首页 > 最新文献

2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)最新文献

英文 中文
Investigation of spectrum sensing under colored noise for cognitive radio network 认知无线电网络彩色噪声下频谱感知研究
Amit Khandelwal, Chhagan Charan
Spectrum sensing (SS) is an essential requirement in Cognitive Radio (CR) to detect licensed user (Primary user (PU)) and to access the opportunistic spectrum for unlicensed users (secondary users). Several sensing techniques are limited by multipath fading and shadowing which degrade the sensing performance. Hence noise plays an important role in spectrum sensing. Herein, we examine the condition of correlated noise based on eigenvalue technique. The consideration of Standard Condition Number (SCN) based statistics for decision that statistics are further based on Random Matrix Theory (RMT). First we analyze the eigenvalue based Marchenko-Pastur (MP) Law in presence of correlated noise. Due to degradation in performance of MP Law, new SCN based threshold is used. We analyze that the new bound increases the performance in case of correlated noise. Cooperative spectrum sensing based hard decision rule is to analysis the performance of spectrum sensing. Here, AND, OR and Majority rule is analyzed under the condition of noise correlation and also analyzed the effect of correlation on sensing performance using these rules.
频谱感知(SS)是认知无线电(CR)技术中检测授权用户(主用户)和为未授权用户(次用户)访问机会频谱的基本要求。许多传感技术受到多径衰落和阴影的限制,从而降低了传感性能。因此,噪声在频谱感知中起着重要的作用。本文研究了基于特征值技术的相关噪声条件。考虑了基于标准条件数(SCN)的统计量的决策,统计量进一步基于随机矩阵理论(RMT)。首先分析了存在相关噪声时基于特征值的马尔琴科-巴斯德定律。由于MP法的性能下降,采用了新的基于SCN的阈值。我们分析了在相关噪声的情况下,新的边界提高了性能。基于硬决策规则的协同频谱感知分析了频谱感知的性能。本文分析了噪声相关条件下的AND规则、OR规则和多数规则,并利用这些规则分析了相关性对传感性能的影响。
{"title":"Investigation of spectrum sensing under colored noise for cognitive radio network","authors":"Amit Khandelwal, Chhagan Charan","doi":"10.1109/ICCCNT.2017.8204007","DOIUrl":"https://doi.org/10.1109/ICCCNT.2017.8204007","url":null,"abstract":"Spectrum sensing (SS) is an essential requirement in Cognitive Radio (CR) to detect licensed user (Primary user (PU)) and to access the opportunistic spectrum for unlicensed users (secondary users). Several sensing techniques are limited by multipath fading and shadowing which degrade the sensing performance. Hence noise plays an important role in spectrum sensing. Herein, we examine the condition of correlated noise based on eigenvalue technique. The consideration of Standard Condition Number (SCN) based statistics for decision that statistics are further based on Random Matrix Theory (RMT). First we analyze the eigenvalue based Marchenko-Pastur (MP) Law in presence of correlated noise. Due to degradation in performance of MP Law, new SCN based threshold is used. We analyze that the new bound increases the performance in case of correlated noise. Cooperative spectrum sensing based hard decision rule is to analysis the performance of spectrum sensing. Here, AND, OR and Majority rule is analyzed under the condition of noise correlation and also analyzed the effect of correlation on sensing performance using these rules.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"65 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85645314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of convolutional neural network and recurrent neural network for anticipation of driver's conduct 卷积神经网络和递归神经网络在驾驶员行为预测中的性能
Sakshi Virmani, S. Gite
With the advancements in Internet of Things (IoT), we could efficiently improve our daily life activities like health care, monitoring, transportation, smart homes etc. Artificial Intelligence along with Machine learning has played a very supportive role to analyze various situations and take decisions accordingly. Maneuver anticipation supplements existing Advance Driver Assistance Systems (ADAS) by anticipating mishaps and giving drivers more opportunity to respond to road circumstances proactively. The capacity to sort the driver conduct is extremely beneficial for advance driver assistance system (ADAS). Deep learning solutions would further be an endeavor of for driving conduct recognition. A technique for distinguishing driver's conduct is imperative to help operative mode transition between the driver and independent vehicles. We propose a novel approach of dissecting driver's conduct by using Convolutional Neural Network (CNN), Recurrent Neural Network(RNN) and a combination of Convolutional Neural Network with Long-Short Term Memory (LSTM) that would give better results in less response time. We are likewise proposing to concentrate high level features and interpretable features depicting complex driving examples by trying CNN, RNN and then CNN with LSTM. We could improve the system accuracy to 95% by combining CNN with LSTM.
随着物联网(IoT)的发展,我们可以有效地改善我们的日常生活活动,如医疗、监控、交通、智能家居等。人工智能和机器学习在分析各种情况并做出相应决策方面发挥了非常重要的作用。机动预测是对现有高级驾驶辅助系统(ADAS)的补充,它可以预测事故,为驾驶员提供更多的机会,主动对道路情况做出反应。对驾驶员行为进行分类的能力对高级驾驶员辅助系统(ADAS)非常有益。深度学习解决方案将进一步推动行为识别的努力。一种识别驾驶员行为的技术有助于驾驶员和独立车辆之间的操作模式转换。我们提出了一种利用卷积神经网络(CNN)、循环神经网络(RNN)以及卷积神经网络与长短期记忆(LSTM)的结合来解剖驾驶员行为的新方法,该方法可以在更短的响应时间内获得更好的结果。我们同样建议通过尝试CNN、RNN和CNN与LSTM来集中描述复杂驾驶示例的高级特征和可解释特征。将CNN与LSTM相结合,可以将系统准确率提高到95%。
{"title":"Performance of convolutional neural network and recurrent neural network for anticipation of driver's conduct","authors":"Sakshi Virmani, S. Gite","doi":"10.1109/ICCCNT.2017.8204039","DOIUrl":"https://doi.org/10.1109/ICCCNT.2017.8204039","url":null,"abstract":"With the advancements in Internet of Things (IoT), we could efficiently improve our daily life activities like health care, monitoring, transportation, smart homes etc. Artificial Intelligence along with Machine learning has played a very supportive role to analyze various situations and take decisions accordingly. Maneuver anticipation supplements existing Advance Driver Assistance Systems (ADAS) by anticipating mishaps and giving drivers more opportunity to respond to road circumstances proactively. The capacity to sort the driver conduct is extremely beneficial for advance driver assistance system (ADAS). Deep learning solutions would further be an endeavor of for driving conduct recognition. A technique for distinguishing driver's conduct is imperative to help operative mode transition between the driver and independent vehicles. We propose a novel approach of dissecting driver's conduct by using Convolutional Neural Network (CNN), Recurrent Neural Network(RNN) and a combination of Convolutional Neural Network with Long-Short Term Memory (LSTM) that would give better results in less response time. We are likewise proposing to concentrate high level features and interpretable features depicting complex driving examples by trying CNN, RNN and then CNN with LSTM. We could improve the system accuracy to 95% by combining CNN with LSTM.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"5 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80879628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
To elucidate the conductive behaviour of transition metals (Mn, Fe, Co, Ni) doped C20 molecular device 阐明过渡金属(Mn, Fe, Co, Ni)掺杂C20分子器件的导电行为
Noorinder Kaur, Rupendeep Kaur
Fullerene molecular device configurations are center of allurement for varied number of electronic and transport characteristics by eccentricity of atoms epitomized in the same. In this paper, low bias conductive feature of smallest molecular device C20 has been observed using doping of transition metals. We examined the doping effect of manganese, iron, cobalt and nickel on C20 fullerene in a two probe device configuration. Using this configuration the C20 fullerene is oriented carefully between left and right gold electrodes. Transport properties were investigated and compared which highlighted the superiority of Mn doped device over pristine, Fe, Co and Ni doped C20 molecular devices.
富勒烯分子器件的结构是不同数量的电子和传输特性的中心,由原子的偏心集中在一起。本文采用过渡金属掺杂的方法,观察了最小分子器件C20的低偏置导电特性。研究了锰、铁、钴和镍在C20富勒烯上的掺杂效应。使用这种结构,C20富勒烯被小心地定向在左右金电极之间。研究和比较了Mn掺杂器件的输运性质,突出了Mn掺杂器件相对于原始、Fe、Co和Ni掺杂的C20分子器件的优越性。
{"title":"To elucidate the conductive behaviour of transition metals (Mn, Fe, Co, Ni) doped C20 molecular device","authors":"Noorinder Kaur, Rupendeep Kaur","doi":"10.1109/ICCCNT.2017.8203968","DOIUrl":"https://doi.org/10.1109/ICCCNT.2017.8203968","url":null,"abstract":"Fullerene molecular device configurations are center of allurement for varied number of electronic and transport characteristics by eccentricity of atoms epitomized in the same. In this paper, low bias conductive feature of smallest molecular device C20 has been observed using doping of transition metals. We examined the doping effect of manganese, iron, cobalt and nickel on C20 fullerene in a two probe device configuration. Using this configuration the C20 fullerene is oriented carefully between left and right gold electrodes. Transport properties were investigated and compared which highlighted the superiority of Mn doped device over pristine, Fe, Co and Ni doped C20 molecular devices.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"42 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85439709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on fundamental usage of CloudSim simulator and algorithms of resource allocation in cloud computing 云计算中CloudSim模拟器的基本用法及资源分配算法的研究
E. Rani, Harpreet Kaur
Cloud computing is an internet-based pool of heterogeneous resources. The development of Cloud is scalable and reliable to make availability of resources when required to online users. Resources are provided as a service on demand with payment done on use basis. Nowadays, for less cost and maximize resource utilization, mainly computing is done on Cloud. Cloud simulator is a collection of java classes that provides simulation of concepts of cloud computing. Cloudlet scheduling is one of the most important task in cloud computing. This paper presents fundamental study on the functions of CloudSim simulator and provides tabulated view of various scheduling algorithms used in cloud environment with their parameters and results.
云计算是一个基于互联网的异构资源池。云的开发具有可伸缩性和可靠性,可以在需要时为在线用户提供资源。资源以按需服务的形式提供,按需付费。如今,为了降低成本和最大限度地利用资源,计算主要在云上完成。云模拟器是提供云计算概念模拟的java类集合。云调度是云计算中最重要的任务之一。本文对CloudSim模拟器的功能进行了基础研究,并提供了云环境中使用的各种调度算法及其参数和结果的表格视图。
{"title":"Study on fundamental usage of CloudSim simulator and algorithms of resource allocation in cloud computing","authors":"E. Rani, Harpreet Kaur","doi":"10.1109/ICCCNT.2017.8203998","DOIUrl":"https://doi.org/10.1109/ICCCNT.2017.8203998","url":null,"abstract":"Cloud computing is an internet-based pool of heterogeneous resources. The development of Cloud is scalable and reliable to make availability of resources when required to online users. Resources are provided as a service on demand with payment done on use basis. Nowadays, for less cost and maximize resource utilization, mainly computing is done on Cloud. Cloud simulator is a collection of java classes that provides simulation of concepts of cloud computing. Cloudlet scheduling is one of the most important task in cloud computing. This paper presents fundamental study on the functions of CloudSim simulator and provides tabulated view of various scheduling algorithms used in cloud environment with their parameters and results.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"161 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85454241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A novel SVD and online sequential extreme learning machine based watermark method for copyright protection 一种新的基于奇异值分解和在线顺序极值学习机的水印版权保护方法
Neelam Dabas, R. Singh, Geethanjali Kher, Vikash Chaudhary
For the increasing use of internet, it is equally important to protect the intellectual property. And for the protection of copyright, a blind digital watermark algorithm with SVD and OSELM in the IWT domain has been proposed. During the embedding process, SVD has been applied to the coefficient blocks to get the singular values in the IWT domain. Singular values are modulated to embed the watermark in the host image. Online sequential extreme learning machine is trained to learn the relationship between the original coefficient and the corresponding watermarked version. During the extraction process, this trained OSELM is used to extract the embedded watermark logo blindly as no original host image is required during this process. The watermarked image is altered using various attacks like blurring, noise, sharpening, rotation and cropping. The experimental results show that the proposed watermarking scheme is robust against various attacks. The extracted watermark has very much similarity with the original watermark and works good to prove the ownership.
随着互联网的日益普及,保护知识产权也同样重要。为了保护版权,在小波域提出了一种基于SVD和OSELM的盲数字水印算法。在嵌入过程中,对系数块进行奇异值分解,得到小波变换域中的奇异值。通过调制奇异值将水印嵌入到主图像中。训练在线顺序极值学习机学习原始系数与相应水印版本之间的关系。在提取过程中,由于不需要原始主机图像,因此使用该训练好的OSELM对嵌入的水印进行盲提取。通过各种攻击,如模糊、噪声、锐化、旋转和裁剪,水印图像被改变。实验结果表明,所提出的水印方案对各种攻击具有较强的鲁棒性。提取的水印与原始水印有很好的相似性,可以很好地证明所有权。
{"title":"A novel SVD and online sequential extreme learning machine based watermark method for copyright protection","authors":"Neelam Dabas, R. Singh, Geethanjali Kher, Vikash Chaudhary","doi":"10.1109/ICCCNT.2017.8204019","DOIUrl":"https://doi.org/10.1109/ICCCNT.2017.8204019","url":null,"abstract":"For the increasing use of internet, it is equally important to protect the intellectual property. And for the protection of copyright, a blind digital watermark algorithm with SVD and OSELM in the IWT domain has been proposed. During the embedding process, SVD has been applied to the coefficient blocks to get the singular values in the IWT domain. Singular values are modulated to embed the watermark in the host image. Online sequential extreme learning machine is trained to learn the relationship between the original coefficient and the corresponding watermarked version. During the extraction process, this trained OSELM is used to extract the embedded watermark logo blindly as no original host image is required during this process. The watermarked image is altered using various attacks like blurring, noise, sharpening, rotation and cropping. The experimental results show that the proposed watermarking scheme is robust against various attacks. The extracted watermark has very much similarity with the original watermark and works good to prove the ownership.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"12 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82448079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel technique for converting nominal attributes to numeric attributes for intrusion detection 一种用于入侵检测的标称属性转换为数字属性的新技术
S. Samdani, Sanyam Shukla
Intrusion Detection has been a popular area of research due to increase in number of attacks. Intrusion Detection is a classification problem, in which some of the attributes are nominal. Classification algorithms like Support Vector Machine, Extreme Learning Machine, Neural Network etc. are not capable of handling nominal features. This leads to the need of method for converting nominal features to numeric features. None of research articles published till date have evaluated the appropriate method of nominal to numeric conversion for intrusion detection problem. This work explores Target Methods, Dummy Methods and Influence Value Method for Intrusion Detection to convert nominal attributes to numeric attributes. This work also proposes a new method for nominal to numeric conversion, which performs better than existing methods. The results presented in this paper evaluated using NSL-KDD.
随着入侵检测技术的不断发展,入侵检测技术已成为研究的热点。入侵检测是一个分类问题,其中一些属性是标称的。支持向量机、极限学习机、神经网络等分类算法无法处理标称特征。这导致需要将标称特征转换为数字特征的方法。迄今为止,还没有研究文章对入侵检测问题的标称到数值转换的合适方法进行评估。本文探讨了入侵检测的目标方法、虚拟方法和影响值方法,将名义属性转换为数字属性。本文还提出了一种标称到数字转换的新方法,该方法的性能优于现有方法。使用NSL-KDD对本文的结果进行了评价。
{"title":"A novel technique for converting nominal attributes to numeric attributes for intrusion detection","authors":"S. Samdani, Sanyam Shukla","doi":"10.1109/ICCCNT.2017.8204171","DOIUrl":"https://doi.org/10.1109/ICCCNT.2017.8204171","url":null,"abstract":"Intrusion Detection has been a popular area of research due to increase in number of attacks. Intrusion Detection is a classification problem, in which some of the attributes are nominal. Classification algorithms like Support Vector Machine, Extreme Learning Machine, Neural Network etc. are not capable of handling nominal features. This leads to the need of method for converting nominal features to numeric features. None of research articles published till date have evaluated the appropriate method of nominal to numeric conversion for intrusion detection problem. This work explores Target Methods, Dummy Methods and Influence Value Method for Intrusion Detection to convert nominal attributes to numeric attributes. This work also proposes a new method for nominal to numeric conversion, which performs better than existing methods. The results presented in this paper evaluated using NSL-KDD.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"11 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82100293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Portable heart attack detector 便携式心脏病探测器
Arushi Goyal, Shimony Mittal, R. Sawant, Ajay Gidhwani, J. Bagate
The word ‘Health’ has paved its way into the minds of the masses. Issues related to health are increasing at an alarming rate. Cardiovascular diseases, once considered to be a malady for the middle aged, is now prevalent among young adults. It is said that heart attack kills 1 person every 33 seconds in India [1]. The proposed model aims at detecting the occurrence of a heart attack by diagnosing the ECG signal. The chances of death due to heart attack can be greatly reduced by enabling access to immediate medical attention. This paper mainly emphasizes on collection and inspection of ECG signal for determination of a heart attack condition. Here, the survey on various behaviours and conditions observed in the ECG during heart attack would be discussed which is further processed and accordingly notified to the concerned individuals. The device aims to reduce the response time in case of occurrence of a heart attack which is crucial to prevent major damage to the distressed muscles in the heart.
“健康”一词已深入人心。与健康有关的问题正以惊人的速度增加。心血管疾病曾经被认为是中年人的病,现在在年轻人中很普遍。据说印度每33秒就有一人死于心脏病。该模型旨在通过对心电信号的诊断来检测心脏病发作的发生。由于心脏病发作而死亡的机会可以通过立即获得医疗护理而大大降低。本文主要介绍心电信号的采集和检查,以确定心脏病发作的情况。在这里,我们将讨论对心电中观察到的各种行为和情况的调查,并进一步处理并相应地通知有关个人。该装置旨在减少心脏病发作时的反应时间,这对于防止心脏肌肉受损至关重要。
{"title":"Portable heart attack detector","authors":"Arushi Goyal, Shimony Mittal, R. Sawant, Ajay Gidhwani, J. Bagate","doi":"10.1109/ICCCNT.2017.8203987","DOIUrl":"https://doi.org/10.1109/ICCCNT.2017.8203987","url":null,"abstract":"The word ‘Health’ has paved its way into the minds of the masses. Issues related to health are increasing at an alarming rate. Cardiovascular diseases, once considered to be a malady for the middle aged, is now prevalent among young adults. It is said that heart attack kills 1 person every 33 seconds in India [1]. The proposed model aims at detecting the occurrence of a heart attack by diagnosing the ECG signal. The chances of death due to heart attack can be greatly reduced by enabling access to immediate medical attention. This paper mainly emphasizes on collection and inspection of ECG signal for determination of a heart attack condition. Here, the survey on various behaviours and conditions observed in the ECG during heart attack would be discussed which is further processed and accordingly notified to the concerned individuals. The device aims to reduce the response time in case of occurrence of a heart attack which is crucial to prevent major damage to the distressed muscles in the heart.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"20 2 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82399111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comparative survey of searchable encryption schemes 可搜索加密方案的比较研究
Neha Pramanick, Syed Taqi Ali
With the fastest technology of modern life we always have to deal with numerous data in various way. We simultaneously store and retrieve data in database of large organization, email server, cloud server etc. Due to this process both the owner and user need security of the data and therefore the data is encrypted before use. Because of this encryption process, some problem arises at the time of searching and retrieving of particular data. Searchable encryption is a scheme which assures the owner and user a secure and efficient searching operation. There has been growing interest in searchable encryption in both academics and industry. Over the years different type of construction of searchable encryption have been introduced. In some of them, researchers have emphasize on the efficiency of searchable encryption technique and somewhere security and privacy have got more attention. In this paper, a comparative survey has done on various technique of searchable encryption.
随着现代生活中最快的技术,我们总是不得不以各种方式处理大量的数据。我们可以同时存储和检索大型组织的数据库、电子邮件服务器、云服务器等。由于这个过程,所有者和用户都需要数据的安全性,因此数据在使用前被加密。由于这种加密过程,在搜索和检索特定数据时会出现一些问题。可搜索加密是一种保证所有者和用户进行安全有效的搜索操作的方案。学术界和工业界对可搜索加密的兴趣日益浓厚。多年来,引入了不同类型的可搜索加密结构。其中,研究人员强调了可搜索加密技术的效率,而安全性和隐私性则受到了更多的关注。本文对各种可搜索加密技术进行了比较研究。
{"title":"A comparative survey of searchable encryption schemes","authors":"Neha Pramanick, Syed Taqi Ali","doi":"10.1109/ICCCNT.2017.8204032","DOIUrl":"https://doi.org/10.1109/ICCCNT.2017.8204032","url":null,"abstract":"With the fastest technology of modern life we always have to deal with numerous data in various way. We simultaneously store and retrieve data in database of large organization, email server, cloud server etc. Due to this process both the owner and user need security of the data and therefore the data is encrypted before use. Because of this encryption process, some problem arises at the time of searching and retrieving of particular data. Searchable encryption is a scheme which assures the owner and user a secure and efficient searching operation. There has been growing interest in searchable encryption in both academics and industry. Over the years different type of construction of searchable encryption have been introduced. In some of them, researchers have emphasize on the efficiency of searchable encryption technique and somewhere security and privacy have got more attention. In this paper, a comparative survey has done on various technique of searchable encryption.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"7 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78975987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mining top-k structural holes in multiplex networks 多路网络中top-k结构孔的挖掘
R. Mittal, M. Bhatia
Various real life social networks exhibit multiple types of interaction among entities, thus this arrangement builds a compilation of continuous growing networks called as multiplex networks. Lately, the area related to centrality measurement of entities in multiplex networks has developed a significant interest among researchers. However, the concept of structural holes has not received significant attention in multiplexed networks. The theory of structural holes suggests that “holes” acts as a bridge between individuals or groups that are otherwise disconnected. Structural hole plays an important role in information diffusion and link prediction. Although there are numerous methods defined to detect structural holes in a simple network, detecting structural holes in multiplexed network is still untouched. In this paper, we present a methodology of mining top-k structural holes from multiplexed or multi-layer networks. For the purpose of the study, we make use of two networks: airline and co-author. Our experiments provide an insight into the theory of structural holes in multiplexed network. We compare the proposed methodology with several alternative methods and we get encouraging and comparable results. We believe this is the first shot to report the problem of mining structural holes in multiplexed social networks.
各种现实生活中的社交网络在实体之间表现出多种类型的互动,因此这种排列构建了一个不断增长的网络的集合,称为多重网络。近年来,多路网络中实体的中心性测量问题引起了研究人员的极大兴趣。然而,结构空穴的概念在多路复用网络中并没有受到重视。结构洞理论认为,“洞”在个体或群体之间起着桥梁的作用,否则它们就会断开。结构洞在信息扩散和链路预测中起着重要作用。虽然在简单网络中已经定义了许多检测结构孔的方法,但在多路复用网络中检测结构孔的方法仍未触及。在本文中,我们提出了一种从多路或多层网络中挖掘top-k结构孔的方法。为了研究的目的,我们使用了两个网络:航空公司和合著者。我们的实验提供了对多路复用网络结构孔理论的深入了解。我们将所提出的方法与几种替代方法进行了比较,得到了令人鼓舞和可比较的结果。我们认为这是第一次报道在多路复用的社交网络中挖掘结构漏洞的问题。
{"title":"Mining top-k structural holes in multiplex networks","authors":"R. Mittal, M. Bhatia","doi":"10.1109/ICCCNT.2017.8204129","DOIUrl":"https://doi.org/10.1109/ICCCNT.2017.8204129","url":null,"abstract":"Various real life social networks exhibit multiple types of interaction among entities, thus this arrangement builds a compilation of continuous growing networks called as multiplex networks. Lately, the area related to centrality measurement of entities in multiplex networks has developed a significant interest among researchers. However, the concept of structural holes has not received significant attention in multiplexed networks. The theory of structural holes suggests that “holes” acts as a bridge between individuals or groups that are otherwise disconnected. Structural hole plays an important role in information diffusion and link prediction. Although there are numerous methods defined to detect structural holes in a simple network, detecting structural holes in multiplexed network is still untouched. In this paper, we present a methodology of mining top-k structural holes from multiplexed or multi-layer networks. For the purpose of the study, we make use of two networks: airline and co-author. Our experiments provide an insight into the theory of structural holes in multiplexed network. We compare the proposed methodology with several alternative methods and we get encouraging and comparable results. We believe this is the first shot to report the problem of mining structural holes in multiplexed social networks.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"33 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87470066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multi-SUs interference avoidance spectrum handover algorithm using ant colony method in cognitive radio networks 认知无线电网络中基于蚁群算法的多单元干扰避免频谱切换算法
Shefali Modi, M. Murmu
Spectrum handover (SHO) is an interesting challenge of cognitive radio networks (CRNs). SHO is initiated when current channel gets occupied by primary user (PU) and therefore secondary user (SU) transfers the task to unused channel in order to avoid application discontinuity. In this paper, we formulated a multiple SU spectrum handover scheme using ant colony optimization (ACO). We deploy a network model by graph coloring problem (GCP) and learn spectrum awareness by ant colony optimization (ACO) approach. Our scheme formulates a handover cost function that helps to take handover decision and performs fair channel assignment to maintain QoS requirements in CRN.
频谱切换(SHO)是认知无线网络(crn)面临的一个有趣挑战。SHO在当前通道被主用户(PU)占用时启动,因此从用户(SU)将任务转移到未使用的通道,以避免应用程序中断。本文提出了一种基于蚁群优化的多SU频谱切换方案。我们通过图着色问题(GCP)部署网络模型,并通过蚁群优化(ACO)方法学习频谱感知。该方案提出了一个切换代价函数,该函数有助于在CRN中做出切换决策并执行公平的信道分配,以保持QoS要求。
{"title":"Multi-SUs interference avoidance spectrum handover algorithm using ant colony method in cognitive radio networks","authors":"Shefali Modi, M. Murmu","doi":"10.1109/ICCCNT.2017.8204052","DOIUrl":"https://doi.org/10.1109/ICCCNT.2017.8204052","url":null,"abstract":"Spectrum handover (SHO) is an interesting challenge of cognitive radio networks (CRNs). SHO is initiated when current channel gets occupied by primary user (PU) and therefore secondary user (SU) transfers the task to unused channel in order to avoid application discontinuity. In this paper, we formulated a multiple SU spectrum handover scheme using ant colony optimization (ACO). We deploy a network model by graph coloring problem (GCP) and learn spectrum awareness by ant colony optimization (ACO) approach. Our scheme formulates a handover cost function that helps to take handover decision and performs fair channel assignment to maintain QoS requirements in CRN.","PeriodicalId":6581,"journal":{"name":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","volume":"2 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86993196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1