首页 > 最新文献

2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)最新文献

英文 中文
Insider Attack: Internal Cyber Attack Detection Using Machine Learning 内部攻击:使用机器学习的内部网络攻击检测
P. Suresh, M. Madhavu
{"title":"Insider Attack: Internal Cyber Attack Detection Using Machine Learning","authors":"P. Suresh, M. Madhavu","doi":"10.1109/ICCCNT51525.2021.9579549","DOIUrl":"https://doi.org/10.1109/ICCCNT51525.2021.9579549","url":null,"abstract":"","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"24 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83232414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fuzzy based Scheduling approach for Efficient Sensing in IoT-Cloud 基于模糊的物联网云高效传感调度方法
Y. R. S. kumar, H. Champa
{"title":"A Fuzzy based Scheduling approach for Efficient Sensing in IoT-Cloud","authors":"Y. R. S. kumar, H. Champa","doi":"10.1109/ICCCNT51525.2021.9580105","DOIUrl":"https://doi.org/10.1109/ICCCNT51525.2021.9580105","url":null,"abstract":"","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"452 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77000675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open RnSIR model for Information Spread in Social Networks 面向社会网络信息传播的开放式RnSIR模型
N. Sumith
Mathematical model have long been used to understand several real world processes. They provide sufficient clarification and understanding. One such mathematical model in context of viral spread was epidemic model. Since then, this model has been used in various context including the spread of viral diseases in the population, information diffusion in social networks and so on. Recently, to fill in the gap seen in $SIR$ , a closed model, $R_{n}SIR$ was developed. An extension to $R_{n}SIR$ model, an open RnSIR model which includes the join and exit rates of users, is proposed in this paper. Through simulation on various social networks, the suitability of the model in mapping the information diffusion process in context of joining and exit rate of users is shown. This article discusses the dynamism of information spread and proposes a model can be used to understand spread of computer virus, the spread of epidemics.
数学模型一直被用来理解一些现实世界的过程。它们提供了足够的澄清和理解。在病毒传播的背景下,一个这样的数学模型是流行病模型。从那时起,这个模型被用于各种情况,包括病毒性疾病在人群中的传播,社交网络中的信息扩散等等。最近,为了填补$SIR$中的空白,开发了一个封闭模型$R_{n}SIR$。本文对$R_{n}SIR$模型进行了扩展,提出了一个包含用户加入率和退出率的开放RnSIR模型。通过对各种社交网络的仿真,验证了该模型在用户加入率和退出率背景下映射信息扩散过程的适用性。本文讨论了信息传播的动态性,提出了一个可以用来理解计算机病毒传播、流行病传播的模型。
{"title":"Open RnSIR model for Information Spread in Social Networks","authors":"N. Sumith","doi":"10.1109/ICCCNT49239.2020.9225316","DOIUrl":"https://doi.org/10.1109/ICCCNT49239.2020.9225316","url":null,"abstract":"Mathematical model have long been used to understand several real world processes. They provide sufficient clarification and understanding. One such mathematical model in context of viral spread was epidemic model. Since then, this model has been used in various context including the spread of viral diseases in the population, information diffusion in social networks and so on. Recently, to fill in the gap seen in $SIR$ , a closed model, $R_{n}SIR$ was developed. An extension to $R_{n}SIR$ model, an open RnSIR model which includes the join and exit rates of users, is proposed in this paper. Through simulation on various social networks, the suitability of the model in mapping the information diffusion process in context of joining and exit rate of users is shown. This article discusses the dynamism of information spread and proposes a model can be used to understand spread of computer virus, the spread of epidemics.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"20 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81619116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Soil NPK and Moisture analysis using Wireless Sensor Networks 利用无线传感器网络分析土壤氮磷钾和水分
R. Madhumathi, T. Arumuganathan, R. Shruthi
Agriculture plays a vital role in the economic development of our country. Crop yield primarily depends on soil fertility and moisture level. Fertilizers are normally recommended based on the nutrient present in the soil. To recommend a suitable fertilizer level, the soil nutrient analysis is essential which is done mostly using laboratory techniques. Manual methods of measuring soil nutrients are time consuming. Many farmers refrain to perform soil testing in the laboratory and grow the same crop in the land continuously, hence soil loses its fertility. A system has been proposed to adopt precision agriculture using Wireless Sensor Networks, which enables remote monitoring of soil fertility and other parameters namely soil moisture, pH and temperature. This data is transmitted to the cloud and the corresponding values are displayed on a mobile application. The proposed Internet of things (IoT) based software system has the intelligence to recommend the quantity of water and fertilizer which improves the quality of the soil and ensures optimum growth of the crop.
农业在我国经济发展中起着至关重要的作用。作物产量主要取决于土壤肥力和水分水平。肥料通常是根据土壤中存在的养分来推荐的。为了推荐合适的施肥水平,土壤养分分析是必不可少的,这主要是利用实验室技术完成的。人工测量土壤养分的方法很耗时。许多农民不愿在实验室里进行土壤测试,而是在土地上连续种植同一种作物,因此土壤失去了肥力。提出了一种采用无线传感器网络的精准农业系统,该系统可以远程监测土壤肥力和其他参数,即土壤水分、pH值和温度。这些数据被传输到云端,相应的值显示在移动应用程序上。提出的基于物联网(IoT)的软件系统具有智能推荐水和肥料的数量,从而改善土壤质量并确保作物的最佳生长。
{"title":"Soil NPK and Moisture analysis using Wireless Sensor Networks","authors":"R. Madhumathi, T. Arumuganathan, R. Shruthi","doi":"10.1109/ICCCNT49239.2020.9225547","DOIUrl":"https://doi.org/10.1109/ICCCNT49239.2020.9225547","url":null,"abstract":"Agriculture plays a vital role in the economic development of our country. Crop yield primarily depends on soil fertility and moisture level. Fertilizers are normally recommended based on the nutrient present in the soil. To recommend a suitable fertilizer level, the soil nutrient analysis is essential which is done mostly using laboratory techniques. Manual methods of measuring soil nutrients are time consuming. Many farmers refrain to perform soil testing in the laboratory and grow the same crop in the land continuously, hence soil loses its fertility. A system has been proposed to adopt precision agriculture using Wireless Sensor Networks, which enables remote monitoring of soil fertility and other parameters namely soil moisture, pH and temperature. This data is transmitted to the cloud and the corresponding values are displayed on a mobile application. The proposed Internet of things (IoT) based software system has the intelligence to recommend the quantity of water and fertilizer which improves the quality of the soil and ensures optimum growth of the crop.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"31 4 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82950594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Next Generation Network Coding Technique for IoT 面向物联网的下一代网络编码技术
G. Akilandeswary, J. Manickam
Recoding is the unique feature of Random Linear Network Coding (RLNC). It helps to reduce the number of transmissions. It provides low delay. RLNC is a next-generation network coding technique. Its ability to recover packet at the destination, even if there is a packet loss during transmission without retransmission. The receiver can recover back original packets at the destination. The recovery of lost packets is possible with the help of an encoding vector. The encoding vector provides sufficient information at the destination to know what coding coefficients are being used during the encoding process at the sender's side. Here I have successfully demonstrated 4 different concepts in RLNC. They are (i)Multicast sender-receiver (ii) Encode Decode using Random Coefficients (iii) Recoding (iv) Encode Decode on the fly. It is successfully implemented by using heterogeneous architecture and with the help of the Kodo network coding Library. Also, I contributed a survey on the state of the art techniques in RLNC and pointed out the advantages and disadvantages of it. The sliding window is yet another significant concept used in RLNC.
重编码是随机线性网络编码(RLNC)的独特之处。它有助于减少传播的次数。它提供低延迟。RLNC是下一代网络编码技术。它在目的地恢复数据包的能力,即使在传输过程中有数据包丢失而不重传。接收方可以在目的地恢复原始数据包。在编码向量的帮助下,可以恢复丢失的数据包。编码向量在目的地提供了足够的信息,以了解发送方在编码过程中使用了哪些编码系数。在这里,我已经成功地演示了4个不同的概念在RLNC。它们是(i)多播发送-接收(ii)使用随机系数编码解码(iii)重编码(iv)动态编码解码。在Kodo网络编码库的帮助下,采用异构架构成功实现了该系统。此外,我还贡献了一份关于RLNC技术现状的调查,并指出了它的优点和缺点。滑动窗口是RLNC中使用的另一个重要概念。
{"title":"Next Generation Network Coding Technique for IoT","authors":"G. Akilandeswary, J. Manickam","doi":"10.1109/ICCCNT49239.2020.9225314","DOIUrl":"https://doi.org/10.1109/ICCCNT49239.2020.9225314","url":null,"abstract":"Recoding is the unique feature of Random Linear Network Coding (RLNC). It helps to reduce the number of transmissions. It provides low delay. RLNC is a next-generation network coding technique. Its ability to recover packet at the destination, even if there is a packet loss during transmission without retransmission. The receiver can recover back original packets at the destination. The recovery of lost packets is possible with the help of an encoding vector. The encoding vector provides sufficient information at the destination to know what coding coefficients are being used during the encoding process at the sender's side. Here I have successfully demonstrated 4 different concepts in RLNC. They are (i)Multicast sender-receiver (ii) Encode Decode using Random Coefficients (iii) Recoding (iv) Encode Decode on the fly. It is successfully implemented by using heterogeneous architecture and with the help of the Kodo network coding Library. Also, I contributed a survey on the state of the art techniques in RLNC and pointed out the advantages and disadvantages of it. The sliding window is yet another significant concept used in RLNC.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"88 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80148786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Retinal Lesions Detection for Screening of Diabetic Retinopathy 视网膜病变检测在糖尿病视网膜病变筛查中的应用
L. AleenaS., A. PrajithC.
Diabetic retinopathy is an eye disease, which causes blindness in diabetic patients. Early detection and periodic screening of diabetic retinopathy can reduce the progress of the disease and reduce vision loss. Due to diabetic retinopathy, there are lesions in the retina. Retinal lesions are mainly dark and bright lesions. Lesions have different properties such as colour, shape, and size. Microaneurysms (MAs) and hemorrhages (HEMs) are dark lesions and exudates(EXs) are bright lesions. This work proposes a retinal lesions detection system for screening diabetic retinopathy. Top hat and bottom hat transform are used for the enhancement of the image for the dark lesion detection. The optic disc is suppressed first to facilitate further processing of bright lesion detection. Morphological opening and closing are used for the detection of the bright lesion. Two SVMs are used in this work, one SVM is used to classify the dark lesion into microaneurysms and hemorrhages, and other one classify the bright lesion into hard exudates and non-hard exudates.
糖尿病视网膜病变是一种眼病,会导致糖尿病患者失明。糖尿病视网膜病变的早期发现和定期筛查可以减少疾病的进展,减少视力丧失。由于糖尿病视网膜病变,视网膜有病变。视网膜病变以暗、亮病变为主。病变有不同的性质,如颜色、形状和大小。微动脉瘤(MAs)和出血(hem)为暗色病变,渗出物(EXs)为亮色病变。本文提出了一种用于糖尿病视网膜病变筛查的视网膜病变检测系统。采用顶帽变换和底帽变换对图像进行增强,用于暗病灶检测。视盘首先被抑制,以方便进一步处理明亮病变的检测。形态学打开和关闭用于检测明亮病变。本工作使用了两种支持向量机,一种支持向量机将深色病变分为微动脉瘤和出血,另一种支持向量机将明亮病变分为硬渗出物和非硬渗出物。
{"title":"Retinal Lesions Detection for Screening of Diabetic Retinopathy","authors":"L. AleenaS., A. PrajithC.","doi":"10.1109/ICCCNT49239.2020.9225617","DOIUrl":"https://doi.org/10.1109/ICCCNT49239.2020.9225617","url":null,"abstract":"Diabetic retinopathy is an eye disease, which causes blindness in diabetic patients. Early detection and periodic screening of diabetic retinopathy can reduce the progress of the disease and reduce vision loss. Due to diabetic retinopathy, there are lesions in the retina. Retinal lesions are mainly dark and bright lesions. Lesions have different properties such as colour, shape, and size. Microaneurysms (MAs) and hemorrhages (HEMs) are dark lesions and exudates(EXs) are bright lesions. This work proposes a retinal lesions detection system for screening diabetic retinopathy. Top hat and bottom hat transform are used for the enhancement of the image for the dark lesion detection. The optic disc is suppressed first to facilitate further processing of bright lesion detection. Morphological opening and closing are used for the detection of the bright lesion. Two SVMs are used in this work, one SVM is used to classify the dark lesion into microaneurysms and hemorrhages, and other one classify the bright lesion into hard exudates and non-hard exudates.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"14 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74622105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IR-FF-GSO: Image Retrieval using Feature Fusion and Glowworm Swarm Optimization IR-FF-GSO:基于特征融合和萤火虫群优化的图像检索
K. VenkataravanaNayak, S. Sharathkumar, J. Arunalatha, R. VenugopalK.
Image retrieval plays an important role in the Digital imaging and media such as image classification, photography, medical imaging etc., in which the obtained information is crucial for the analysis of images. Extraction of representative features is a challenge due to the variations in geometric, photometric image features. The feature fusion process affords compact discriminative features of an image; this crucial information requires in analysing images accurately to increase the accuracy. Hence, Image Retrieval using feature fusion and Glowworm Swarm Optimization (IR-FF-GSO) is proposed. Multiple features are extracted with Texture, Color, Statistical and Scale Invariant Feature Transform (SIFT) descriptors to perform retrieval process. Feature vector is fused using optimized weight value which is obtained from GSO algorithm. The proposed method yields 95.5% retrieval accuracy on ImageNet database and is accurate compared to the conventional image retrieval method by over 10% [1].
图像检索在图像分类、摄影、医学成像等数字成像和媒体中起着重要的作用,其中获取的信息对图像的分析至关重要。由于几何、光度图像特征的变化,代表性特征的提取是一个挑战。特征融合过程提供图像的紧凑的判别特征;这一关键信息需要准确地分析图像以提高准确性。为此,提出了基于特征融合和萤火虫群优化的图像检索方法。利用纹理、颜色、统计和尺度不变特征变换(SIFT)描述符提取多个特征进行检索。利用GSO算法得到的优化权值融合特征向量。该方法在ImageNet数据库上的检索准确率为95.5%,与传统的图像检索方法相比,准确率提高了10%以上。
{"title":"IR-FF-GSO: Image Retrieval using Feature Fusion and Glowworm Swarm Optimization","authors":"K. VenkataravanaNayak, S. Sharathkumar, J. Arunalatha, R. VenugopalK.","doi":"10.1109/ICCCNT49239.2020.9225493","DOIUrl":"https://doi.org/10.1109/ICCCNT49239.2020.9225493","url":null,"abstract":"Image retrieval plays an important role in the Digital imaging and media such as image classification, photography, medical imaging etc., in which the obtained information is crucial for the analysis of images. Extraction of representative features is a challenge due to the variations in geometric, photometric image features. The feature fusion process affords compact discriminative features of an image; this crucial information requires in analysing images accurately to increase the accuracy. Hence, Image Retrieval using feature fusion and Glowworm Swarm Optimization (IR-FF-GSO) is proposed. Multiple features are extracted with Texture, Color, Statistical and Scale Invariant Feature Transform (SIFT) descriptors to perform retrieval process. Feature vector is fused using optimized weight value which is obtained from GSO algorithm. The proposed method yields 95.5% retrieval accuracy on ImageNet database and is accurate compared to the conventional image retrieval method by over 10% [1].","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"63 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85585098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Underwater Image Enhancement by Multiscale Fusion Technique and Dehazing 基于多尺度融合和去雾技术的水下图像增强
C. SujithaA., A. PrajithC.
Nowadays, underwater imaging has acquired considerable attention since it finds application in underwater object identification, species life monitoring, oil/gas pipeline detection, pollution monitoring etc. Attenuation of light is one of the major problems in capturing these images. Therefore, enhancement of underwater image is an important task. Visual features of the image can be improved by various image enhancement techniques. A useful method is to build up a fusion and dehazing technique which process a degraded input image. The proposed fusion- based underwater image enhancement technique aims to provide a final picture, which overcome all the insufficiencies of the input image by considering various weight maps. This can be achieved by employing white balancing on the underwater image followed by contrast stretching correction. Then sharpening, multi scale fusion process and dehazing can be performed to improve the visual appearance.
目前,水下成像在水下目标识别、物种生命监测、油气管道检测、污染监测等方面得到了广泛的应用,受到了广泛的关注。光的衰减是捕获这些图像的主要问题之一。因此,水下图像的增强是一项重要的任务。图像的视觉特征可以通过各种图像增强技术得到改善。一种有效的方法是建立一种融合和去雾技术来处理退化的输入图像。本文提出的基于融合的水下图像增强技术旨在通过考虑各种权重图,提供一幅克服输入图像所有不足的最终图像。这可以通过在水下图像上采用白平衡,然后进行对比度拉伸校正来实现。然后进行锐化、多尺度融合和除雾处理,以改善视觉外观。
{"title":"Underwater Image Enhancement by Multiscale Fusion Technique and Dehazing","authors":"C. SujithaA., A. PrajithC.","doi":"10.1109/ICCCNT49239.2020.9225421","DOIUrl":"https://doi.org/10.1109/ICCCNT49239.2020.9225421","url":null,"abstract":"Nowadays, underwater imaging has acquired considerable attention since it finds application in underwater object identification, species life monitoring, oil/gas pipeline detection, pollution monitoring etc. Attenuation of light is one of the major problems in capturing these images. Therefore, enhancement of underwater image is an important task. Visual features of the image can be improved by various image enhancement techniques. A useful method is to build up a fusion and dehazing technique which process a degraded input image. The proposed fusion- based underwater image enhancement technique aims to provide a final picture, which overcome all the insufficiencies of the input image by considering various weight maps. This can be achieved by employing white balancing on the underwater image followed by contrast stretching correction. Then sharpening, multi scale fusion process and dehazing can be performed to improve the visual appearance.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"34 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76089076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EFUMS: Efficient File Upload and Mutli-Keyword Search over Encrypted Cloud Data EFUMS:高效的文件上传和多关键字搜索加密云数据
M. Bhavya, N. PushpaC., J. Thriveni, R. VenugopalK.
In the present era, cloud computing is built to provide many computation techniques and storage resources to the data user for later access. Data encryption is very important to ensure privacy before outsourcing it to the cloud server. Querying the cloud for encrypted data retrieval is a time-consuming process because of processing overhead and huge amount of data stored in cloud. In the existing system, the VPSearch scheme offers only verifiability of search results and privacy protection. It does not offer an efficient file uploading and index generation which consumes more time thereby slowing the searching process. It would be a challenging task to minimize the time to efficiently search on the cloud for a particular document. In order to overcome these challenges, we have proposed an efficient index generation scheme using tree based index technique with Greedy Depth-first search algorithm, that minimizes the file uploading and search time. The proposed EFUMS-Efficient File Upload and Mutli-Keyword Search over Encrypted Cloud Data scheme reduces the time taken to compute an index tree for all the files that are to be uploaded in a document and also helps to store the files in a structured tree format. This resulted in minimizing the document upload time and a faster and efficient data access using multi-keyword search.
在当今时代,云计算的建立是为了向数据用户提供许多计算技术和存储资源,供以后访问。在将数据外包给云服务器之前,数据加密对于确保隐私非常重要。由于处理开销和云中存储的大量数据,在云中查询加密数据检索是一个耗时的过程。在现有的系统中,VPSearch方案只提供搜索结果的可验证性和隐私保护。它不提供有效的文件上传和索引生成,这会消耗更多的时间,从而减慢搜索过程。最小化在云上有效搜索特定文档的时间将是一项具有挑战性的任务。为了克服这些挑战,我们提出了一种高效的索引生成方案,该方案采用基于树的索引技术和贪婪深度优先搜索算法,最大限度地减少了文件上传和搜索时间。提出的efums -高效文件上传和加密云数据上的多关键字搜索方案减少了为要在文档中上传的所有文件计算索引树的时间,也有助于以结构化树格式存储文件。这样可以最大限度地减少文档上传时间,并使用多关键字搜索实现更快、更高效的数据访问。
{"title":"EFUMS: Efficient File Upload and Mutli-Keyword Search over Encrypted Cloud Data","authors":"M. Bhavya, N. PushpaC., J. Thriveni, R. VenugopalK.","doi":"10.1109/ICCCNT49239.2020.9225653","DOIUrl":"https://doi.org/10.1109/ICCCNT49239.2020.9225653","url":null,"abstract":"In the present era, cloud computing is built to provide many computation techniques and storage resources to the data user for later access. Data encryption is very important to ensure privacy before outsourcing it to the cloud server. Querying the cloud for encrypted data retrieval is a time-consuming process because of processing overhead and huge amount of data stored in cloud. In the existing system, the VPSearch scheme offers only verifiability of search results and privacy protection. It does not offer an efficient file uploading and index generation which consumes more time thereby slowing the searching process. It would be a challenging task to minimize the time to efficiently search on the cloud for a particular document. In order to overcome these challenges, we have proposed an efficient index generation scheme using tree based index technique with Greedy Depth-first search algorithm, that minimizes the file uploading and search time. The proposed EFUMS-Efficient File Upload and Mutli-Keyword Search over Encrypted Cloud Data scheme reduces the time taken to compute an index tree for all the files that are to be uploaded in a document and also helps to store the files in a structured tree format. This resulted in minimizing the document upload time and a faster and efficient data access using multi-keyword search.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"2 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85101708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion classification using ECLAT and Fuzzy Logic 基于ECLAT和模糊逻辑的入侵分类
P. AsifAhamad, S. Jeevaraj
In today's world with the increase in internet usage, every digital gadget is getting connected to the internet. Due to the open connectivity of the internet, devices connected to the internet are exposed to the disturbances caused by masqueraders, misfeasors, malware writers, and intruders. Researchers are in the continuous search of methods to detect the attacks in the network and to introduce these methods to the low computation capability devices. In this work, it aimed at creating a disruption sensing system for identifying the disturbances caused by intruders. It will be achieved by choosing the best traffic capturing component. Then, by introducing/improving the association rule mining algorithm to identify the patterns in the data and to generate better rules. Then, by using the proposed method based on fuzzy logic and inference system to help in identifying the attack.
在当今世界,随着互联网使用的增加,每一个数字小工具都连接到互联网上。由于互联网的开放连接,连接到互联网的设备暴露在伪装者、不法行为者、恶意软件编写者和入侵者造成的干扰之下。研究人员一直在不断寻找检测网络攻击的方法,并将这些方法引入到低计算能力的设备中。在这项工作中,它旨在创建一个中断传感系统,用于识别入侵者造成的干扰。这将通过选择最佳的流量捕获组件来实现。然后,通过引入/改进关联规则挖掘算法来识别数据中的模式并生成更好的规则。然后,利用所提出的基于模糊逻辑和推理系统的方法来帮助识别攻击。
{"title":"Intrusion classification using ECLAT and Fuzzy Logic","authors":"P. AsifAhamad, S. Jeevaraj","doi":"10.1109/ICCCNT49239.2020.9225477","DOIUrl":"https://doi.org/10.1109/ICCCNT49239.2020.9225477","url":null,"abstract":"In today's world with the increase in internet usage, every digital gadget is getting connected to the internet. Due to the open connectivity of the internet, devices connected to the internet are exposed to the disturbances caused by masqueraders, misfeasors, malware writers, and intruders. Researchers are in the continuous search of methods to detect the attacks in the network and to introduce these methods to the low computation capability devices. In this work, it aimed at creating a disruption sensing system for identifying the disturbances caused by intruders. It will be achieved by choosing the best traffic capturing component. Then, by introducing/improving the association rule mining algorithm to identify the patterns in the data and to generate better rules. Then, by using the proposed method based on fuzzy logic and inference system to help in identifying the attack.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"39 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82245031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1