首页 > 最新文献

2012 World Congress on Information and Communication Technologies最新文献

英文 中文
An approach to increase the wireless sensor network lifetime 一种提高无线传感器网络寿命的方法
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409128
Dr Nikhil Kumar Marriwala, P. Rathee
A wireless sensor network consist of small devices, called sensor nodes that are equipped with sensors to monitor the physical and environmental conditions such as pressure, temperature, humidity, motion, speed etc. The nodes in the wireless sensor network were battery powered, so one of the important issues in wireless sensor network is the inherent limited battery power within network sensor nodes. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of sensor networks so if the power exhausted node would quit from the network, and it overall affect the network lifetime. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of applications and protocols for sensor networks. In this paper there is improvement of lifetime of wireless sensor network in terms increasing alive nodes in network by using a different approach to select cluster head. The cluster head selection is based on the basis of maximum residual energy and minimum distance and chooses a optimal pat between the cluster heads to transmit to the base station.
无线传感器网络由称为传感器节点的小型设备组成,这些设备配备了传感器来监测物理和环境条件,如压力、温度、湿度、运动、速度等。无线传感器网络中的节点是由电池供电的,因此无线传感器网络中的一个重要问题是网络传感器节点内固有的有限电池电量。最小化能量耗散和最大化网络寿命是传感器网络设计中的重要问题,当耗尽能量的节点退出网络时,将会影响网络的整体寿命。最小化能量消耗和最大化网络寿命是传感器网络应用和协议设计中的重要问题。本文采用一种不同的簇头选择方法,从增加网络活跃节点的角度提高了无线传感器网络的生存期。簇头选择基于最大剩余能量和最小距离,并在簇头之间选择最优部分发送到基站。
{"title":"An approach to increase the wireless sensor network lifetime","authors":"Dr Nikhil Kumar Marriwala, P. Rathee","doi":"10.1109/WICT.2012.6409128","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409128","url":null,"abstract":"A wireless sensor network consist of small devices, called sensor nodes that are equipped with sensors to monitor the physical and environmental conditions such as pressure, temperature, humidity, motion, speed etc. The nodes in the wireless sensor network were battery powered, so one of the important issues in wireless sensor network is the inherent limited battery power within network sensor nodes. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of sensor networks so if the power exhausted node would quit from the network, and it overall affect the network lifetime. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of applications and protocols for sensor networks. In this paper there is improvement of lifetime of wireless sensor network in terms increasing alive nodes in network by using a different approach to select cluster head. The cluster head selection is based on the basis of maximum residual energy and minimum distance and chooses a optimal pat between the cluster heads to transmit to the base station.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121882618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Collaboration using Instant Messaging tool: A chat log analysis 使用即时通讯工具的协作:聊天日志分析
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409225
Min Gu, Lixin Shen, Rui Gu, Bin Xu
Although there are some studies on chat log analysis, few focused on collaboration with clear boundary using IM (Instant Messaging) tool. This research captured a full chat log of a distributed collaboration work using popular IM software as the main communication medium. Then quantified analysis on the chat log was done with follow-up interviews to all participants. The comparison between count of messages sent and response intervals were classified by participants. Furthermore, the relation of response interval and message count was tested. The usage of emoticon was also counted and the implication was discussed. It is found that 99.95% of all IM messages contain less than 140 characters. Most of the participants reply within 24 seconds. The response interval has no signification correlation with the number of characters per message. Emoticon is an important part of IM that need further study.
虽然有一些关于聊天日志分析的研究,但很少有人关注使用IM(即时通讯)工具进行边界清晰的协作。本研究捕获了一个使用流行IM软件作为主要通信媒介的分布式协作工作的完整聊天记录。然后对聊天记录进行量化分析,并对所有参与者进行随访访谈。发送的消息数和响应间隔的比较被参与者分类。进一步检验了响应间隔与消息数的关系。统计了表情符号的使用情况,并对其含义进行了讨论。结果发现,99.95%的IM消息长度小于140个字符。大多数参与者在24秒内回复。响应间隔与每条消息的字符数没有显著的相关性。Emoticon是IM的重要组成部分,需要进一步研究。
{"title":"Collaboration using Instant Messaging tool: A chat log analysis","authors":"Min Gu, Lixin Shen, Rui Gu, Bin Xu","doi":"10.1109/WICT.2012.6409225","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409225","url":null,"abstract":"Although there are some studies on chat log analysis, few focused on collaboration with clear boundary using IM (Instant Messaging) tool. This research captured a full chat log of a distributed collaboration work using popular IM software as the main communication medium. Then quantified analysis on the chat log was done with follow-up interviews to all participants. The comparison between count of messages sent and response intervals were classified by participants. Furthermore, the relation of response interval and message count was tested. The usage of emoticon was also counted and the implication was discussed. It is found that 99.95% of all IM messages contain less than 140 characters. Most of the participants reply within 24 seconds. The response interval has no signification correlation with the number of characters per message. Emoticon is an important part of IM that need further study.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123266088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparative study on Virtual Machine Monitors for cloud 云环境下虚拟机监控的比较研究
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409115
S. Kolhe, Sudhir N. Dhage
Cloud Computing is the distributed architecture in which scalable resources are used to provide computing services to user using virtualization concept. Cloud requires virtual machine for accessing any guest operating system at local desktop, this is handled by software interface such as Virtual Machine Monitor (VMM) or hypervisor. This paper reveals not only its features architecture, working but also comparative analysis of Kernel Virtual Machine (KVM) and Xen using various benchmarking tools. Paper also explains test analysis of measuring CPU performance, network speed and disk access. From this analysis which hypervisor has to be used for the implementation of cloud computing system for getting better performance is decided.
云计算是一种分布式体系结构,利用虚拟化概念,利用可伸缩资源为用户提供计算服务。云计算需要虚拟机来访问本地桌面的任何客户机操作系统,这是由软件接口处理的,例如虚拟机监视器(VMM)或管理程序。本文不仅揭示了内核虚拟机(KVM)和Xen的特点、体系结构、工作原理,而且利用各种基准测试工具对二者进行了比较分析。本文还介绍了测量CPU性能、网络速度和磁盘访问的测试分析。从这个分析中,可以决定在实现云计算系统时应该使用哪个管理程序来获得更好的性能。
{"title":"Comparative study on Virtual Machine Monitors for cloud","authors":"S. Kolhe, Sudhir N. Dhage","doi":"10.1109/WICT.2012.6409115","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409115","url":null,"abstract":"Cloud Computing is the distributed architecture in which scalable resources are used to provide computing services to user using virtualization concept. Cloud requires virtual machine for accessing any guest operating system at local desktop, this is handled by software interface such as Virtual Machine Monitor (VMM) or hypervisor. This paper reveals not only its features architecture, working but also comparative analysis of Kernel Virtual Machine (KVM) and Xen using various benchmarking tools. Paper also explains test analysis of measuring CPU performance, network speed and disk access. From this analysis which hypervisor has to be used for the implementation of cloud computing system for getting better performance is decided.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125264459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automated testing of Web Services system based on OWL-S 基于OWL-S的Web服务系统自动化测试
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409240
S. H. Shafin, Li Zhang, Xi Xu
As Web Services becomes mature and popular, they are always integrated together, forming systems to carry out coherent tasks. The distributed application of Web Services involves many standard protocols and various runtime behaviors and thus makes the systems' automated testing more difficult. In this paper we propose a series of applicable automated testing methods for Web Services system. First, deduce abstract test cases from interaction requirement properties of Web Services system. Second, specify test cases according to SWRL (Semantic Web Rule Language) properties and abstract test cases. Finally, generate mutants under AOP (Aspect-Oriented Programming) technology support, drive them by specific test cases using improved Fit (Framework for Integrated Test), and then kill mutants based on business logic. Experiments have shown that our algorithms meet the applied demands and perform well as an automated testing tool for Web Services system.
随着Web服务的成熟和流行,它们总是集成在一起,形成执行一致任务的系统。Web服务的分布式应用程序涉及许多标准协议和各种运行时行为,从而使系统的自动化测试变得更加困难。本文提出了一系列适用于Web服务系统的自动化测试方法。首先,从Web服务系统的交互需求属性中推导出抽象的测试用例。其次,根据SWRL(语义Web规则语言)属性指定测试用例,抽象测试用例。最后,在AOP(面向方面的编程)技术支持下生成突变体,使用改进的Fit(集成测试框架)通过特定的测试用例驱动它们,然后基于业务逻辑杀死突变体。实验结果表明,该算法能够满足应用需求,并能很好地作为Web服务系统的自动化测试工具。
{"title":"Automated testing of Web Services system based on OWL-S","authors":"S. H. Shafin, Li Zhang, Xi Xu","doi":"10.1109/WICT.2012.6409240","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409240","url":null,"abstract":"As Web Services becomes mature and popular, they are always integrated together, forming systems to carry out coherent tasks. The distributed application of Web Services involves many standard protocols and various runtime behaviors and thus makes the systems' automated testing more difficult. In this paper we propose a series of applicable automated testing methods for Web Services system. First, deduce abstract test cases from interaction requirement properties of Web Services system. Second, specify test cases according to SWRL (Semantic Web Rule Language) properties and abstract test cases. Finally, generate mutants under AOP (Aspect-Oriented Programming) technology support, drive them by specific test cases using improved Fit (Framework for Integrated Test), and then kill mutants based on business logic. Experiments have shown that our algorithms meet the applied demands and perform well as an automated testing tool for Web Services system.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130334916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Turbo coding in DVB — RCS standard over the stratospheric communication channel 基于DVB - RCS标准的平流层通信信道Turbo编码
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409229
Jianping Zheng, Jing Gao
The statistical model is used for analysis of the characteristic over the stratospheric communication channel, the structure and algorithm of Turbo encoding and decoding in DVB - RCS are studied, the encoder and decoder over the stratospheric communication channel are established using Turbo coding in DVB - RCS. Numerical results show the effects of different interleaving depth and different interleaving length on the properties of channel, the channel capacity and different coding rates of Turbo code in Rayleigh fading using QPSK modulation are simulated too.
利用统计模型对平流层通信信道的特性进行了分析,研究了DVB - RCS中Turbo编解码的结构和算法,利用DVB - RCS中的Turbo编码建立了平流层通信信道的编解码器。数值结果显示了不同的交错深度和交错长度对信道性能的影响,并模拟了采用QPSK调制的瑞利衰落下Turbo码的信道容量和不同的编码速率。
{"title":"Turbo coding in DVB — RCS standard over the stratospheric communication channel","authors":"Jianping Zheng, Jing Gao","doi":"10.1109/WICT.2012.6409229","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409229","url":null,"abstract":"The statistical model is used for analysis of the characteristic over the stratospheric communication channel, the structure and algorithm of Turbo encoding and decoding in DVB - RCS are studied, the encoder and decoder over the stratospheric communication channel are established using Turbo coding in DVB - RCS. Numerical results show the effects of different interleaving depth and different interleaving length on the properties of channel, the channel capacity and different coding rates of Turbo code in Rayleigh fading using QPSK modulation are simulated too.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124632688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reconstruction of PET Brain image using Conjugate Gradient algorithm 用共轭梯度算法重建PET脑图像
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409053
T. Arunprasath, M. Rajasekaran, S. Kannan, V. A. Kalasalingam
This paper addresses a nonlinear PET Brain image reconstruction based on a weighted least-square (WLS). In previous years, the analytical approach was used to reconstruct the Positron Emission Tomography (PET). This approach requires a minimization of a convex cost function and accompanied by many problems related to the computational complexity. The poles apart iteration methods are Conjugate Gradient (CG), Coordinate Descent (CD) and Image Space Reconstruction Algorithm (ISRA). It has many advantages compared to conventional approach. The functional protocol used here is CG iteration method. This statistical fashion can provide better and high PSNR along with lowest noise in the PET Brain image. An assortment of image quality parameters is considered to analyze the PET brain image in this algorithm. The PET brain image is constructed and simulated in MATLAB /Simulink package.
研究了一种基于加权最小二乘的非线性PET脑图像重建方法。在过去的几年里,分析方法被用于重建正电子发射断层扫描(PET)。这种方法需要最小化凸代价函数,并伴随着许多与计算复杂性相关的问题。极点分离迭代方法有共轭梯度法(CG)、坐标下降法(CD)和图像空间重构法(ISRA)。与传统方法相比,它具有许多优点。这里使用的功能协议是CG迭代法。这种统计方式可以在PET脑图像中提供更好的高PSNR和最低的噪声。该算法考虑了多种图像质量参数对PET脑图像进行分析。在MATLAB /Simulink软件包中构建并仿真了PET脑图像。
{"title":"Reconstruction of PET Brain image using Conjugate Gradient algorithm","authors":"T. Arunprasath, M. Rajasekaran, S. Kannan, V. A. Kalasalingam","doi":"10.1109/WICT.2012.6409053","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409053","url":null,"abstract":"This paper addresses a nonlinear PET Brain image reconstruction based on a weighted least-square (WLS). In previous years, the analytical approach was used to reconstruct the Positron Emission Tomography (PET). This approach requires a minimization of a convex cost function and accompanied by many problems related to the computational complexity. The poles apart iteration methods are Conjugate Gradient (CG), Coordinate Descent (CD) and Image Space Reconstruction Algorithm (ISRA). It has many advantages compared to conventional approach. The functional protocol used here is CG iteration method. This statistical fashion can provide better and high PSNR along with lowest noise in the PET Brain image. An assortment of image quality parameters is considered to analyze the PET brain image in this algorithm. The PET brain image is constructed and simulated in MATLAB /Simulink package.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
MA WSN — Manifold authentication in wireless sensor network 无线传感器网络中WSN的流形认证
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409142
N. Ambika, G. Raju
Scarcity of security, increase in sneaking of information over a network. Wireless sensor network consists of hundreds to thousands of sensors deployed in hostile environment. As these networks are not presided over by any supervision, the security to the network is one of the elementary aspects. Due to lack of security, the nodes tend to get compromised by the adversaries. These nodes tend to attract the data towards itself and either modifies the data or denies forwarding it. This paper ensures that the network is secure to a larger extent by eliminating the compromised nodes. The intensity of the transmission is scrutinized to discover the compromised node in the network. The detector in the cluster joins hands in scrutinizing the network. Based on these findings, encryption keys are generated. This approach secures nodes from Sybil attack by 34%, Wormhole attack by 27.8% and Sinkhole attack by 29.8%.
缺乏安全性,信息在网络上的偷偷摸摸增加。无线传感器网络由部署在恶劣环境中的数百到数千个传感器组成。由于这些网络不受任何监管机构的主持,网络的安全性是一个基本的方面。由于缺乏安全性,节点容易受到攻击者的攻击。这些节点倾向于将数据吸引到自己,并修改数据或拒绝转发数据。本文通过消除受损节点,保证了网络在更大程度上的安全性。通过仔细检查传输的强度来发现网络中的受损节点。集群中的探测器联合起来仔细检查网络。根据这些发现,生成加密密钥。这种方法可以保护节点免受34%的Sybil攻击,27.8%的虫洞攻击和29.8%的Sinkhole攻击。
{"title":"MA WSN — Manifold authentication in wireless sensor network","authors":"N. Ambika, G. Raju","doi":"10.1109/WICT.2012.6409142","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409142","url":null,"abstract":"Scarcity of security, increase in sneaking of information over a network. Wireless sensor network consists of hundreds to thousands of sensors deployed in hostile environment. As these networks are not presided over by any supervision, the security to the network is one of the elementary aspects. Due to lack of security, the nodes tend to get compromised by the adversaries. These nodes tend to attract the data towards itself and either modifies the data or denies forwarding it. This paper ensures that the network is secure to a larger extent by eliminating the compromised nodes. The intensity of the transmission is scrutinized to discover the compromised node in the network. The detector in the cluster joins hands in scrutinizing the network. Based on these findings, encryption keys are generated. This approach secures nodes from Sybil attack by 34%, Wormhole attack by 27.8% and Sinkhole attack by 29.8%.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123102433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
“Phish mail guard: Phishing mail detection technique by using textual and URL analysis” 网络钓鱼邮件防护:基于文本和URL分析的网络钓鱼邮件检测技术
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409092
J. Hajgude, L. Ragha
Phishing is the combination of social engineering and technical exploits designed to convince a victim to provide personal information, usually for the monetary gain of the attacker. Phishing emails contains messages to lure victims into performing certain actions, such as clicking on a URL where a phishing website is hosted, or executing a malware code. Phishing has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more frequent and sophisticated. URL and textual content analysis of email will results in a highly accurate anti phishing email classifier. We propose a technique where we consider the advantages of blacklist, white list and heuristic technique for increasing accuracy and reducing false positive rate. In heuristic technique we are using textual analysis and URL analysis of e-mail. Since most of the phishing mails have similar contents, our proposed method will increase the performance by analysing textual contents of mail and lexical URL analysis. It will detect phishing mail if DNS in actual link is present in blacklist. DNS is present in white list then it is considered as legitimate DNS. If it is not present in blacklist as well as white list then it is analyzed by using pattern matching with existing phishing DNS, contents found in mail and analysis of actual URL. With the help blacklist and white list we are avoiding detection time for phishing and legitimate email. At the same time we are decreasing false positive rate by combining features of DNS, textual content analysis of email and URL analysis.
网络钓鱼是社会工程和技术攻击的结合,旨在说服受害者提供个人信息,通常是为了攻击者的金钱收益。网络钓鱼邮件包含引诱受害者执行某些操作的信息,例如点击托管网络钓鱼网站的URL,或执行恶意软件代码。网络钓鱼已经成为网络犯罪中最流行的做法。网络钓鱼攻击变得越来越频繁和复杂。电子邮件的URL和文本内容分析将导致一个高度准确的反网络钓鱼电子邮件分类器。我们提出了一种综合考虑黑名单、白名单和启发式技术的优点来提高准确率和降低误报率的技术。在启发式技术中,我们使用电子邮件的文本分析和URL分析。由于大多数网络钓鱼邮件内容相似,我们提出的方法通过分析邮件的文本内容和词法URL分析来提高性能。如果黑名单中存在实际链接中的DNS,则检测钓鱼邮件。如果DNS出现在白名单中,则认为它是合法的DNS。如果不在黑名单和白名单中,则通过与现有网络钓鱼DNS、邮件中发现的内容和分析实际URL进行模式匹配来分析。在黑名单和白名单的帮助下,我们避免了网络钓鱼和合法电子邮件的检测时间。同时结合DNS、邮件文本内容分析、URL分析等特点,降低误报率。
{"title":"“Phish mail guard: Phishing mail detection technique by using textual and URL analysis”","authors":"J. Hajgude, L. Ragha","doi":"10.1109/WICT.2012.6409092","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409092","url":null,"abstract":"Phishing is the combination of social engineering and technical exploits designed to convince a victim to provide personal information, usually for the monetary gain of the attacker. Phishing emails contains messages to lure victims into performing certain actions, such as clicking on a URL where a phishing website is hosted, or executing a malware code. Phishing has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more frequent and sophisticated. URL and textual content analysis of email will results in a highly accurate anti phishing email classifier. We propose a technique where we consider the advantages of blacklist, white list and heuristic technique for increasing accuracy and reducing false positive rate. In heuristic technique we are using textual analysis and URL analysis of e-mail. Since most of the phishing mails have similar contents, our proposed method will increase the performance by analysing textual contents of mail and lexical URL analysis. It will detect phishing mail if DNS in actual link is present in blacklist. DNS is present in white list then it is considered as legitimate DNS. If it is not present in blacklist as well as white list then it is analyzed by using pattern matching with existing phishing DNS, contents found in mail and analysis of actual URL. With the help blacklist and white list we are avoiding detection time for phishing and legitimate email. At the same time we are decreasing false positive rate by combining features of DNS, textual content analysis of email and URL analysis.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129850848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
PN codes Vs chaotic sequences: BER comparison perspective 伪码与混沌序列:误码率比较的观点
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409124
M. Sangeetha, V. Bhaskar
In this paper, we consider the BER performance of chaotic modulation schemes in Single-Input-Multiple-Output (SIMO) Nakagami fading channels. In particular, we focus on a system that employs Differential chaos Shift keying (DCSK). We consider transceiver scheme which require no channel state information at either the transmitter or the receiver. A distinct chaotic sequence is used at the transmit antenna to spread the data symbols and transmits omni directionally. At each receive antenna, the corresponding differential detection statistics is performed and these statistics are combined with maximum ratio combining for symbol detection. Simulation results show that the proposed schemes can effectively exploit spatial diversity of the underlying SIMO system. The performance of the system is evaluated for both chaotic sequence and PN sequence in terms of Bit Error Rate (BER) for various space diversity levels and average SNRs. Also, the BER performance of these systems is evaluated for various spreading code lengths.
本文研究了单输入多输出(SIMO)中川衰落信道中混沌调制方案的误码率性能。我们特别关注一种采用差分混沌移位键控(DCSK)的系统。我们考虑了在发送端和接收端都不需要信道状态信息的收发方案。在发射天线处使用明显的混沌序列来传播数据符号并进行全向传输。在每个接收天线处进行相应的差分检测统计,并将这些统计与最大比值组合进行符号检测。仿真结果表明,所提方案能够有效地利用底层SIMO系统的空间多样性。在不同的空间分集水平和平均信噪比下,对混沌序列和PN序列的系统性能进行了评估。同时,对不同扩展码长的系统进行了误码率性能评价。
{"title":"PN codes Vs chaotic sequences: BER comparison perspective","authors":"M. Sangeetha, V. Bhaskar","doi":"10.1109/WICT.2012.6409124","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409124","url":null,"abstract":"In this paper, we consider the BER performance of chaotic modulation schemes in Single-Input-Multiple-Output (SIMO) Nakagami fading channels. In particular, we focus on a system that employs Differential chaos Shift keying (DCSK). We consider transceiver scheme which require no channel state information at either the transmitter or the receiver. A distinct chaotic sequence is used at the transmit antenna to spread the data symbols and transmits omni directionally. At each receive antenna, the corresponding differential detection statistics is performed and these statistics are combined with maximum ratio combining for symbol detection. Simulation results show that the proposed schemes can effectively exploit spatial diversity of the underlying SIMO system. The performance of the system is evaluated for both chaotic sequence and PN sequence in terms of Bit Error Rate (BER) for various space diversity levels and average SNRs. Also, the BER performance of these systems is evaluated for various spreading code lengths.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134578988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation and comparative analysis of energy conservation performance metric for ERAODV, AODV and DSDV routing protocols in MANET MANET中ERAODV、AODV和DSDV路由协议节能性能指标的仿真与比较分析
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409088
B. S. Gouda, A. B. Mandai, K. Narayana
In Mobile Ad-Hoc Networks (MANETs), mobile devices are equipped with power. In order to utilize this energy equipped devices resourcefully for transmission of data packets, many energy aware routing strategies are followed. As a key note to these routing strategies, the energy aware performance metrics are analyzed on two routing protocols like Ad-Hoc on Demand Distance Vector Protocol (AODV) and Destination Sequenced Distance Vector Routing Protocol (DSDV). The comparison results prove that AODV protocol can be adopted for any routing strategy, in order to increase the performance of the network lifetime in comparison with DSDV.
在移动自组织网络(manet)中,移动设备配备了电源。为了充分利用这些具有能量的设备来传输数据包,采用了许多能量感知路由策略。作为这些路由策略的重点,分析了Ad-Hoc随需应变距离矢量协议(AODV)和目的地顺序距离矢量路由协议(DSDV)两种路由协议的能量感知性能指标。对比结果表明,与DSDV相比,AODV协议可用于任何路由策略,以提高网络生存期的性能。
{"title":"Simulation and comparative analysis of energy conservation performance metric for ERAODV, AODV and DSDV routing protocols in MANET","authors":"B. S. Gouda, A. B. Mandai, K. Narayana","doi":"10.1109/WICT.2012.6409088","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409088","url":null,"abstract":"In Mobile Ad-Hoc Networks (MANETs), mobile devices are equipped with power. In order to utilize this energy equipped devices resourcefully for transmission of data packets, many energy aware routing strategies are followed. As a key note to these routing strategies, the energy aware performance metrics are analyzed on two routing protocols like Ad-Hoc on Demand Distance Vector Protocol (AODV) and Destination Sequenced Distance Vector Routing Protocol (DSDV). The comparison results prove that AODV protocol can be adopted for any routing strategy, in order to increase the performance of the network lifetime in comparison with DSDV.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133650823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2012 World Congress on Information and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1