首页 > 最新文献

2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)最新文献

英文 中文
Detecting Spear-phishing Emails Based on Authentication 基于身份验证检测鱼叉式网络钓鱼邮件
Xiujuan Wang, Chenxi Zhang, K. Zheng, Haoyang Tang, Yuanrui Tao
{"title":"Detecting Spear-phishing Emails Based on Authentication","authors":"Xiujuan Wang, Chenxi Zhang, K. Zheng, Haoyang Tang, Yuanrui Tao","doi":"10.1109/CCOMS.2019.8821758","DOIUrl":"https://doi.org/10.1109/CCOMS.2019.8821758","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"155 1","pages":"450-456"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73446879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Access Control Model in Mobile Environment 移动环境下的访问控制模型研究
Xiaoyan Zhang, Qiuqiu Wang, Kai Kang
{"title":"Research on Access Control Model in Mobile Environment","authors":"Xiaoyan Zhang, Qiuqiu Wang, Kai Kang","doi":"10.1109/CCOMS.2019.8821639","DOIUrl":"https://doi.org/10.1109/CCOMS.2019.8821639","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"192 1","pages":"716-720"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77712161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recurrent Neural Network Based Bitcoin Price Prediction by Twitter Sentiment Analysis 基于递归神经网络的推特情绪预测比特币价格
D. Pant, Prasanga Neupane, Anuj Poudel, Anup Pokhrel, Bishnu Lama
The sentiment in Twitter about Bitcoin have direct or indirect influence on overall market value of the Bitcoin. This research is concerned with predicting the volatile price of Bitcoin by analyzing the sentiment in Twitter and to find the relation between them. The tweets of Bitcoin collected from different news account sources are classified to positive or negative sentiments. The obtained percentage of positive and negative tweets are feed to RNN model along with historical price to predict the new price for next time frame. The accuracy for sentiment classification of tweets in two class positive and negative is found to be 81.39 % and the overall price prediction accuracy using RNN is found to be 77.62%.
推特上关于比特币的情绪对比特币的整体市值有直接或间接的影响。本研究是通过分析Twitter上的情绪来预测比特币的价格波动,并找到它们之间的关系。从不同的新闻账号来源收集的比特币推文被分为正面和负面情绪。获得的积极和消极推文的百分比与历史价格一起馈送到RNN模型,以预测下一个时间框架的新价格。对推文进行正面和负面两类情绪分类的准确率为81.39%,使用RNN进行整体价格预测的准确率为77.62%。
{"title":"Recurrent Neural Network Based Bitcoin Price Prediction by Twitter Sentiment Analysis","authors":"D. Pant, Prasanga Neupane, Anuj Poudel, Anup Pokhrel, Bishnu Lama","doi":"10.1109/CCCS.2018.8586824","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586824","url":null,"abstract":"The sentiment in Twitter about Bitcoin have direct or indirect influence on overall market value of the Bitcoin. This research is concerned with predicting the volatile price of Bitcoin by analyzing the sentiment in Twitter and to find the relation between them. The tweets of Bitcoin collected from different news account sources are classified to positive or negative sentiments. The obtained percentage of positive and negative tweets are feed to RNN model along with historical price to predict the new price for next time frame. The accuracy for sentiment classification of tweets in two class positive and negative is found to be 81.39 % and the overall price prediction accuracy using RNN is found to be 77.62%.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"212 1","pages":"128-132"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73093476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
A Novel Technique to Remove Marked Dynamic Object from Video Based on Reweighted Low Rank Tensor Completion 基于重加权低秩张量补全的视频中标记动态目标去除新技术
Hima C., B. M, S. N. George
This paper focused on the process of missing area reconstruction in a video after removing a unwanted moving object, thus can remove or handle the dynamic occlusion. Dynamic occlusion is the result of one moving object in a 3–D spread tackling another object from view, and also it is a challenging problem in many video processing applications like object tracking, video surveillance, movie production etc. Discarding the moving objects from videos is a very time consuming task, that even a visual effects expert generally clear up with a time-taking manual frame-by-frame rephrasing. This paper proposes a new technique to remove dynamic occlusion in video, even in the case of videos with complex scenes and also compared with the other existing method, the proposed method does not require the exact shape, size and structure of the object. Here, the proposed method effectively taking the advantage of the spatio-temporal correlation in the video to refill the hole created by a cut-out object by utilizing the information available on other part of the video, where the occluded object were viewable.
本文主要研究去除不需要的运动目标后视频中缺失区域的重建过程,从而去除或处理动态遮挡。动态遮挡是三维空间中一个移动物体遮挡另一个物体的结果,也是物体跟踪、视频监控、电影制作等视频处理应用中一个具有挑战性的问题。从视频中删除移动的物体是一项非常耗时的任务,即使是视觉效果专家通常也需要花费大量时间来手动逐帧重新措辞。本文提出了一种消除视频中动态遮挡的新技术,即使在场景复杂的视频中,与其他现有方法相比,该方法不需要精确的物体形状、大小和结构。本文提出的方法利用视频中被遮挡物体可见的其他部分的信息,有效地利用视频中的时空相关性来填补被遮挡物体所造成的空洞。
{"title":"A Novel Technique to Remove Marked Dynamic Object from Video Based on Reweighted Low Rank Tensor Completion","authors":"Hima C., B. M, S. N. George","doi":"10.1109/CCCS.2018.8586802","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586802","url":null,"abstract":"This paper focused on the process of missing area reconstruction in a video after removing a unwanted moving object, thus can remove or handle the dynamic occlusion. Dynamic occlusion is the result of one moving object in a 3–D spread tackling another object from view, and also it is a challenging problem in many video processing applications like object tracking, video surveillance, movie production etc. Discarding the moving objects from videos is a very time consuming task, that even a visual effects expert generally clear up with a time-taking manual frame-by-frame rephrasing. This paper proposes a new technique to remove dynamic occlusion in video, even in the case of videos with complex scenes and also compared with the other existing method, the proposed method does not require the exact shape, size and structure of the object. Here, the proposed method effectively taking the advantage of the spatio-temporal correlation in the video to refill the hole created by a cut-out object by utilizing the information available on other part of the video, where the occluded object were viewable.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"10 1","pages":"25-29"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73124667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based Message Dissemination in VANET VANET中基于区块链的消息传播
R. Shrestha, Rojeena Bajracharya, S. Nam
With the evolution of vehicle technology, VANET plays an important role in saving life and property of the drivers by disseminating critical event information. However, the traditional VANET faces several security issues. We propose a new type of blockchain to resolve critical message dissemination issues in VANET. We create a local blockchain for real world event messages exchanged between the vehicles within the scope of the countries. In this paper, we discuss a blockchain suitable for VANET. We present a public blockchain that stores the node trustworthiness and message trustworthiness in a distributed ledger that is appropriate for secure message dissemination.
随着汽车技术的发展,VANET通过传播关键事件信息,在挽救驾驶员生命财产方面发挥着重要作用。然而,传统的VANET面临着几个安全问题。我们提出了一种新型的区块链来解决VANET中的关键信息传播问题。我们创建了一个本地区块链,用于在各国范围内的车辆之间交换真实世界的事件消息。在本文中,我们讨论了一个适合VANET的区块链。我们提出了一个公共区块链,它将节点可信度和消息可信度存储在适合安全消息传播的分布式分类账中。
{"title":"Blockchain-based Message Dissemination in VANET","authors":"R. Shrestha, Rojeena Bajracharya, S. Nam","doi":"10.1109/CCCS.2018.8586828","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586828","url":null,"abstract":"With the evolution of vehicle technology, VANET plays an important role in saving life and property of the drivers by disseminating critical event information. However, the traditional VANET faces several security issues. We propose a new type of blockchain to resolve critical message dissemination issues in VANET. We create a local blockchain for real world event messages exchanged between the vehicles within the scope of the countries. In this paper, we discuss a blockchain suitable for VANET. We present a public blockchain that stores the node trustworthiness and message trustworthiness in a distributed ledger that is appropriate for secure message dissemination.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"175 1","pages":"161-166"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90290567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Determination Of Microlocation Using the BLE Protocol, and Wireless Sensor Networks 使用BLE协议和无线传感器网络确定微定位
Lyla B. Das, Raghu C. V., Krishna Rao, P. Srinivas, Dency Daniel, Gautham Nagireddy, S. L.
This work deals with the determination of the location of an object with the help of an identification tag using wireless sensor networks. This uses an array of sensors distributed in the path. When the object with identification tag passes through the path, the sensors calculate the approximate distance from each of them with the help of a series of Received Signal Strength Indicator (RSSI) values. The data is collected and is displayed on a user interface provided. Bluetooth Low Energy (BLE) protocol is used in the wireless sensor network. The RSSI values are mapped to corresponding distances by an initial training and this data is used for estimation of the distance. Path loss exponent and curve fitting methods are proposed for estimation of distance from the initial training data. Further, an error reduction method is also proposed for improving the accuracy of the estimation.
这项工作是利用无线传感器网络的识别标签来确定物体的位置。这使用了分布在路径上的传感器阵列。当带有识别标签的物体经过路径时,传感器借助一系列接收信号强度指标(RSSI)值计算出与每个物体的近似距离。数据被收集并显示在提供的用户界面上。蓝牙低功耗(BLE)协议用于无线传感器网络。RSSI值通过初始训练映射到相应的距离,该数据用于估计距离。提出了路径损失指数法和曲线拟合法来估计与初始训练数据的距离。此外,为了提高估计的精度,还提出了一种减小误差的方法。
{"title":"Determination Of Microlocation Using the BLE Protocol, and Wireless Sensor Networks","authors":"Lyla B. Das, Raghu C. V., Krishna Rao, P. Srinivas, Dency Daniel, Gautham Nagireddy, S. L.","doi":"10.1109/CCCS.2018.8586813","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586813","url":null,"abstract":"This work deals with the determination of the location of an object with the help of an identification tag using wireless sensor networks. This uses an array of sensors distributed in the path. When the object with identification tag passes through the path, the sensors calculate the approximate distance from each of them with the help of a series of Received Signal Strength Indicator (RSSI) values. The data is collected and is displayed on a user interface provided. Bluetooth Low Energy (BLE) protocol is used in the wireless sensor network. The RSSI values are mapped to corresponding distances by an initial training and this data is used for estimation of the distance. Path loss exponent and curve fitting methods are proposed for estimation of distance from the initial training data. Further, an error reduction method is also proposed for improving the accuracy of the estimation.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"64-69"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78188800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plagiarism Detection Framework Using Monte Carlo Based Artificial Neural Network for Nepali Language 基于蒙特卡罗人工神经网络的尼泊尔语抄袭检测框架
R. K. Bachchan, Arun Timalsina
This research work develops two frameworks for detecting plagiarism of Nepali language literatures incorporating Monte Carlo based Artificial Neural Network (MCANN) and Backpropagation (BP) neural network, which was applied for the plagiarism detection on certain document type segment. Both the frameworks are tested on two different datasets and results were analysed and discussed. Convergence of MCANN is faster in comparison to traditional BP algorithm. MCANN algorithm achieved a convergence in the range of $10^{-2}$ to $10^{-7}$ for the training error in 40 epochs while general BP algorithm is unable to achieve such a convergence even in 400 epochs. Also, the mean accuracy of BP and MCANN are respectively found to be in the range of 98.657 and 99.864 during paragraph based and line-based comparison of the documents. Thus, MCANN is efficient for plagiarism detection in comparison to BP for Nepali language documents.
本研究开发了基于蒙特卡罗的人工神经网络(MCANN)和反向传播(BP)神经网络的尼泊尔语文献抄袭检测框架,并将其应用于特定文档类型片段的抄袭检测。这两个框架在两个不同的数据集上进行了测试,并对结果进行了分析和讨论。与传统的BP算法相比,MCANN的收敛速度更快。对于40 epoch的训练误差,MCANN算法在$10^{-2}$到$10^{-7}$范围内实现了收敛,而一般BP算法即使在400 epoch也无法实现这种收敛。基于段落和基于行比较,BP和MCANN的平均准确率分别在98.657和99.864之间。因此,与BP相比,MCANN对尼泊尔语文档的抄袭检测更有效。
{"title":"Plagiarism Detection Framework Using Monte Carlo Based Artificial Neural Network for Nepali Language","authors":"R. K. Bachchan, Arun Timalsina","doi":"10.1109/CCCS.2018.8586841","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586841","url":null,"abstract":"This research work develops two frameworks for detecting plagiarism of Nepali language literatures incorporating Monte Carlo based Artificial Neural Network (MCANN) and Backpropagation (BP) neural network, which was applied for the plagiarism detection on certain document type segment. Both the frameworks are tested on two different datasets and results were analysed and discussed. Convergence of MCANN is faster in comparison to traditional BP algorithm. MCANN algorithm achieved a convergence in the range of $10^{-2}$ to $10^{-7}$ for the training error in 40 epochs while general BP algorithm is unable to achieve such a convergence even in 400 epochs. Also, the mean accuracy of BP and MCANN are respectively found to be in the range of 98.657 and 99.864 during paragraph based and line-based comparison of the documents. Thus, MCANN is efficient for plagiarism detection in comparison to BP for Nepali language documents.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"10 1","pages":"122-127"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76342556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Exploratory Study on the Generation and Distribution of Geotagged Tweets in Nepal 尼泊尔地理标记推文生成与分布的探索性研究
B. Devkota, H. Miyazaki
Social media platforms contribute a huge part of the content available on the world wide web today. These platforms act as a rich source of real time data from live human sensors. These media disseminate spatiotemporal public opinion regarding a range of events, activities and human information behaviors. This paper explores the active user locations and spatial penetration of popular microblogging platform, Twitter, in Nepal. A heatmap visualization is used to show the intensity and distribution of the spatial patterns of Twitter activities in different parts of Nepal. Clustering is a popular technique for knowledge discovery, so spatial clustering is applied to groups tweets spatially into different classes. Such spatial clustering helps in the identification of areas of similar twitter activities and shows the distribution of the spatial patterns in different parts of Nepal. Tweet clusters are observed mainly in the main cities and the tourism centers. Further, an examination of the twitter data shared by the local Nepalese people and the foreigners are shown. This study contributes the research line by providing insights to better understand the spatiotemporal patterns and hotspots of tweets in Nepal. Such patterns and hotspots have an immense practical value that can be attributable to a place in order to derive meaningful insights related to various domains like a disease, crime, tourism, etc.
社交媒体平台贡献了当今万维网上可用内容的很大一部分。这些平台是实时人体传感器实时数据的丰富来源。这些媒介传播关于一系列事件、活动和人类信息行为的时空舆论。本文探讨尼泊尔流行的微博平台Twitter的活跃用户位置和空间渗透率。可视化热图用于显示尼泊尔不同地区Twitter活动的强度和空间分布模式。聚类是一种流行的知识发现技术,因此空间聚类可以将推文在空间上划分为不同的类。这种空间聚类有助于识别类似twitter活动的区域,并显示了尼泊尔不同地区的空间模式分布。微博集群主要分布在主要城市和旅游中心。此外,本文也检视尼泊尔本地人与外国人分享的推特资料。本研究为更好地理解尼泊尔推文的时空格局和热点提供了见解,为研究提供了线索。这些模式和热点具有巨大的实用价值,可以归因于一个地方,以便获得与疾病、犯罪、旅游等各个领域相关的有意义的见解。
{"title":"An Exploratory Study on the Generation and Distribution of Geotagged Tweets in Nepal","authors":"B. Devkota, H. Miyazaki","doi":"10.1109/CCCS.2018.8586827","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586827","url":null,"abstract":"Social media platforms contribute a huge part of the content available on the world wide web today. These platforms act as a rich source of real time data from live human sensors. These media disseminate spatiotemporal public opinion regarding a range of events, activities and human information behaviors. This paper explores the active user locations and spatial penetration of popular microblogging platform, Twitter, in Nepal. A heatmap visualization is used to show the intensity and distribution of the spatial patterns of Twitter activities in different parts of Nepal. Clustering is a popular technique for knowledge discovery, so spatial clustering is applied to groups tweets spatially into different classes. Such spatial clustering helps in the identification of areas of similar twitter activities and shows the distribution of the spatial patterns in different parts of Nepal. Tweet clusters are observed mainly in the main cities and the tourism centers. Further, an examination of the twitter data shared by the local Nepalese people and the foreigners are shown. This study contributes the research line by providing insights to better understand the spatiotemporal patterns and hotspots of tweets in Nepal. Such patterns and hotspots have an immense practical value that can be attributable to a place in order to derive meaningful insights related to various domains like a disease, crime, tourism, etc.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"39 1","pages":"70-76"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86377336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analytical Model for Secure Pairing in ad hoc Network ad hoc网络安全配对分析模型
A. Sethi, S. Vijay, J. Saini
Key pairing and enciphering heuristics must be free from complexity whereas amount of confidentiality directs the adaptability of encryption and decryption scheme because an extensive ciphertext requires extra space complexity and more communication time. Fast and secure authenticators are present in the literature. As compared to RSA, an elliptic curve in secure paring using smallest size of key is more efficient without sub-exponential attack on the Discrete Logarithmic problem. This paper focuses on analytical representation of different elliptic curves used in pairing of devices in ad-hoc network. BN, BLS and KSS curves are mostly used in the Elliptic cryptography systems. Assortment of an appropriate Hash function in elliptic curve and constraints for pairing has great impact on security level and complexity. Analytically proved the performance of BLS curve with different embedding degree in terms of computation time is fair enough.
密钥配对和加密启发式必须没有复杂性,而机密性的数量决定了加密和解密方案的适应性,因为广泛的密文需要额外的空间复杂性和更多的通信时间。快速和安全的身份验证器存在于文献中。与RSA相比,使用最小密钥大小的椭圆曲线安全配对更有效,没有对离散对数问题的次指数攻击。本文重点研究了自组织网络中不同椭圆曲线在设备配对中的解析表示。BN曲线、BLS曲线和KSS曲线主要用于椭圆密码系统。在椭圆曲线上选择合适的哈希函数和配对约束对安全性和复杂度有很大的影响。分析证明了不同嵌入度的BLS曲线在计算时间上的性能是相当合理的。
{"title":"Analytical Model for Secure Pairing in ad hoc Network","authors":"A. Sethi, S. Vijay, J. Saini","doi":"10.1109/CCCS.2018.8586830","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586830","url":null,"abstract":"Key pairing and enciphering heuristics must be free from complexity whereas amount of confidentiality directs the adaptability of encryption and decryption scheme because an extensive ciphertext requires extra space complexity and more communication time. Fast and secure authenticators are present in the literature. As compared to RSA, an elliptic curve in secure paring using smallest size of key is more efficient without sub-exponential attack on the Discrete Logarithmic problem. This paper focuses on analytical representation of different elliptic curves used in pairing of devices in ad-hoc network. BN, BLS and KSS curves are mostly used in the Elliptic cryptography systems. Assortment of an appropriate Hash function in elliptic curve and constraints for pairing has great impact on security level and complexity. Analytically proved the performance of BLS curve with different embedding degree in terms of computation time is fair enough.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"34 1","pages":"225-229"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77302098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimization of PIDA controller for AVR System Using GSA 基于GSA的AVR系统PIDA控制器优化
A. Solanki, A. Rathore
The concept of the search process of GSA (Gravitational Search Algorithm) is pageant and it’s a heuristic algorithm depends on act of motion and gravity which have anamnesia ability. Several algorithms based on metamorphic computation principals have been successfully applied to recognize the optimized parameters for an AVR systems. However, most of algorithm maintain a restraint result of an improper equilibrium between exploration and exploitation in their search strategies. This paper presents performance and design of parameters of Proportional-Integral-Derivative-Acceleration (PIDA) controller by using gravitational search algorithm and applied in electrical applications and various optimization problems like automatic voltage regulator system. GSA has showed optimum performance correlated to other algorithms as GA, PSO, and FA Method.
引力搜索算法(GSA)的搜索过程的概念是巡游式的,它是一种依赖于运动行为和重力的启发式算法,它们具有遗忘能力。基于变形计算原理的几种算法已成功地应用于AVR系统的优化参数识别。然而,大多数算法在搜索策略上保持着探索与利用不平衡的约束结果。本文介绍了用引力搜索算法设计比例-积分-导数-加速度(PIDA)控制器的性能和参数设计,并将其应用于电气应用和自动调压系统等各种优化问题。与遗传算法、粒子群算法和遗传算法相比,GSA算法表现出最优的性能。
{"title":"Optimization of PIDA controller for AVR System Using GSA","authors":"A. Solanki, A. Rathore","doi":"10.1109/CCCS.2018.8586844","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586844","url":null,"abstract":"The concept of the search process of GSA (Gravitational Search Algorithm) is pageant and it’s a heuristic algorithm depends on act of motion and gravity which have anamnesia ability. Several algorithms based on metamorphic computation principals have been successfully applied to recognize the optimized parameters for an AVR systems. However, most of algorithm maintain a restraint result of an improper equilibrium between exploration and exploitation in their search strategies. This paper presents performance and design of parameters of Proportional-Integral-Derivative-Acceleration (PIDA) controller by using gravitational search algorithm and applied in electrical applications and various optimization problems like automatic voltage regulator system. GSA has showed optimum performance correlated to other algorithms as GA, PSO, and FA Method.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"20 1","pages":"236-239"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87519606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1