首页 > 最新文献

2018 International Conference on Advanced Computation and Telecommunication (ICACAT)最新文献

英文 中文
[Copyright notice] (版权)
Pub Date : 2018-12-01 DOI: 10.1109/icacat.2018.8933679
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icacat.2018.8933679","DOIUrl":"https://doi.org/10.1109/icacat.2018.8933679","url":null,"abstract":"","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82759603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Market Capitalization Predictive System Using Deep Learning 基于深度学习的智能市值预测系统
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933727
Jayasri Santhappan, P. Chokkalingam
Business forecast is a biggest factor which generally affects the economical condition of any Financial Industry. If the forecast model is not a better one then it can cause liquidation and spoil the trust of customers in the market. Early predictions based on social media clients’ opinion plays a major role in order to reduce risk on business and keep the trust of customer. According to the survey done by Fintech’s world topic analysis is treated as one of the vital factor used for the determination of client’s trends and for forecast analysis. Here we have performed a comparative analysis upon the social media data provide by Twitter in order to get an idea about the perception and understanding of clients’ requirements across the world. For the experimentation purpose we have used Tweeter data for tweet analysis, for stock price we have yahoo finance data and for number of stocks we have used morning star data set. For the processing of Tweets given by the clients we have built an automated system using Deep Learning. Here the problem is divided in to 2 parts. In first part Text classification is done using Tensorflow and Keras, Latent Dirichlet allocation (LDA), Natural Language Toolkit (NLTK-NLP).In this part using topic analysis the past tweet history is analyzed. In second part we are predicting forecastto identify multiple key business factors using Long Short term Memory (LSTM) using python/Rto. The actual aim of the system is to discover the effect of 3 fundamental parameters like security breaches, innovation, and stock exchange which are present in tweet given by the customers. Here the analysis is done on the last ten years tweets given by the clients for prediction of upcoming seven-day as well as monthly Market Cap. The actual intention of the work done here is to uncover the major diversity among two banks and bridge up the 3 gaps data breach, innovation and stock exchange in the available models. The latest information obtained in the system offers advantages to both Bank and customers to forecast Market value for the unbeaten estimation. We have obtained a prediction accuracy of 70.74% and 54.55% for monthly prediction and for weekly prediction we have obtained accuracy of 83.44% and 76.06% for Bank A and Bank B.
商业预测是影响任何金融行业经济状况的最大因素。如果预测模型不是一个更好的模型,那么它可能会导致清算,并破坏客户对市场的信任。基于社交媒体客户意见的早期预测对于降低业务风险和保持客户信任起着重要作用。根据Fintech的调查,世界主题分析被视为确定客户趋势和预测分析的重要因素之一。在这里,我们对Twitter提供的社交媒体数据进行了对比分析,以了解世界各地对客户需求的感知和理解。为了实验目的,我们使用twitter数据进行tweet分析,对于股票价格我们使用雅虎金融数据,对于股票数量我们使用晨星数据集。为了处理客户端提供的tweet,我们使用深度学习构建了一个自动化系统。这里的问题分为两部分。在第一部分中,文本分类使用Tensorflow和Keras,潜在狄利克雷分配(LDA),自然语言工具包(NLTK-NLP)完成。本部分采用话题分析法对过去的推文历史进行分析。在第二部分中,我们将使用python/Rto使用长短期记忆(LSTM)来预测识别多个关键业务因素。该系统的实际目的是发现三个基本参数的影响,如安全漏洞,创新和股票交易所,这些参数存在于客户提供的tweet中。这里的分析是对客户提供的过去十年的推文进行的,以预测即将到来的七天和每月的市值。这里所做的工作的实际意图是揭示两家银行之间的主要多样性,并在可用模型中弥补数据泄露,创新和股票交易的3个差距。系统所提供的最新资料,为银行及客户预测市场价值提供了有利条件。我们对a银行和B银行的月预测准确率分别为70.74%和54.55%,周预测准确率分别为83.44%和76.06%。
{"title":"An Intelligent Market Capitalization Predictive System Using Deep Learning","authors":"Jayasri Santhappan, P. Chokkalingam","doi":"10.1109/ICACAT.2018.8933727","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933727","url":null,"abstract":"Business forecast is a biggest factor which generally affects the economical condition of any Financial Industry. If the forecast model is not a better one then it can cause liquidation and spoil the trust of customers in the market. Early predictions based on social media clients’ opinion plays a major role in order to reduce risk on business and keep the trust of customer. According to the survey done by Fintech’s world topic analysis is treated as one of the vital factor used for the determination of client’s trends and for forecast analysis. Here we have performed a comparative analysis upon the social media data provide by Twitter in order to get an idea about the perception and understanding of clients’ requirements across the world. For the experimentation purpose we have used Tweeter data for tweet analysis, for stock price we have yahoo finance data and for number of stocks we have used morning star data set. For the processing of Tweets given by the clients we have built an automated system using Deep Learning. Here the problem is divided in to 2 parts. In first part Text classification is done using Tensorflow and Keras, Latent Dirichlet allocation (LDA), Natural Language Toolkit (NLTK-NLP).In this part using topic analysis the past tweet history is analyzed. In second part we are predicting forecastto identify multiple key business factors using Long Short term Memory (LSTM) using python/Rto. The actual aim of the system is to discover the effect of 3 fundamental parameters like security breaches, innovation, and stock exchange which are present in tweet given by the customers. Here the analysis is done on the last ten years tweets given by the clients for prediction of upcoming seven-day as well as monthly Market Cap. The actual intention of the work done here is to uncover the major diversity among two banks and bridge up the 3 gaps data breach, innovation and stock exchange in the available models. The latest information obtained in the system offers advantages to both Bank and customers to forecast Market value for the unbeaten estimation. We have obtained a prediction accuracy of 70.74% and 54.55% for monthly prediction and for weekly prediction we have obtained accuracy of 83.44% and 76.06% for Bank A and Bank B.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"33 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90531407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advance Malware Analysis Using Static and Dynamic Methodology 使用静态和动态方法的高级恶意软件分析
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933769
Saurabh
As we are becoming more and more dependent on computers the attack vectors on them are increasing day by day. The cyberspace is becoming the battlefield of the 21st century as we are witnessing the increasing potential of a cyber-attack on the critical infrastructure. Malware are the most sophisticated evil code It is designed to damage computer systems without the knowledge of the owner these days malware are made up with special arbitrary to evade detection from the antivirus [1] with a huge potential to damage computer systems. Malware analysis is a process for studying the components and the behavior of malware. For analyzing malware we will use two types of methods static analysis and the dynamic analysis. In the static analysis the malware are examined without running it, whereas in dynamic analysis the malware is analyzed while running it in a virtual and controlled environment. In this research we are going to focus on malware analysis using the static and the dynamic method which will help us to access damage, to know the indicators of compromise and to determine the sophistication level of an intruder and to catch the creator of the malware.
随着我们对计算机的依赖程度越来越高,针对计算机的攻击手段也日益增多。网络空间正在成为21世纪的战场,因为我们正在目睹对关键基础设施进行网络攻击的可能性越来越大。恶意软件是最复杂的邪恶代码,它的目的是破坏计算机系统不知情的所有者,这些天的恶意软件是由特殊的任意逃避检测从反病毒[1]具有巨大的潜力,破坏计算机系统。恶意软件分析是研究恶意软件的组成和行为的过程。为了分析恶意软件,我们将使用两种类型的方法静态分析和动态分析。在静态分析中,恶意软件在不运行的情况下进行检查,而在动态分析中,恶意软件在虚拟和受控环境中运行时进行分析。在这项研究中,我们将专注于使用静态和动态方法进行恶意软件分析,这将有助于我们访问损害,了解折衷指标,确定入侵者的复杂程度,并抓住恶意软件的创建者。
{"title":"Advance Malware Analysis Using Static and Dynamic Methodology","authors":"Saurabh","doi":"10.1109/ICACAT.2018.8933769","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933769","url":null,"abstract":"As we are becoming more and more dependent on computers the attack vectors on them are increasing day by day. The cyberspace is becoming the battlefield of the 21st century as we are witnessing the increasing potential of a cyber-attack on the critical infrastructure. Malware are the most sophisticated evil code It is designed to damage computer systems without the knowledge of the owner these days malware are made up with special arbitrary to evade detection from the antivirus [1] with a huge potential to damage computer systems. Malware analysis is a process for studying the components and the behavior of malware. For analyzing malware we will use two types of methods static analysis and the dynamic analysis. In the static analysis the malware are examined without running it, whereas in dynamic analysis the malware is analyzed while running it in a virtual and controlled environment. In this research we are going to focus on malware analysis using the static and the dynamic method which will help us to access damage, to know the indicators of compromise and to determine the sophistication level of an intruder and to catch the creator of the malware.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"44 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74076110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Statistical Analysis of Data for Dissolved Gases in Transformer 变压器溶解气体数据的统计分析
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933700
Navneet Bhargava, Aparna R. Gupta, Litesh Bopche
The Genetic Algorithm is practical to resolve the obstacles of tiny samples and provide better prognostication for non linear behaviors and it is desirable for the Dissolved Gas Analysis in Power Transformers. The GA generates the initial accumulation at random prosper and scrutiny space faster and modifies the global search cognition and convergent speed. As question arises whether the data was nonlinear or not? It was decided to do the data analysis first. Thus the gas concentration in ppm (parts per million) of all the DGA samples was checked for non linearity.
遗传算法在解决小样本障碍和非线性行为预测方面具有较好的实用性,是电力变压器溶解气体分析的理想方法。该算法能够更快地在随机搜索空间和审查空间生成初始积累,提高全局搜索认知和收敛速度。问题是数据是否是非线性的?决定先做数据分析。因此,所有DGA样品的气体浓度以ppm(百万分之一)为单位进行非线性检查。
{"title":"Statistical Analysis of Data for Dissolved Gases in Transformer","authors":"Navneet Bhargava, Aparna R. Gupta, Litesh Bopche","doi":"10.1109/ICACAT.2018.8933700","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933700","url":null,"abstract":"The Genetic Algorithm is practical to resolve the obstacles of tiny samples and provide better prognostication for non linear behaviors and it is desirable for the Dissolved Gas Analysis in Power Transformers. The GA generates the initial accumulation at random prosper and scrutiny space faster and modifies the global search cognition and convergent speed. As question arises whether the data was nonlinear or not? It was decided to do the data analysis first. Thus the gas concentration in ppm (parts per million) of all the DGA samples was checked for non linearity.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"11 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74418100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sixth Sense Teaching Aid 第六感教具
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933732
S. Chaman, Aniket Ghadi, Ninad Ketkar
This paper proposes a novel Sixth Sense Teaching Aid (SSTA) which incorporates sixth sense technology in projectors for educational purpose. The Projector-PC system was earlier used only for displaying the presentations but with the aid of the proposed system, users can touch on any projected surfaces for interaction purpose. In the SSTA system, the graphical user interface (GUI) buttons are projected on any flat surface like wall and it deals with touch detection of the projected screen using red color parameter both for still image and real time images. The algorithm to perform touch detection is executed in two stages: 1) Feature extraction and button’s touch detection using red color thresholding algorithm which reduces the computational complexity of the processing module; and 2) Performance of assigned operation according to touch action judgment. New born technology named Sixth Sense technology is also implemented in SSTAfor getting relevant information from the internet, whenever we touch any projected Figure or headline. The proposed SSTA system is able to do real time touch detection with 97 percent accuracy which is demonstrated through projected GUI and using a data set collected under different settings of illumination variation, hand orientation and occlusion.
本文提出了一种将第六感技术应用于投影仪的新型第六感教具(SSTA)。投影仪-个人电脑系统早先仅用于显示演示文稿,但在拟议系统的帮助下,用户可以触摸任何投影表面以进行交互。在SSTA系统中,图形用户界面(GUI)按钮投影在任何平面上,如墙壁,它处理投影屏幕的触摸检测使用红色参数对静止图像和实时图像。触摸检测算法分两个阶段执行:1)特征提取和按钮触摸检测,采用红色阈值算法,降低了处理模块的计算复杂度;2)根据触摸动作判断执行指定操作。新诞生的技术第六感技术也被应用于ssta,当我们触摸到任何投影的数字或标题时,它可以从互联网上获取相关信息。所提出的SSTA系统能够以97%的准确率进行实时触摸检测,这通过投影GUI和使用在不同光照变化,手方向和遮挡设置下收集的数据集来证明。
{"title":"Sixth Sense Teaching Aid","authors":"S. Chaman, Aniket Ghadi, Ninad Ketkar","doi":"10.1109/ICACAT.2018.8933732","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933732","url":null,"abstract":"This paper proposes a novel Sixth Sense Teaching Aid (SSTA) which incorporates sixth sense technology in projectors for educational purpose. The Projector-PC system was earlier used only for displaying the presentations but with the aid of the proposed system, users can touch on any projected surfaces for interaction purpose. In the SSTA system, the graphical user interface (GUI) buttons are projected on any flat surface like wall and it deals with touch detection of the projected screen using red color parameter both for still image and real time images. The algorithm to perform touch detection is executed in two stages: 1) Feature extraction and button’s touch detection using red color thresholding algorithm which reduces the computational complexity of the processing module; and 2) Performance of assigned operation according to touch action judgment. New born technology named Sixth Sense technology is also implemented in SSTAfor getting relevant information from the internet, whenever we touch any projected Figure or headline. The proposed SSTA system is able to do real time touch detection with 97 percent accuracy which is demonstrated through projected GUI and using a data set collected under different settings of illumination variation, hand orientation and occlusion.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"19 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87245861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified Z-Shape MSA with DGS for WLAN Ranges 改进的z形MSA与DGS的WLAN范围
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933794
Abhiruchi Rathi, Neenansha Jain
Microstrip patch antenna plays a vital role in WLAN communication, mobile communication, 3G, 4G, and WiFi, WI-MAX devices in different range. Z-shape microstrip patch antenna is very interesting shape for researchers. In this research work proposed a Z-shape microstrip antenna (MSA), and apply defected ground structure (DGS) on the ground side. Designed antenna is a dual band antenna that is intended to work at 1 to 10 GHz and shows good result in this range. After modelling and simulation, designed, implemented. These results are compared with different previous design on the basis of return loss (S-11) VSWR and other antenna parameters.
微带贴片天线在WLAN通信、移动通信、3G、4G以及不同范围的WiFi、WI-MAX设备中发挥着至关重要的作用。z型微带贴片天线是一种非常有趣的天线形状。本文提出了一种z形微带天线(MSA),并在地侧采用缺陷接地结构(DGS)。设计的天线为双频天线,工作频率为1 ~ 10ghz,在此范围内工作效果良好。经过建模和仿真,设计、实现。基于回波损耗(S-11)和其他天线参数,将这些结果与以往不同设计进行了比较。
{"title":"Modified Z-Shape MSA with DGS for WLAN Ranges","authors":"Abhiruchi Rathi, Neenansha Jain","doi":"10.1109/ICACAT.2018.8933794","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933794","url":null,"abstract":"Microstrip patch antenna plays a vital role in WLAN communication, mobile communication, 3G, 4G, and WiFi, WI-MAX devices in different range. Z-shape microstrip patch antenna is very interesting shape for researchers. In this research work proposed a Z-shape microstrip antenna (MSA), and apply defected ground structure (DGS) on the ground side. Designed antenna is a dual band antenna that is intended to work at 1 to 10 GHz and shows good result in this range. After modelling and simulation, designed, implemented. These results are compared with different previous design on the basis of return loss (S-11) VSWR and other antenna parameters.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"29 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87167079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining on Relationships in Big Data era using Improve Apriori Algorithm with MapReduce Approach 基于MapReduce改进Apriori算法的大数据时代关系挖掘
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933674
K. Pandey, D. Shukla
The current time technology is growing very faster and data is generating very fast so data characteristics have changed in form of data to big data. If anybody wants to mine some related data in big data environment then present data mining algorithm fails to mine relationship in big data and it takes a lot of time for processing. MapReduce approach is a most efficient algorithm in big data framework which handles a huge amount of data and gives fast result. The Apriori algorithm is more powerful algorithm for mining on interesting relationships between dataset in any type of databases or same databases. In present time a lot of MapReduce base Apriori algorithms are available but its Map and Reduce function run to multiple times and works only for the transaction database. This paper describes what is big data with its characteristics, concept of Association rules with the Apriori algorithm in big data, problems in the existing MapReduce base Apriori algorithm. We propose new improve MapReduce approach base Apriori algorithm for mining on a relationship with the help of given one suitable example where Reduce function runs only one time after running on Map function and this proposed algorithm run on any type of database.
当今时代技术发展速度非常快,数据产生速度非常快,因此数据的特征已经从数据的形式转变为大数据。如果有人想在大数据环境中挖掘一些相关数据,那么现有的数据挖掘算法无法挖掘大数据中的关系,并且需要花费大量的时间进行处理。MapReduce方法是大数据框架中最有效的一种算法,它可以处理大量的数据并给出快速的结果。Apriori算法是一种更强大的算法,可以挖掘任何类型数据库或相同数据库中数据集之间的有趣关系。目前有很多基于Apriori的MapReduce算法,但它的Map和Reduce函数只能运行多次,并且只适用于事务数据库。本文介绍了什么是大数据及其特点,大数据中关联规则与Apriori算法的概念,现有MapReduce基础Apriori算法存在的问题。我们提出了一种新的改进MapReduce方法,基于Apriori算法来挖掘关系,并给出了一个合适的例子,其中Reduce函数在Map函数上运行后只运行一次,并且该算法可以在任何类型的数据库上运行。
{"title":"Mining on Relationships in Big Data era using Improve Apriori Algorithm with MapReduce Approach","authors":"K. Pandey, D. Shukla","doi":"10.1109/ICACAT.2018.8933674","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933674","url":null,"abstract":"The current time technology is growing very faster and data is generating very fast so data characteristics have changed in form of data to big data. If anybody wants to mine some related data in big data environment then present data mining algorithm fails to mine relationship in big data and it takes a lot of time for processing. MapReduce approach is a most efficient algorithm in big data framework which handles a huge amount of data and gives fast result. The Apriori algorithm is more powerful algorithm for mining on interesting relationships between dataset in any type of databases or same databases. In present time a lot of MapReduce base Apriori algorithms are available but its Map and Reduce function run to multiple times and works only for the transaction database. This paper describes what is big data with its characteristics, concept of Association rules with the Apriori algorithm in big data, problems in the existing MapReduce base Apriori algorithm. We propose new improve MapReduce approach base Apriori algorithm for mining on a relationship with the help of given one suitable example where Reduce function runs only one time after running on Map function and this proposed algorithm run on any type of database.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"59 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84484259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reliable Function used to Improved Security by Eliminating Malicious Nodes in VANET 利用可靠功能消除VANET中的恶意节点,提高安全性
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933798
Raksha Tiwari, Tripti Saxena
Vehicular ad hoc network is a rising direction of research in improves network and communication. It is a type of ad hoc network in which there is a decentralized type ofwireless network. It is a communication less which makes them powerless against assaults like dos. The incoming traffic flooding the victim originates from many different sources. this effectively makes it impossible to stop the attack simply by blocking a single source. an existing paper they used maliciousand irrelevant packet detection algorithm for detecting malicious node on the basis of node velocity and the frequency of packet generated depend on node maximum velocity. Basically vehicles move with speedy which cannot efficaciousrecognize malicious nodes. in our proposed work, we calculatethe average speed of vehicles and check the performance ofvehicles so that we can recognize the true malicious nodes thenapplying reliable function to detect malicious nodes. In our results, we improved packet delivery ratio, routing overheadand throughput of the network.
车载自组织网络是改进网络和通信的一个新兴研究方向。它是一种自组织网络,其中有一种分散类型的无线网络。这是一种交流的减少,使他们对像dos这样的攻击无能为力。淹没受害者的传入流量来自许多不同的来源。这有效地使得仅仅通过阻止单个源来阻止攻击是不可能的。在已有的一篇论文中,他们采用基于节点速度的恶意无关数据包检测算法来检测恶意节点,而生成数据包的频率取决于节点的最大速度。车辆移动速度较快,无法有效识别恶意节点。在我们提出的工作中,我们计算车辆的平均速度并检查车辆的性能,以便我们能够识别真正的恶意节点,然后应用可靠的功能来检测恶意节点。在我们的结果中,我们改进了数据包传送率、路由开销和网络吞吐量。
{"title":"Reliable Function used to Improved Security by Eliminating Malicious Nodes in VANET","authors":"Raksha Tiwari, Tripti Saxena","doi":"10.1109/ICACAT.2018.8933798","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933798","url":null,"abstract":"Vehicular ad hoc network is a rising direction of research in improves network and communication. It is a type of ad hoc network in which there is a decentralized type ofwireless network. It is a communication less which makes them powerless against assaults like dos. The incoming traffic flooding the victim originates from many different sources. this effectively makes it impossible to stop the attack simply by blocking a single source. an existing paper they used maliciousand irrelevant packet detection algorithm for detecting malicious node on the basis of node velocity and the frequency of packet generated depend on node maximum velocity. Basically vehicles move with speedy which cannot efficaciousrecognize malicious nodes. in our proposed work, we calculatethe average speed of vehicles and check the performance ofvehicles so that we can recognize the true malicious nodes thenapplying reliable function to detect malicious nodes. In our results, we improved packet delivery ratio, routing overheadand throughput of the network.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"20 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81750468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concept Detection using Multiple Feature Set and Classifiers 基于多特征集和分类器的概念检测
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933574
Nita Patil, S. Sawarkar
Visual concept detection is the task of determining concept present in image or video by extracting low level features and training of classifiers in general. Researchers have used various features and classifiers for concept detection. In this paper performance evaluation of fusion of features and classifier is presented. Color moment, HSV histogram, wavelet transform and combination of these features have been used in proposed system. Artificial Neural Network (ANN) and Support Vector Machine (SVM) are employed for classification. The proposed system is implemented on Corel 1K image dataset and Trecvid 2007 benchmark video dataset. The system performance is evaluated using predictive measures of precision, recall and f score. Using simple fusion of features average precision of SVM classifier is better than ANN. The proposed global feature fusion based method is simple yet effective in concept detection task.
视觉概念检测通常是通过提取低层次特征和训练分类器来确定图像或视频中存在的概念。研究人员已经使用了各种特征和分类器来进行概念检测。本文对特征与分类器融合的性能进行了评价。该系统采用了颜色矩、HSV直方图、小波变换以及这些特征的组合。采用人工神经网络(ANN)和支持向量机(SVM)进行分类。该系统在Corel 1K图像数据集和trevid 2007基准视频数据集上实现。系统性能的评估使用精度,召回率和f分数的预测措施。使用简单的特征融合,SVM分类器的平均精度优于人工神经网络。提出的基于全局特征融合的概念检测方法简单有效。
{"title":"Concept Detection using Multiple Feature Set and Classifiers","authors":"Nita Patil, S. Sawarkar","doi":"10.1109/ICACAT.2018.8933574","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933574","url":null,"abstract":"Visual concept detection is the task of determining concept present in image or video by extracting low level features and training of classifiers in general. Researchers have used various features and classifiers for concept detection. In this paper performance evaluation of fusion of features and classifier is presented. Color moment, HSV histogram, wavelet transform and combination of these features have been used in proposed system. Artificial Neural Network (ANN) and Support Vector Machine (SVM) are employed for classification. The proposed system is implemented on Corel 1K image dataset and Trecvid 2007 benchmark video dataset. The system performance is evaluated using predictive measures of precision, recall and f score. Using simple fusion of features average precision of SVM classifier is better than ANN. The proposed global feature fusion based method is simple yet effective in concept detection task.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"123 2 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88493745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Secure Data Aggregation in IoT using Particle Swarm Optimization Algorithm 一种基于粒子群优化算法的物联网安全数据聚合方法
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933784
Neeraj Chandnani, C. N. Khairnar
Internet of Things (IoT) is a network paradigm in which data aggregation and data security plays a vital role. Data aggregation in IoT describes collection of information from different users and data security means encryption of collected data using cryptography method. The proposed work comprises of devices and gateway to perform data aggregation and data encryption. Data aggregation is performed using clustering in which data are clustered and secured by Particle Swarm Optimization (PSO) algorithm which finds the cluster head. After finding cluster head, nodes requests to join as cluster member. PSO computes fitness function using metrics i.e. energy, end-to-end delay, scoring factor, packet drops and successful packet transformation. After completion of clustering process, data encryption process is held in which, cluster head collects data from the cluster members and encrypts it using Elliptic Curve Cryptography (ECC) method. Finally, encrypted data are dispatched to gateway device. Experimental result shows, the proposed work on Secure Particle Swarm Optimization (SPSO)prompts better performance in following metrics i.e. delay, throughput and energy consumption.
物联网(IoT)是一种网络范式,数据聚合和数据安全在其中起着至关重要的作用。物联网中的数据聚合是指对来自不同用户的信息进行收集,数据安全是指对收集到的数据使用加密方法进行加密。提出的工作包括执行数据聚合和数据加密的设备和网关。数据聚合采用聚类方法进行,其中数据由粒子群优化算法(PSO)进行聚类和保护,PSO算法查找簇头。在找到集群头之后,节点请求加入为集群成员。粒子群算法利用能量、端到端延迟、评分因子、丢包和成功的包转换等度量来计算适应度函数。聚类过程完成后,进行数据加密过程,簇头从集群成员中收集数据,并使用椭圆曲线加密(ECC)方法进行加密。最后,将加密的数据发送到网关设备。实验结果表明,所提出的安全粒子群优化方法在延迟、吞吐量和能耗等指标上都有较好的性能。
{"title":"A Novel Secure Data Aggregation in IoT using Particle Swarm Optimization Algorithm","authors":"Neeraj Chandnani, C. N. Khairnar","doi":"10.1109/ICACAT.2018.8933784","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933784","url":null,"abstract":"Internet of Things (IoT) is a network paradigm in which data aggregation and data security plays a vital role. Data aggregation in IoT describes collection of information from different users and data security means encryption of collected data using cryptography method. The proposed work comprises of devices and gateway to perform data aggregation and data encryption. Data aggregation is performed using clustering in which data are clustered and secured by Particle Swarm Optimization (PSO) algorithm which finds the cluster head. After finding cluster head, nodes requests to join as cluster member. PSO computes fitness function using metrics i.e. energy, end-to-end delay, scoring factor, packet drops and successful packet transformation. After completion of clustering process, data encryption process is held in which, cluster head collects data from the cluster members and encrypts it using Elliptic Curve Cryptography (ECC) method. Finally, encrypted data are dispatched to gateway device. Experimental result shows, the proposed work on Secure Particle Swarm Optimization (SPSO)prompts better performance in following metrics i.e. delay, throughput and energy consumption.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"112 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86758220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2018 International Conference on Advanced Computation and Telecommunication (ICACAT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1