allows providing bandwidth on demand. It also allows for service differentiation by service providers, and sharing of infrastructure by several service providers.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133680010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Performance is a critical issue in setup of network center in any academia. In a research institute, a moment of time is precious for analysis, design, research and development. In this work, an efficient approach, which based on firewall, complaint handling system, LDAP server and spanning tree protocol, is used to set up a network center in ABV-IIITM to provide network facility to researcher, student and faculty in cost-effective and fast-processing way. Here, the Spanning-Tree Protocol is applied in switched networks for a loop free network which open a path for fault tolerant network. That increases 60-70 percent performance in compare to traditional approach used in setup of Network Center. Complaint handling system is a unique characteristic of this network, which ensure transparency and make this network more users friendly.
{"title":"An Efficient Approach to Set Up High Performance Network Center in Academia","authors":"J. Kumar, M. Bhattacharya, B. Pandey","doi":"10.1109/CICN.2013.28","DOIUrl":"https://doi.org/10.1109/CICN.2013.28","url":null,"abstract":"Performance is a critical issue in setup of network center in any academia. In a research institute, a moment of time is precious for analysis, design, research and development. In this work, an efficient approach, which based on firewall, complaint handling system, LDAP server and spanning tree protocol, is used to set up a network center in ABV-IIITM to provide network facility to researcher, student and faculty in cost-effective and fast-processing way. Here, the Spanning-Tree Protocol is applied in switched networks for a loop free network which open a path for fault tolerant network. That increases 60-70 percent performance in compare to traditional approach used in setup of Network Center. Complaint handling system is a unique characteristic of this network, which ensure transparency and make this network more users friendly.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116436655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this work, we present a analytical hierarchy process (AHP) for computing trust in the vehicular ad hoc networks (VANETs). AHP based trust management provides a lightweight security alternative to existing security techniques. Trust Management in VANETs is required to broadcast of selfish or malicious messages and also enable other vehicles to filter out such messages. A trust management system has ability to cope with sparsity of direct interactions. To evaluate the trust, we introduce the AHP based technique constitutes the combination of direct, reputation and indirect trust technique. The AHP is also used to coalesce various recommendation opinions from neighbour vehicles through exchanges of messages. Result shows that the scheme is lightweight and completes in order of milliseconds.
{"title":"AHP Based Trust Model in VANETs","authors":"Deepika Saraswat, B. Chaurasia","doi":"10.1109/CICN.2013.86","DOIUrl":"https://doi.org/10.1109/CICN.2013.86","url":null,"abstract":"In this work, we present a analytical hierarchy process (AHP) for computing trust in the vehicular ad hoc networks (VANETs). AHP based trust management provides a lightweight security alternative to existing security techniques. Trust Management in VANETs is required to broadcast of selfish or malicious messages and also enable other vehicles to filter out such messages. A trust management system has ability to cope with sparsity of direct interactions. To evaluate the trust, we introduce the AHP based technique constitutes the combination of direct, reputation and indirect trust technique. The AHP is also used to coalesce various recommendation opinions from neighbour vehicles through exchanges of messages. Result shows that the scheme is lightweight and completes in order of milliseconds.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134457479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Electric power simulation system can carry on the simulation of power system, it can help managers to make decisions in the event of a disturbance, but the accuracy of the simulation system depends on the simulation parameters. Diversity and variability of the Simulation environment led the parameters must to be correct at any time, correct process depends on the power system operating data. In order to ensure the simulation result closer to actual results to a great extent, using measured data of monitoring platforms is the best choice. In this paper, according to the simulation system parameter correction problem, we designed parameter correction algorithm based on the WAMS's monitor flow data, and developed relevant system, which have been verified by experiments.
{"title":"A Simulation Parameter Correction System Design Based on the Measured Data","authors":"Kan Yunqi, Meng Fanqi","doi":"10.1109/CICN.2013.111","DOIUrl":"https://doi.org/10.1109/CICN.2013.111","url":null,"abstract":"Electric power simulation system can carry on the simulation of power system, it can help managers to make decisions in the event of a disturbance, but the accuracy of the simulation system depends on the simulation parameters. Diversity and variability of the Simulation environment led the parameters must to be correct at any time, correct process depends on the power system operating data. In order to ensure the simulation result closer to actual results to a great extent, using measured data of monitoring platforms is the best choice. In this paper, according to the simulation system parameter correction problem, we designed parameter correction algorithm based on the WAMS's monitor flow data, and developed relevant system, which have been verified by experiments.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A high-speed railway virtual reality system can vividly show the train running process, traction and braking control performance using 3D computer graphics technology. As a major part of virtual reality system, the traction and braking performance have great significance to the effect of the rain running. This paper researches the basic theory of train traction and braking calculation, which can be used to simulate the train running in the virtual reality system. It also introduces the realization process of the virtual simulation based on Direct3D.
{"title":"The Simulation of Traction and Braking Performance for High-Speed Railway Virtual Reality System","authors":"Cong Guan, Long Chang, Huaiyu Xu","doi":"10.1109/CICN.2013.138","DOIUrl":"https://doi.org/10.1109/CICN.2013.138","url":null,"abstract":"A high-speed railway virtual reality system can vividly show the train running process, traction and braking control performance using 3D computer graphics technology. As a major part of virtual reality system, the traction and braking performance have great significance to the effect of the rain running. This paper researches the basic theory of train traction and braking calculation, which can be used to simulate the train running in the virtual reality system. It also introduces the realization process of the virtual simulation based on Direct3D.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130598088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}