首页 > 最新文献

2018 International Conference on Advanced Computation and Telecommunication (ICACAT)最新文献

英文 中文
Infringement of Prevention Technique against Keyloggers using Sift Attack 基于Sift攻击的键盘记录程序侵权防范技术研究
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933805
A. Singh, Vaishali Singh
Keylogger is a spyware program that can record keystrokes and mouse click along with cursor movements for spying confidential information such as password. There are so many applications have been developed till now that recognizes keylogger programs and act like an antivirus software but there are so many keyloggers that can run without any interruption or failing antivirus programs to recognize itself. But there is a newly introduced technique has been proposed that claims for concealing password among bots key press that transforms actual password in an unreadable or encrypted patterns. But the technique can be cracked by analyzing key prints and its interval. Every time an actual keystroke conceals among few predefined bots keystrokes, but in a particular session; the same string gets printed. In a session, same encryption string can retrieve actual keystrokes or password by analyzing it and if a password is retrieved in a single session then no another encryption string can confuse keylogger or attacker because password has already been stolen that can be enrolled later. Sift attack is an attack based on deep analysis that allows extracting information on the basis of algorithm. This paper proposes a concept that can break security approach made against keylogger that may conceal passwords.
Keylogger是一种间谍软件程序,可以记录键盘敲击和鼠标点击以及光标移动,以监视密码等机密信息。有这么多的应用程序已经开发到现在,识别键盘记录程序和行为像一个杀毒软件,但有这么多的键盘记录程序,可以运行没有任何中断或失败的防病毒程序来识别自己。但有一种新引入的技术被提出,声称可以在机器人的按键中隐藏密码,将实际密码转换为不可读或加密的模式。但这项技术可以通过分析密钥指纹及其间隔来破解。每次实际的按键隐藏在几个预定义的机器人按键中,但在一个特定的会话中;打印相同的字符串。在会话中,相同的加密字符串可以通过分析它来检索实际的击键或密码,如果在单个会话中检索密码,那么没有另一个加密字符串可以混淆键盘记录器或攻击者,因为密码已经被盗,可以稍后注册。Sift攻击是一种基于深度分析的攻击,可以在算法的基础上提取信息。本文提出了一种可以突破键盘记录程序可能隐藏密码的安全方法的概念。
{"title":"Infringement of Prevention Technique against Keyloggers using Sift Attack","authors":"A. Singh, Vaishali Singh","doi":"10.1109/ICACAT.2018.8933805","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933805","url":null,"abstract":"Keylogger is a spyware program that can record keystrokes and mouse click along with cursor movements for spying confidential information such as password. There are so many applications have been developed till now that recognizes keylogger programs and act like an antivirus software but there are so many keyloggers that can run without any interruption or failing antivirus programs to recognize itself. But there is a newly introduced technique has been proposed that claims for concealing password among bots key press that transforms actual password in an unreadable or encrypted patterns. But the technique can be cracked by analyzing key prints and its interval. Every time an actual keystroke conceals among few predefined bots keystrokes, but in a particular session; the same string gets printed. In a session, same encryption string can retrieve actual keystrokes or password by analyzing it and if a password is retrieved in a single session then no another encryption string can confuse keylogger or attacker because password has already been stolen that can be enrolled later. Sift attack is an attack based on deep analysis that allows extracting information on the basis of algorithm. This paper proposes a concept that can break security approach made against keylogger that may conceal passwords.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"27 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85828058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Concentric Double Hole Shape Microstrip Patch Antenna at 3.12 GHz Resonant Frequency 3.12 GHz谐振频率的同心双孔微带贴片天线
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933754
Anurag Saxena, V. Singh, Shiv Kumar, Asim Rahman Ansari
In this paper, a co-centric double hole shape patch antenna is designed and simulated in CST software. A textile material named as “Jeans” is used as a substrate in which presented antenna is simulated. The resonant frequency of co-centric double hole shape antenna is 3.12 GHz having long bandwidth from 2.44 GHz to 12.34 GHz. The design is simulated on Partial Ground having rectangular in shape. The size of substrate is 61 x 31 mm having thickness of 1 mm and dielectric constant is 1.7. This type of textile antenna can be wearable and can be used for single band applications.
本文设计了一种同轴双孔贴片天线,并在CST软件中进行了仿真。一种名为“牛仔裤”的纺织材料被用作衬底,在衬底中模拟了所呈现的天线。同心双孔形状天线的谐振频率为3.12 GHz,带宽长,从2.44 GHz到12.34 GHz。该设计在局部矩形地面上进行了仿真。衬底尺寸为61 × 31 mm,厚度为1 mm,介电常数为1.7。这种类型的纺织天线可穿戴,可用于单波段应用。
{"title":"A Concentric Double Hole Shape Microstrip Patch Antenna at 3.12 GHz Resonant Frequency","authors":"Anurag Saxena, V. Singh, Shiv Kumar, Asim Rahman Ansari","doi":"10.1109/ICACAT.2018.8933754","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933754","url":null,"abstract":"In this paper, a co-centric double hole shape patch antenna is designed and simulated in CST software. A textile material named as “Jeans” is used as a substrate in which presented antenna is simulated. The resonant frequency of co-centric double hole shape antenna is 3.12 GHz having long bandwidth from 2.44 GHz to 12.34 GHz. The design is simulated on Partial Ground having rectangular in shape. The size of substrate is 61 x 31 mm having thickness of 1 mm and dielectric constant is 1.7. This type of textile antenna can be wearable and can be used for single band applications.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"41 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88685181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of Women Safety Band with switch over methodology using Arduino Uno 基于Arduino Uno的女性安全带切换设计与实现
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933713
P. Rai, Ayoush Johari, Shivoy Srivastava, Pooja R. Gupta
A Women safety band (WSB) is a technology used to protect women from various and unnecessary dangerous situation. This paper presents switch-over text messaging and also describes various uses advantages of women protection band and also compares the technologies developed in the field of women security. The device mainly works on the principle of global positioning system, Bluetooth, multiple functioning microcontroller and switch over methodology. Meanwhile, the device can be easily made compatible with the smartphone having an app named “ALERT” which can be downloaded from google play store.
女性安全带(WSB)是一种用于保护女性免受各种不必要危险情况的技术。本文介绍了切换短信,介绍了女性保护带的各种使用优势,并对女性安全领域发展的技术进行了比较。该装置主要利用全球定位系统、蓝牙、多功能单片机和切换方法等原理进行工作。同时,该设备可以很容易地与智能手机兼容,有一个名为“ALERT”的应用程序,可以从谷歌play商店下载。
{"title":"Design and Implementation of Women Safety Band with switch over methodology using Arduino Uno","authors":"P. Rai, Ayoush Johari, Shivoy Srivastava, Pooja R. Gupta","doi":"10.1109/ICACAT.2018.8933713","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933713","url":null,"abstract":"A Women safety band (WSB) is a technology used to protect women from various and unnecessary dangerous situation. This paper presents switch-over text messaging and also describes various uses advantages of women protection band and also compares the technologies developed in the field of women security. The device mainly works on the principle of global positioning system, Bluetooth, multiple functioning microcontroller and switch over methodology. Meanwhile, the device can be easily made compatible with the smartphone having an app named “ALERT” which can be downloaded from google play store.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"7 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84933047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Retrospect on Different side of CAPTCHA Techniques 从不同角度回顾验证码技术
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933746
Sakshi Pandey, Manoj Kumar, Vivek Kumar
In today’s digital world, security plays an important role in the field of web applications. CAPTCHA is a challenge reaction test that segregates human from machine based automatic program that may harm data credentials. It is required to protect the website or user data from different kind of machine attacks. To ensure the security, CAPTCHA is a tool through which a turing test can be performed that denied robots to intervene with the systems. CAPTCHA stands for Completely Automated Public Turing Test to tell Computers and Human Apart. Machine based attacks can harm the database by enrolling junk entries and an account can be hacked through brute force attack. By having these problems on mind, there are so many CAPTCHA techniques have been introduced such as text based CAPTCHA that involves 3D text, moving letters, distorted text and other than the text based CAPTCHA there are also graphical CAPTCHA, Audio CAPTCHA. One Time Password based CAPTCHA have been carried out for better security concerns. So, there are so many ideas have been developed till now which claim better security approach and the motive of this paper is to review the previously proposed systems that may have some bugs and complicated for human to solve in less time. The paper also emphasizes the proposed solution or system that replaces the existing system and provides better level of accuracy.
在当今的数字世界中,安全性在web应用领域中扮演着重要的角色。CAPTCHA是一种挑战反应测试,它将人类和基于机器的自动程序隔离开来,这些程序可能会损害数据凭据。它需要保护网站或用户数据免受不同类型的机器攻击。为了确保安全性,CAPTCHA是一种工具,通过它可以执行图灵测试,拒绝机器人干预系统。CAPTCHA代表完全自动化的公共图灵测试,可以区分计算机和人类。基于机器的攻击可以通过注册垃圾条目来破坏数据库,并且可以通过暴力攻击入侵帐户。考虑到这些问题,已经引入了许多验证码技术,例如基于文本的验证码,涉及3D文本,移动字母,扭曲文本,除了基于文本的验证码之外,还有图形验证码,音频验证码。基于一次性密码的CAPTCHA已经进行了更好的安全问题。因此,到目前为止,已经有很多想法提出了更好的安全方法,本文的目的是回顾以前提出的系统,这些系统可能存在一些漏洞,并且对于人类在更短的时间内解决问题来说很复杂。本文还强调了所提出的替代现有系统的解决方案或系统,并提供了更好的准确性。
{"title":"A Retrospect on Different side of CAPTCHA Techniques","authors":"Sakshi Pandey, Manoj Kumar, Vivek Kumar","doi":"10.1109/ICACAT.2018.8933746","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933746","url":null,"abstract":"In today’s digital world, security plays an important role in the field of web applications. CAPTCHA is a challenge reaction test that segregates human from machine based automatic program that may harm data credentials. It is required to protect the website or user data from different kind of machine attacks. To ensure the security, CAPTCHA is a tool through which a turing test can be performed that denied robots to intervene with the systems. CAPTCHA stands for Completely Automated Public Turing Test to tell Computers and Human Apart. Machine based attacks can harm the database by enrolling junk entries and an account can be hacked through brute force attack. By having these problems on mind, there are so many CAPTCHA techniques have been introduced such as text based CAPTCHA that involves 3D text, moving letters, distorted text and other than the text based CAPTCHA there are also graphical CAPTCHA, Audio CAPTCHA. One Time Password based CAPTCHA have been carried out for better security concerns. So, there are so many ideas have been developed till now which claim better security approach and the motive of this paper is to review the previously proposed systems that may have some bugs and complicated for human to solve in less time. The paper also emphasizes the proposed solution or system that replaces the existing system and provides better level of accuracy.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"174 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83254728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Logic Gain Factor Based Improved Switching Median Filter for Mixed Noise 基于模糊增益因子的混合噪声改进开关中值滤波器
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933617
Jagrati Gupta, S. Agrawal
Switching median filter is actively used and continuously modified by the researchers to remove noise out of corrupted images. Fuzzy based filters are under development to improve the performance of filtering. In literature survey, fuzzy based switching median filter is studied and modified it in our proposed work. Output of the fuzzy system is set to vary the value from 0 to 1 and it is considered as a gain factor for filtering process. After putting gain factor into the filtering equation, the results has been improved in terms of PSNR value as shown in results. The simulation is performed on mixed noise. Mixed noise is taken as a combination of salt & pepper noise which varies from 1% to 10% and Gaussian noise with zero mean and 0.01 variance.
切换中值滤波器被研究人员积极使用并不断改进,以去除损坏图像中的噪声。为了提高滤波性能,人们正在开发基于模糊的滤波器。在文献综述中,本文研究了基于模糊的开关中值滤波器,并对其进行了改进。将模糊系统的输出设置为在0到1之间变化,并将其作为滤波过程的增益因子。在滤波方程中加入增益因子后,结果在PSNR值方面得到了改善,如图所示。在混合噪声条件下进行了仿真。混合噪声为1% ~ 10%的椒盐噪声和均值为零、方差为0.01的高斯噪声的组合。
{"title":"Fuzzy Logic Gain Factor Based Improved Switching Median Filter for Mixed Noise","authors":"Jagrati Gupta, S. Agrawal","doi":"10.1109/ICACAT.2018.8933617","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933617","url":null,"abstract":"Switching median filter is actively used and continuously modified by the researchers to remove noise out of corrupted images. Fuzzy based filters are under development to improve the performance of filtering. In literature survey, fuzzy based switching median filter is studied and modified it in our proposed work. Output of the fuzzy system is set to vary the value from 0 to 1 and it is considered as a gain factor for filtering process. After putting gain factor into the filtering equation, the results has been improved in terms of PSNR value as shown in results. The simulation is performed on mixed noise. Mixed noise is taken as a combination of salt & pepper noise which varies from 1% to 10% and Gaussian noise with zero mean and 0.01 variance.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"62 4","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91496858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prediction of H1B Visa Using Machine Learning Algorithms 利用机器学习算法预测H1B签证
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933628
Debabrata Swain, Kushankur Chakraborty, A. Dombe, Ashitosh Ashture, N. Valakunde
The H1 B visa is the most demanded visa world-wide. The H1 B visa applications are very heavily varied across many fields i.e. job, job title, year of petition, accountable wages, city of work etc. The purpose of this research is to estimate the likelihood of visa approval on the basis of metadata provided. We shall consider all aspects by which the petition may be approved or otherwise, strictly working on the data provided in the application. The designed classifier in the after mentioned report serves a dual purpose of H1B applicants and hopeful employers to measure the probability of getting certified prior to and after applying the petition.
H1 - B签证是世界上需求量最大的签证。H1 - B签证申请在许多领域都有很大的差异,例如工作、职位、申请年份、实际工资、工作城市等。本研究的目的是在提供元数据的基础上估计签证批准的可能性。我们会考虑申请可能获批准或不获批准的所有方面,并严格按照申请书所提供的资料进行处理。在后面提到的报告中设计的分类器为H1B申请人和有希望的雇主提供了双重目的,以衡量在申请请愿之前和之后获得认证的可能性。
{"title":"Prediction of H1B Visa Using Machine Learning Algorithms","authors":"Debabrata Swain, Kushankur Chakraborty, A. Dombe, Ashitosh Ashture, N. Valakunde","doi":"10.1109/ICACAT.2018.8933628","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933628","url":null,"abstract":"The H1 B visa is the most demanded visa world-wide. The H1 B visa applications are very heavily varied across many fields i.e. job, job title, year of petition, accountable wages, city of work etc. The purpose of this research is to estimate the likelihood of visa approval on the basis of metadata provided. We shall consider all aspects by which the petition may be approved or otherwise, strictly working on the data provided in the application. The designed classifier in the after mentioned report serves a dual purpose of H1B applicants and hopeful employers to measure the probability of getting certified prior to and after applying the petition.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"59 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91186770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sentiment Analysis of Tweets Using Various Machine Learning Techniques 使用各种机器学习技术对推文进行情感分析
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933612
Ankit Tariyal, Sachin Goyal, Neeraj Tantububay
In todays e-commerce market where online shopping and tourism is fastly growing so it very important to analyze such huge amount of large data present in web. So it is very important to create a method which classify the web data. Sentiment analysis is a method to classify the web data such as product reviews, views in to various polarities such a positive, negative or neutral. In this paper we classify the reviews by using various machine learning techniques, In this we create a various classification model and compute the performance of each models and select the best classification models based on their performance computation. We will use a combination of simple linear method (LDA), nonlinear methods (CART, KNN) and complex nonlinear methods (SVM, RF, C5.0).
在网上购物和网上旅游迅速发展的今天,对网络中存在的大量大数据进行分析是非常重要的。因此,建立一种对网络数据进行分类的方法显得尤为重要。情感分析是一种将网络数据(如产品评论、观点)分类为积极、消极或中性等不同极性的方法。在本文中,我们使用各种机器学习技术对评论进行分类,在此我们创建了各种分类模型并计算每个模型的性能,并根据它们的性能计算选择最佳分类模型。我们将使用简单线性方法(LDA),非线性方法(CART, KNN)和复杂非线性方法(SVM, RF, C5.0)的组合。
{"title":"Sentiment Analysis of Tweets Using Various Machine Learning Techniques","authors":"Ankit Tariyal, Sachin Goyal, Neeraj Tantububay","doi":"10.1109/ICACAT.2018.8933612","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933612","url":null,"abstract":"In todays e-commerce market where online shopping and tourism is fastly growing so it very important to analyze such huge amount of large data present in web. So it is very important to create a method which classify the web data. Sentiment analysis is a method to classify the web data such as product reviews, views in to various polarities such a positive, negative or neutral. In this paper we classify the reviews by using various machine learning techniques, In this we create a various classification model and compute the performance of each models and select the best classification models based on their performance computation. We will use a combination of simple linear method (LDA), nonlinear methods (CART, KNN) and complex nonlinear methods (SVM, RF, C5.0).","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"32 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84165933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Application of Fruit Fly optimization Algorithm for Node Capture Attack in Wireless Sensor Network 果蝇优化算法在无线传感器网络节点捕获攻击中的应用
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933703
Ruby Bhatt, P. Maheshwary, P. Shukla
Sensors are most important concept now-a-days and Wireless sensor network (WSN) [1] is a crucial technology. But, these are susceptible to different types of physical attacks. It is assortment of miniature sized sensor nodes. The reason behind vulnerable attacks is its limited resource capacity. It is screened to external atmosphere for circulating data. Node capture attack is supposed to be severe attacks in WSN [2]. In this type, the node is substantially captured by an assailant and eradicates the secret information from the node’s storage. This paper proposes a Fruit Fly Optimization Algorithm (FFOA) [13]. It is based on multiple objectives [4] node capture attack algorithm. Proposed algorithm serves these objectives: maximum node contribution [4], maximum key contribution [4], and least resource expenses [4]. The simulation result illustrates that FFOA obtains a maximum fraction of compromised traffic, lower attacking rounds, and lower energy cost as compared with matrix algorithm (MA) [5] and other node capture attack algorithms.
传感器是当今社会最重要的概念,无线传感器网络(WSN)是其中的关键技术。但是,它们容易受到不同类型的物理攻击。它是微型传感器节点的分类。易受攻击的原因是其有限的资源容量。它被筛选到外部大气循环数据。节点捕获攻击是无线传感器网络中最严重的攻击之一。在这种类型中,攻击者基本上捕获了节点,并从节点的存储中删除了秘密信息。本文提出了一种果蝇优化算法(FFOA)[13]。它是基于[4]节点的多目标捕获攻击算法。该算法的目标是:最大节点贡献[4],最大密钥贡献[4],最小资源消耗[4]。仿真结果表明,与矩阵算法(matrix algorithm, MA)、[5]和其他节点捕获攻击算法相比,FFOA获得了最大的入侵流量比例、更少的攻击回合数和更低的能量消耗。
{"title":"Application of Fruit Fly optimization Algorithm for Node Capture Attack in Wireless Sensor Network","authors":"Ruby Bhatt, P. Maheshwary, P. Shukla","doi":"10.1109/ICACAT.2018.8933703","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933703","url":null,"abstract":"Sensors are most important concept now-a-days and Wireless sensor network (WSN) [1] is a crucial technology. But, these are susceptible to different types of physical attacks. It is assortment of miniature sized sensor nodes. The reason behind vulnerable attacks is its limited resource capacity. It is screened to external atmosphere for circulating data. Node capture attack is supposed to be severe attacks in WSN [2]. In this type, the node is substantially captured by an assailant and eradicates the secret information from the node’s storage. This paper proposes a Fruit Fly Optimization Algorithm (FFOA) [13]. It is based on multiple objectives [4] node capture attack algorithm. Proposed algorithm serves these objectives: maximum node contribution [4], maximum key contribution [4], and least resource expenses [4]. The simulation result illustrates that FFOA obtains a maximum fraction of compromised traffic, lower attacking rounds, and lower energy cost as compared with matrix algorithm (MA) [5] and other node capture attack algorithms.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"15 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83625125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey Analysis on Immunological Approach to Intrusion Detection 免疫入侵检测方法研究现状分析
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933710
Ankita Trivedi, A. Shrivastava, A. Saxena, M. Manoria
This paper evaluates the correlation between the immune system of human and systems which detects intrusion. Intrusion is an unofficial and not permitted access or action in a computer system. For detection of any of these malicious activities and for security of our computer systems, Intrusion detection technologies are becoming extremely important. The paper initiates by introducing intrusion detection systems and its types. An outline of the immune system of human is presented and the prominent features which are beneficial to the design of Intrusion detection system are analyzed. Researchers are always inspired by environment. Security of computer is no exclusion. Artificial Immune system provoked from Natural Immune system works proficiently for detecting any outer threat in a network. Human body provides two levels of defense against any foreign body. The primary layer of defense is Innate Immune system and the secondary is Adaptive Immune system.
本文评价了人体免疫系统与入侵检测系统之间的相关性。入侵是一种非官方的、不被允许进入计算机系统的行为。为了检测这些恶意活动和计算机系统的安全,入侵检测技术变得极其重要。本文首先介绍了入侵检测系统及其类型。介绍了人体免疫系统的概况,分析了人体免疫系统的突出特点,有助于入侵检测系统的设计。研究人员总是受到环境的启发。计算机的安全是不排除的。人工免疫系统是由自然免疫系统激发而来的,它能熟练地检测网络中的任何外部威胁。人体对任何异物有两层防御。第一层防御是先天免疫系统,第二层是适应性免疫系统。
{"title":"Survey Analysis on Immunological Approach to Intrusion Detection","authors":"Ankita Trivedi, A. Shrivastava, A. Saxena, M. Manoria","doi":"10.1109/ICACAT.2018.8933710","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933710","url":null,"abstract":"This paper evaluates the correlation between the immune system of human and systems which detects intrusion. Intrusion is an unofficial and not permitted access or action in a computer system. For detection of any of these malicious activities and for security of our computer systems, Intrusion detection technologies are becoming extremely important. The paper initiates by introducing intrusion detection systems and its types. An outline of the immune system of human is presented and the prominent features which are beneficial to the design of Intrusion detection system are analyzed. Researchers are always inspired by environment. Security of computer is no exclusion. Artificial Immune system provoked from Natural Immune system works proficiently for detecting any outer threat in a network. Human body provides two levels of defense against any foreign body. The primary layer of defense is Innate Immune system and the secondary is Adaptive Immune system.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"34 1","pages":"1-11"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89000305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancement of Underwater Images using Improved CLAHE 利用改进的CLAHE增强水下图像
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933665
Ashutosh Mishra, Manish Gupta, Pankaj Sharma
Basically, the contrast and sharpness of the images captured in underwater will be significantly deteriorated and diminished caused by the less perceptibility of the image which is due to the water medium’s physical properties. In this work, Improved version of CLAHE mechanism is used. In this technique, First of all input color image gets enhanced by using dynamic histogram equalization technique and then apply CLAHE technique to improve contrast of an input image. DHE technique enhances an input image without loss of imput image details. Proposed experimental results show that the accuracy of proposed technique is much more better than the previously proposed technique(Tri-threshold based fuzzy intensification operator) for under water images in terms of PSNR and entropy value.
基本上,在水下拍摄的图像的对比度和清晰度会明显变差和降低,这是由于水介质的物理性质导致图像的可感知性降低。本文采用了改进版本的CLAHE机制。该技术首先利用动态直方图均衡化技术对输入的彩色图像进行增强,然后利用CLAHE技术提高输入图像的对比度。DHE技术在不损失输入图像细节的情况下增强了输入图像。实验结果表明,本文提出的方法在PSNR和熵值两方面的精度都明显优于之前提出的方法(基于三阈值的模糊增强算子)。
{"title":"Enhancement of Underwater Images using Improved CLAHE","authors":"Ashutosh Mishra, Manish Gupta, Pankaj Sharma","doi":"10.1109/ICACAT.2018.8933665","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933665","url":null,"abstract":"Basically, the contrast and sharpness of the images captured in underwater will be significantly deteriorated and diminished caused by the less perceptibility of the image which is due to the water medium’s physical properties. In this work, Improved version of CLAHE mechanism is used. In this technique, First of all input color image gets enhanced by using dynamic histogram equalization technique and then apply CLAHE technique to improve contrast of an input image. DHE technique enhances an input image without loss of imput image details. Proposed experimental results show that the accuracy of proposed technique is much more better than the previously proposed technique(Tri-threshold based fuzzy intensification operator) for under water images in terms of PSNR and entropy value.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"163 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77062212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2018 International Conference on Advanced Computation and Telecommunication (ICACAT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1