首页 > 最新文献

2019 3rd International Conference on Computing and Communications Technologies (ICCCT)最新文献

英文 中文
Telepathic Virtual Assistant 心灵感应虚拟助手
V. Narmadha, J. U. AJAY KRISHNAN, R. P. Kumar, R. Kumar
The purpose of our paper is to make the virtual assistant respond to the requests of the user which are by means of thoughts. The user thinks of the task and the personal assistant gets to process the request without any text or audio based inputs from the user. The thoughts of the user is fed to the virtual assistant by means of brain computer interface(BCI) with the help of devices like Electroencephalogram. This device helps in converting the thoughts of the user to signal which are then converted into text. The emotional classifierused in the system helps to understand the state of the user and help the virtual assistant to respond accordingly. The response of the virtual assistant is processed to the user in a much technological way via the Bone conduction technology which helps in perceiving for the people with auditory problems.
本文的目的是使虚拟助手能够以思想的方式响应用户的请求。用户想到任务,个人助理开始处理请求,而不需要用户输入任何文本或音频。用户的想法通过脑机接口(BCI)在脑电图等设备的帮助下馈送给虚拟助手。这个装置可以将用户的想法转换成信号,然后再转换成文本。系统中使用的情绪分类器有助于了解用户的状态,并帮助虚拟助手做出相应的反应。虚拟助手的响应通过骨传导技术以一种技术的方式处理给用户,这有助于听觉问题的人感知。
{"title":"Telepathic Virtual Assistant","authors":"V. Narmadha, J. U. AJAY KRISHNAN, R. P. Kumar, R. Kumar","doi":"10.1109/ICCCT2.2019.8824886","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824886","url":null,"abstract":"The purpose of our paper is to make the virtual assistant respond to the requests of the user which are by means of thoughts. The user thinks of the task and the personal assistant gets to process the request without any text or audio based inputs from the user. The thoughts of the user is fed to the virtual assistant by means of brain computer interface(BCI) with the help of devices like Electroencephalogram. This device helps in converting the thoughts of the user to signal which are then converted into text. The emotional classifierused in the system helps to understand the state of the user and help the virtual assistant to respond accordingly. The response of the virtual assistant is processed to the user in a much technological way via the Bone conduction technology which helps in perceiving for the people with auditory problems.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132076335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey on Game Theory Approach in Wireless Body Area Network 无线体域网络中博弈论方法研究综述
M. Naik, P. Samundiswary
A Wireless Body Area Network (WBAN) is used to collect biological signals from human body with the help of medical equipment and sensors that are connected wirelessly and they are placed outside or inside the body for different no-nmedical and medical applications. The standard developed for WBAN is IEEE 802.15.6. The rapid enhancement of Body Sensor Networks (BSNs) provides continuous health monitoring to control patient’s life as they play important role for saving life of patient’s by utilizing several variety of sensors that are used in the health care applications. These sensors monitor continuously different biological functions such as blood pressure, temperature, Electrocardiogram(ECG), heart rate, Electroencephalogram (EEG) etc. The data which is collected are transmitted the information at regular intervals to a central hub. The patient’s health monitor in real-time is the primary goal as it helps to design and support several non-medical applications such as detection of gesture for interactive games, cognitive, movement and recognition of emotions during drive assistance etc. However, WBAN application concept is still a exigent post to be considered for several technical demands like energy efficiency, lifetime of network, security, criticality of data, network throughput and prioritization. Hence, most of the WBANs utilizes wireless channel for process of communication in which these typical sensors with single transceiver device transmits the information with low power by utilizing a single /multi-channel by game theoretic approach in WBAN. In this paper, an attempt has been made to explain different types of game theoretic approaches used in WBAN.
无线身体区域网络(Wireless Body Area Network, WBAN)是一种利用无线连接的医疗设备和传感器收集人体生物信号的技术,这些设备和传感器被放置在身体外部或内部,用于不同的非医疗和医疗应用。WBAN的标准是IEEE 802.15.6。身体传感器网络(BSNs)的快速发展提供了持续的健康监测来控制患者的生命,因为它们在医疗保健应用中使用的各种传感器对挽救患者的生命起着重要的作用。这些传感器连续监测不同的生物功能,如血压、体温、心电图、心率、脑电图等。收集到的数据每隔一段时间将信息传送到一个中央集线器。病人的实时健康监测是主要目标,因为它有助于设计和支持一些非医疗应用,如交互式游戏的手势检测,驾驶辅助过程中的认知,运动和情绪识别等。然而,由于能效、网络寿命、安全性、数据的关键性、网络吞吐量和优先级等方面的技术要求,无线宽带网络的应用概念仍然是一个亟待考虑的问题。因此,大多数WBAN采用无线信道进行通信过程,其中典型的传感器采用单收发器,利用WBAN中的博弈论方法以低功耗利用单/多信道传输信息。本文试图解释WBAN中使用的不同类型的博弈论方法。
{"title":"Survey on Game Theory Approach in Wireless Body Area Network","authors":"M. Naik, P. Samundiswary","doi":"10.1109/ICCCT2.2019.8824973","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824973","url":null,"abstract":"A Wireless Body Area Network (WBAN) is used to collect biological signals from human body with the help of medical equipment and sensors that are connected wirelessly and they are placed outside or inside the body for different no-nmedical and medical applications. The standard developed for WBAN is IEEE 802.15.6. The rapid enhancement of Body Sensor Networks (BSNs) provides continuous health monitoring to control patient’s life as they play important role for saving life of patient’s by utilizing several variety of sensors that are used in the health care applications. These sensors monitor continuously different biological functions such as blood pressure, temperature, Electrocardiogram(ECG), heart rate, Electroencephalogram (EEG) etc. The data which is collected are transmitted the information at regular intervals to a central hub. The patient’s health monitor in real-time is the primary goal as it helps to design and support several non-medical applications such as detection of gesture for interactive games, cognitive, movement and recognition of emotions during drive assistance etc. However, WBAN application concept is still a exigent post to be considered for several technical demands like energy efficiency, lifetime of network, security, criticality of data, network throughput and prioritization. Hence, most of the WBANs utilizes wireless channel for process of communication in which these typical sensors with single transceiver device transmits the information with low power by utilizing a single /multi-channel by game theoretic approach in WBAN. In this paper, an attempt has been made to explain different types of game theoretic approaches used in WBAN.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134212946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Scheme for Feature Selection from Gene Expression Data using Recursive Feature Elimination with Cross Validation and Unsupervised Deep Belief Network Classifier 基于交叉验证递归特征消除和无监督深度信念网络分类器的基因表达数据特征选择方案
Nimrita Koul, S. Manvi
In the treatment of cancers, the efficacy depends on the correct diagnosis of the nature of tumor as early as possible. Micro-array Gene expression data which contains the expression profiles of entire genome provides a source which can be analyzed to identify bio-markers of cancers. Micro-array data has a large number of features and very few number of samples. To make effective use of this data, it is very beneficial to select a reduced number of genes which can be used for tasks like classification. In this paper, we propose a two level scheme for feature selection and classification of cancers. First, the genes are ranked using Recursive Feature Elimination which uses Random Forest Classifier for evaluation of fitness of genes with five fold cross-validation , later these genes are used to pre-train an Unsupervised Deep Belief Network Classifier to classify the samples based on the selected genes. We compared the results in terms of cross validation matrix parameters viz. classification accuracy, precision and recall, obtained from our approach with the results obtained by using some standard feature selector-classifier combinations viz. Mutual Information with Support Vector Machines, Kernel Principal Component Analysis with Support Vector Machine, Support Vector Machine -Recursive Feature Elimination and Mutual Information with Random Forest Classifier. The results show that our scheme performs at par with standard methods used for feature selection from gene expression data.
在癌症的治疗中,其疗效取决于尽早对肿瘤性质的正确诊断。微阵列基因表达数据包含了整个基因组的表达谱,为癌症生物标志物的鉴定提供了分析来源。微阵列数据具有特征数量多、样本数量少的特点。为了有效地利用这些数据,选择数量较少的基因用于分类等任务是非常有益的。本文提出了一种两级肿瘤特征选择和分类方案。首先,使用递归特征消除法对基因进行排序,递归特征消除法使用随机森林分类器对基因的适应度进行评估,并进行五次交叉验证,然后将这些基因用于预训练无监督深度信念网络分类器,根据所选基因对样本进行分类。我们将该方法得到的交叉验证矩阵参数(分类精度、精密度和召回率)与一些标准的特征选择器-分类器组合(支持向量机互信息、支持向量机核主成分分析、支持向量机-递归特征消除和随机森林分类器互信息)得到的结果进行了比较。结果表明,我们的方案与用于基因表达数据特征选择的标准方法相当。
{"title":"A Scheme for Feature Selection from Gene Expression Data using Recursive Feature Elimination with Cross Validation and Unsupervised Deep Belief Network Classifier","authors":"Nimrita Koul, S. Manvi","doi":"10.1109/ICCCT2.2019.8824943","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824943","url":null,"abstract":"In the treatment of cancers, the efficacy depends on the correct diagnosis of the nature of tumor as early as possible. Micro-array Gene expression data which contains the expression profiles of entire genome provides a source which can be analyzed to identify bio-markers of cancers. Micro-array data has a large number of features and very few number of samples. To make effective use of this data, it is very beneficial to select a reduced number of genes which can be used for tasks like classification. In this paper, we propose a two level scheme for feature selection and classification of cancers. First, the genes are ranked using Recursive Feature Elimination which uses Random Forest Classifier for evaluation of fitness of genes with five fold cross-validation , later these genes are used to pre-train an Unsupervised Deep Belief Network Classifier to classify the samples based on the selected genes. We compared the results in terms of cross validation matrix parameters viz. classification accuracy, precision and recall, obtained from our approach with the results obtained by using some standard feature selector-classifier combinations viz. Mutual Information with Support Vector Machines, Kernel Principal Component Analysis with Support Vector Machine, Support Vector Machine -Recursive Feature Elimination and Mutual Information with Random Forest Classifier. The results show that our scheme performs at par with standard methods used for feature selection from gene expression data.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133399607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MAITEMB (Mobile Application Intervention to Enhance Motivated Behavior) MAITEMB(移动应用干预增强动机行为)
M. Yogesh, M. Balamurugan, S. Varun, M. Ananthi
A NEUROSCIENCE –informed mobile app intervention to treat schizophrenia by analyzing the data from sensors in headwear which is transferred via Bluetooth to the mobile. At the root of all our thoughts, emotions and behavior is the communication between neurons within our brains. Brain waves are detected using sensors (EEG electrode) placed on the scalp. They are divided into bandwidth to describe their functions. The EEG raw data are read through brain sense headwear and the data are transferred to mobile via Bluetooth (HC-06). And it automatically plays a depression control music (meditation music), notify the patient’s friends or relatives. Give some warning messages to user (patient). It is quite probable that in the future most of our appliances will be controlled directly through our wishes or the brain and this project stand as an affirmation to that vision. Our application analysis the present psychological state of the person in delusions or hallucinations which are the symptoms of schizophrenia and request them with some suggestions to follow. Signals from the brain can be further studied and the technology can be refined to bring about more specific results.
通过分析通过蓝牙传输到手机的头套传感器的数据,一款神经科学信息手机应用介入治疗精神分裂症。我们所有的思想、情感和行为的根源是我们大脑中神经元之间的交流。脑电波是通过放置在头皮上的传感器(脑电图电极)来检测的。它们被分成带宽来描述它们的功能。EEG原始数据通过脑传感头戴设备读取,数据通过蓝牙(HC-06)传输到移动设备。并且它会自动播放抑郁症控制音乐(冥想音乐),通知患者的朋友或亲戚。给用户(患者)一些警告信息。很有可能在未来,我们的大多数电器将直接通过我们的愿望或大脑来控制,而这个项目是对这一愿景的肯定。我们的应用分析了精神分裂症的症状——妄想或幻觉患者目前的心理状态,并对他们提出了一些建议。来自大脑的信号可以进一步研究,技术可以改进,以带来更具体的结果。
{"title":"MAITEMB (Mobile Application Intervention to Enhance Motivated Behavior)","authors":"M. Yogesh, M. Balamurugan, S. Varun, M. Ananthi","doi":"10.1109/ICCCT2.2019.8824796","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824796","url":null,"abstract":"A NEUROSCIENCE –informed mobile app intervention to treat schizophrenia by analyzing the data from sensors in headwear which is transferred via Bluetooth to the mobile. At the root of all our thoughts, emotions and behavior is the communication between neurons within our brains. Brain waves are detected using sensors (EEG electrode) placed on the scalp. They are divided into bandwidth to describe their functions. The EEG raw data are read through brain sense headwear and the data are transferred to mobile via Bluetooth (HC-06). And it automatically plays a depression control music (meditation music), notify the patient’s friends or relatives. Give some warning messages to user (patient). It is quite probable that in the future most of our appliances will be controlled directly through our wishes or the brain and this project stand as an affirmation to that vision. Our application analysis the present psychological state of the person in delusions or hallucinations which are the symptoms of schizophrenia and request them with some suggestions to follow. Signals from the brain can be further studied and the technology can be refined to bring about more specific results.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134072606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey On Cloud Security Issues And Blockchain 关于云安全问题和区块链的调查
S. Pavithra, S. Ramya, S. Prathibha
The need for cloud computing is gradually increasing day by day. The cloud computing security is the major difficulty. Since the data in the cloud has to be transferred through internet, the security of data becomes a major concern. The key mechanisms for data protections like integrity, accountability, privacy, access control, authentication, authorization must be maintained. Blockchain is a technology which makes cloud computing better. Blockchain overcomes the security issues in cloud computing. This survey aims at analyzing and comparing various issues in the cloud environment and security issues using blockchain.
对云计算的需求日益增长。云计算的安全是主要的难点。由于云中的数据必须通过互联网传输,因此数据的安全性成为一个主要问题。必须维护数据保护的关键机制,如完整性、问责制、隐私、访问控制、身份验证和授权。区块链是一种使云计算变得更好的技术。区块链克服了云计算中的安全问题。本调查旨在分析和比较云环境中的各种问题和使用区块链的安全问题。
{"title":"A Survey On Cloud Security Issues And Blockchain","authors":"S. Pavithra, S. Ramya, S. Prathibha","doi":"10.1109/ICCCT2.2019.8824891","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824891","url":null,"abstract":"The need for cloud computing is gradually increasing day by day. The cloud computing security is the major difficulty. Since the data in the cloud has to be transferred through internet, the security of data becomes a major concern. The key mechanisms for data protections like integrity, accountability, privacy, access control, authentication, authorization must be maintained. Blockchain is a technology which makes cloud computing better. Blockchain overcomes the security issues in cloud computing. This survey aims at analyzing and comparing various issues in the cloud environment and security issues using blockchain.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120850268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
BAGH – Comparative Study BAGH -比较研究
B. Kamala
Process mining is a new emerging research trend over the last decade which focuses on analyzing the processes using event log and data. The raising integration of information systems for the operation of business processes provides the basis for innovative data analysis approaches. Process mining has the strong relationship between with data mining so that it enables the bond between business intelligence approach and business process management. It focuses on end-to-end processes and is possible because of the growing availability of event data and new process discovery and conformance checking techniques. Process mining aims to discover, monitor and improve real processes by extracting knowledge from event logs readily available in today’s information systems. The discovered process models can be used for a variety of analysis purposes. Many companies have adopted Process-aware Information Systems for supporting their business processes in some form. These systems typically have their log events related to the actual business process executions. Proper analysis of Process Aware Information Systems execution logs can yield important knowledge and help organizations improve the quality of their services. This paper reviews and compares various process mining algorithms based on their input parameters, the techniques used and the output generated by them.
过程挖掘是近十年来兴起的一种新的研究趋势,其重点是利用事件日志和数据对过程进行分析。业务流程操作的信息系统集成度的提高为创新的数据分析方法提供了基础。流程挖掘与数据挖掘之间有很强的关系,因此它支持业务智能方法和业务流程管理之间的联系。它侧重于端到端流程,并且由于事件数据的可用性以及新的流程发现和一致性检查技术的增加而成为可能。过程挖掘旨在通过从当今信息系统中随时可用的事件日志中提取知识来发现、监视和改进实际过程。发现的流程模型可用于各种分析目的。许多公司采用了感知过程的信息系统,以某种形式支持它们的业务过程。这些系统通常具有与实际业务流程执行相关的日志事件。对过程感知信息系统执行日志的适当分析可以产生重要的知识,并帮助组织提高其服务质量。本文对各种过程挖掘算法的输入参数、使用的技术和产生的输出进行了综述和比较。
{"title":"BAGH – Comparative Study","authors":"B. Kamala","doi":"10.1109/ICCCT2.2019.8824878","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824878","url":null,"abstract":"Process mining is a new emerging research trend over the last decade which focuses on analyzing the processes using event log and data. The raising integration of information systems for the operation of business processes provides the basis for innovative data analysis approaches. Process mining has the strong relationship between with data mining so that it enables the bond between business intelligence approach and business process management. It focuses on end-to-end processes and is possible because of the growing availability of event data and new process discovery and conformance checking techniques. Process mining aims to discover, monitor and improve real processes by extracting knowledge from event logs readily available in today’s information systems. The discovered process models can be used for a variety of analysis purposes. Many companies have adopted Process-aware Information Systems for supporting their business processes in some form. These systems typically have their log events related to the actual business process executions. Proper analysis of Process Aware Information Systems execution logs can yield important knowledge and help organizations improve the quality of their services. This paper reviews and compares various process mining algorithms based on their input parameters, the techniques used and the output generated by them.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129671486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CloudBC-A Secure Cloud Data acess Management system cloudbc—安全的云数据访问管理系统
S. Ramamoorthy, B. Baranidharan
Data security and Storage Management becomes the most promising task for any IT operation in the future. The business and service provider’s mange to finds the technology like cloud computing for pooled computing resources. The enormous amounts of research works are initiated in parallel to protect data on the cloud environment. This leads to the strong evidence of unanswered questions related to the data security over the cloud data centres. The Cloud computing model used as a primary technology in many IT business operations across the millions of users. To ensure the data security and modification over the data stored on the cloud considered as a major issue among the community cloud users. The Proposed research work aims to protect the cloud data by implementing the new approach using blockchain technology. The Hybrid approach to combine the BlockChain(BC) Technology with cloud computing to ensure the data security among the community cloud users. is Hybrid approach will restrict the malicious data access and modification on the cloud servers. The secure hash blocks are generated and maintained by the cloud storage devices enhance the data security on the cloud. The block chains allow the user to trace back the malicious data access and modifications.
数据安全和存储管理成为未来任何IT运营最有前途的任务。业务和服务提供商设法为集中的计算资源找到云计算之类的技术。大量的研究工作同时启动,以保护云环境中的数据。这导致了与云数据中心的数据安全相关的未解决问题的有力证据。在涉及数百万用户的许多IT业务操作中,云计算模型被用作主要技术。确保数据的安全性和对存储在云上的数据的修改被认为是社区云用户的主要问题。拟议的研究工作旨在通过使用区块链技术实施新方法来保护云数据。将区块链(BC)技术与云计算相结合的混合方式,确保社区云用户之间的数据安全。混合方法将限制云服务器上的恶意数据访问和修改。安全哈希块由云存储设备生成和维护,增强了云上数据的安全性。区块链允许用户追溯恶意数据访问和修改。
{"title":"CloudBC-A Secure Cloud Data acess Management system","authors":"S. Ramamoorthy, B. Baranidharan","doi":"10.1109/ICCCT2.2019.8824828","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824828","url":null,"abstract":"Data security and Storage Management becomes the most promising task for any IT operation in the future. The business and service provider’s mange to finds the technology like cloud computing for pooled computing resources. The enormous amounts of research works are initiated in parallel to protect data on the cloud environment. This leads to the strong evidence of unanswered questions related to the data security over the cloud data centres. The Cloud computing model used as a primary technology in many IT business operations across the millions of users. To ensure the data security and modification over the data stored on the cloud considered as a major issue among the community cloud users. The Proposed research work aims to protect the cloud data by implementing the new approach using blockchain technology. The Hybrid approach to combine the BlockChain(BC) Technology with cloud computing to ensure the data security among the community cloud users. is Hybrid approach will restrict the malicious data access and modification on the cloud servers. The secure hash blocks are generated and maintained by the cloud storage devices enhance the data security on the cloud. The block chains allow the user to trace back the malicious data access and modifications.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125491552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Jaunt India With Pre-Planned Budget 带着预先计划好的预算去印度旅行
B. Renuka Devi, V. Srimathi, R. Suvethi, M. Akshaya
“The motive of “Tour Budget Analysis” application is to build easy travel assistant planning for the people who are new to the place and don’t know how to plan their tour. We are using greedy algorithm to calculate the shortest path between the two points i.e from the source to destination. Budget analysis plays the major role in this application, before analysing the budget it intakes the requirements from the users using filter. This application will be very useful for the people who would like to travel alone, especially for women as we have checkpoints indicator which indicates each and every checkpoint from their source to destination to their family members. In addition to it we have “Save Our Souls emergency” module which provides the state emergency numbers of the current location such as police, fire, ambulance and women safety numbers. This application also helps us to find the nearby restaurants, hotels, ATMs, banks etc...
“旅游预算分析”应用程序的动机是为那些刚到一个地方,不知道如何计划他们的旅行的人建立一个简单的旅行助手计划。我们使用贪心算法来计算两点之间的最短路径,即从源点到目的点。预算分析在此应用程序中起主要作用,在分析预算之前,它使用过滤器从用户那里获取需求。这个应用程序将是非常有用的人谁想独自旅行,特别是对于妇女,因为我们有检查站的指标,这表明每一个检查站从他们的来源到目的地到他们的家庭成员。除此之外,我们还有"拯救我们的灵魂紧急情况"模块,该模块提供当前地点的州紧急号码,如警察、消防、救护车和妇女安全号码。这个应用程序还可以帮助我们找到附近的餐馆,酒店,自动取款机,银行等…
{"title":"Jaunt India With Pre-Planned Budget","authors":"B. Renuka Devi, V. Srimathi, R. Suvethi, M. Akshaya","doi":"10.1109/ICCCT2.2019.8824817","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824817","url":null,"abstract":"“The motive of “Tour Budget Analysis” application is to build easy travel assistant planning for the people who are new to the place and don’t know how to plan their tour. We are using greedy algorithm to calculate the shortest path between the two points i.e from the source to destination. Budget analysis plays the major role in this application, before analysing the budget it intakes the requirements from the users using filter. This application will be very useful for the people who would like to travel alone, especially for women as we have checkpoints indicator which indicates each and every checkpoint from their source to destination to their family members. In addition to it we have “Save Our Souls emergency” module which provides the state emergency numbers of the current location such as police, fire, ambulance and women safety numbers. This application also helps us to find the nearby restaurants, hotels, ATMs, banks etc...","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127837079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Cloud Data Center using CloudSim – A methodology 使用CloudSim - A方法优化云数据中心
B. Priya, T. Gnanasekaran
Cloud computing can be termed as provisioning of computing power, storage, Infrastructure and other resources over the internet as an on-demand pay service. Recent developments in the technological advancement are in the cloud storage, security, fault tolerances, load balancing and optimization. Cloud simulator is a tool that assists in modelling different cloud applications. Cloudism offers a simulation framework for modelling and simulation that emphasis more on exploring design issues without factoring cloud infrastructure and services. Load balancing in cloud is a method of allocation of workload across multiple nodes to obtain resource optimization with minimum response time. In this paper the state of the art of the cloud simulations along with an approach implemented using CloudSim3.0 is illustrated.
云计算可以被称为在互联网上提供计算能力、存储、基础设施和其他资源,作为一种按需付费服务。技术进步的最新进展是云存储、安全性、容错、负载平衡和优化。云模拟器是一种帮助对不同的云应用程序建模的工具。Cloudism为建模和仿真提供了一个仿真框架,该框架更多地强调探索设计问题,而无需考虑云基础设施和服务。云计算中的负载均衡是一种跨多个节点分配工作负载的方法,以最小的响应时间获得资源优化。本文介绍了云模拟技术的现状以及使用CloudSim3.0实现的方法。
{"title":"Optimization of Cloud Data Center using CloudSim – A methodology","authors":"B. Priya, T. Gnanasekaran","doi":"10.1109/ICCCT2.2019.8824950","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824950","url":null,"abstract":"Cloud computing can be termed as provisioning of computing power, storage, Infrastructure and other resources over the internet as an on-demand pay service. Recent developments in the technological advancement are in the cloud storage, security, fault tolerances, load balancing and optimization. Cloud simulator is a tool that assists in modelling different cloud applications. Cloudism offers a simulation framework for modelling and simulation that emphasis more on exploring design issues without factoring cloud infrastructure and services. Load balancing in cloud is a method of allocation of workload across multiple nodes to obtain resource optimization with minimum response time. In this paper the state of the art of the cloud simulations along with an approach implemented using CloudSim3.0 is illustrated.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2019 3rd International Conference on Computing and Communications Technologies (ICCCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1