首页 > 最新文献

2017 International Conference on Computing, Communication and Automation (ICCCA)最新文献

英文 中文
A framework for assessing the evolvability characteristics along with sub-characteristics in AOSQ model using fuzzy logic tool 利用模糊逻辑工具对AOSQ模型的演化特征及其子特征进行评估
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229839
Pankaj Kumar, S. K. Singh
Over the past few decades, IT industry has faced the difficulties of evolving their software systems in order to live on the market and to compete with similar software systems. For software systems to live on market, they should derived new additional design requirements and concert themselves to the new evolving environment. Evolvability is most crucial and essential attribute to evaluate the software development. Due to gradual development of system, the AOP-based software moves closer to researcher and practitioner. It is sufficient straightforward to reuse the system than developing the new system. Evolvability reduces the different factors like development cost, time (i.e. installation and access), maintenance and effort of software system. This paper explores a framework to assess and verification of evolvability in AOSQ model using fuzzy logic toolbox. All the values of evolvability and its related characteristics are calculated by analytic hierarchy process (AHP) tool.
在过去的几十年里,IT行业为了在市场上生存并与类似的软件系统竞争,一直面临着软件系统发展的困难。为了使软件系统在市场上生存,它们应该派生出新的附加设计需求,并使自己适应新的发展环境。可发展性是评价软件开发的最重要、最基本的属性。由于系统的逐步发展,基于aop的软件离研究者和实践者越来越近。重用系统比开发新系统更直接。可演化性减少了软件系统的开发成本、时间(即安装和访问)、维护和工作量等不同因素。本文利用模糊逻辑工具箱探索了一种评估和验证AOSQ模型可演化性的框架。利用层次分析法(AHP)计算了所有可进化性值及其相关特征。
{"title":"A framework for assessing the evolvability characteristics along with sub-characteristics in AOSQ model using fuzzy logic tool","authors":"Pankaj Kumar, S. K. Singh","doi":"10.1109/CCAA.2017.8229839","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229839","url":null,"abstract":"Over the past few decades, IT industry has faced the difficulties of evolving their software systems in order to live on the market and to compete with similar software systems. For software systems to live on market, they should derived new additional design requirements and concert themselves to the new evolving environment. Evolvability is most crucial and essential attribute to evaluate the software development. Due to gradual development of system, the AOP-based software moves closer to researcher and practitioner. It is sufficient straightforward to reuse the system than developing the new system. Evolvability reduces the different factors like development cost, time (i.e. installation and access), maintenance and effort of software system. This paper explores a framework to assess and verification of evolvability in AOSQ model using fuzzy logic toolbox. All the values of evolvability and its related characteristics are calculated by analytic hierarchy process (AHP) tool.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83380757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Integration of network intrusion detection systems and honeypot networks for cloud security 融合网络入侵检测系统和蜜罐网络,实现云安全
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229911
Varan Mahajan, S. K. Peddoju
With an aim of provisioning fast, reliable and low cost services to the users, the cloud-computing technology has progressed leaps and bounds. But, adjacent to its development is ever increasing ability of malicious users to compromise its security from outside as well as inside. The Network Intrusion Detection System (NIDS) techniques has gone a long way in detection of known and unknown attacks. The methods of detection of intrusion and deployment of NIDS in cloud environment are dependent on the type of services being rendered by the cloud. It is also important that the cloud administrator is able to determine the malicious intensions of the attackers and various methods of attack. In this paper, we carry out the integration of NIDS module and Honeypot Networks in Cloud environment with objective to mitigate the known and unknown attacks. We also propose method to generate and update signatures from information derived from the proposed integrated model. Using sandboxing environment, we perform dynamic malware analysis of binaries to derive conclusive evidence of malicious attacks.
为了向用户提供快速、可靠、低成本的服务,云计算技术得到了突飞猛进的发展。但是,与其发展相伴随的是恶意用户从外部和内部破坏其安全性的能力日益增强。网络入侵检测系统(NIDS)技术在检测已知和未知攻击方面取得了长足的进步。在云环境中检测入侵和部署NIDS的方法取决于云所提供的服务类型。云管理员能够确定攻击者的恶意意图和各种攻击方法也很重要。本文将NIDS模块与蜜罐网络在云环境下进行集成,目的是减轻已知和未知的攻击。我们还提出了一种从所提出的集成模型中获得的信息生成和更新签名的方法。利用沙盒环境,对二进制文件进行动态恶意软件分析,得出恶意攻击的确凿证据。
{"title":"Integration of network intrusion detection systems and honeypot networks for cloud security","authors":"Varan Mahajan, S. K. Peddoju","doi":"10.1109/CCAA.2017.8229911","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229911","url":null,"abstract":"With an aim of provisioning fast, reliable and low cost services to the users, the cloud-computing technology has progressed leaps and bounds. But, adjacent to its development is ever increasing ability of malicious users to compromise its security from outside as well as inside. The Network Intrusion Detection System (NIDS) techniques has gone a long way in detection of known and unknown attacks. The methods of detection of intrusion and deployment of NIDS in cloud environment are dependent on the type of services being rendered by the cloud. It is also important that the cloud administrator is able to determine the malicious intensions of the attackers and various methods of attack. In this paper, we carry out the integration of NIDS module and Honeypot Networks in Cloud environment with objective to mitigate the known and unknown attacks. We also propose method to generate and update signatures from information derived from the proposed integrated model. Using sandboxing environment, we perform dynamic malware analysis of binaries to derive conclusive evidence of malicious attacks.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78631301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
DEDUP: Deduplication system for encrypted data in cloud DEDUP:用于云中加密数据的重复数据删除系统
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229904
Himshai Kamboj, Bharati Sinha
Cloud computing facilitates different cloud services in which the most popular one is cloud storage. For maintaining the privacy and security of data, the data holders often store their data in encrypted form. Further the encrypted data introduce new problems for deduplication while processing such a crucial big data. The present schemes of data deduplictaion in encrypted form lacks in security. Most schemes do not support access on data thus creating a big challenge of ownership on data being stored on cloud. In this paper, we have proposed a DeDup App which is easy to use application interface based on challenge of ownership and re-encryption. The efficiency of our scheme is a result of the computer simulation and analysis performed.
云计算促进了不同的云服务,其中最流行的是云存储。为了维护数据的隐私和安全,数据持有者通常以加密形式存储数据。此外,在处理如此重要的大数据时,加密的数据给重复数据删除带来了新的问题。现有的加密数据重复数据删除方案存在安全性不足的问题。大多数方案不支持对数据的访问,因此对存储在云上的数据的所有权造成了很大的挑战。在本文中,我们提出了一种基于所有权挑战和重新加密的易于使用的应用程序接口DeDup App。该方案的有效性是计算机仿真和分析的结果。
{"title":"DEDUP: Deduplication system for encrypted data in cloud","authors":"Himshai Kamboj, Bharati Sinha","doi":"10.1109/CCAA.2017.8229904","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229904","url":null,"abstract":"Cloud computing facilitates different cloud services in which the most popular one is cloud storage. For maintaining the privacy and security of data, the data holders often store their data in encrypted form. Further the encrypted data introduce new problems for deduplication while processing such a crucial big data. The present schemes of data deduplictaion in encrypted form lacks in security. Most schemes do not support access on data thus creating a big challenge of ownership on data being stored on cloud. In this paper, we have proposed a DeDup App which is easy to use application interface based on challenge of ownership and re-encryption. The efficiency of our scheme is a result of the computer simulation and analysis performed.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72906857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy tuned PID controller for power system stability 电力系统稳定的模糊整定PID控制器
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230056
Zubair Iqbal, Shoeb Hussain, M. A. Bazaz
This paper introduces a hybrid fuzzy based PID controller to improve the performance of power system stabilization. The inadequately damped electromechanical motions in power frameworks has been an issue to power engineers for quite a while. This restrains the ability of transfer of power in transmission lines and further incites worry in the mechanical shaft of machine. Owing to large scale interconnections and structured complexity of power systems, some disturbances arise which result in poorly damped low-frequency oscillations that don't damp out with time and at some occasions system is shaken out of equilibrium. The dynamics of this framework is additionally influenced by these oscillations at low frequency. The oscillations can be reduced and in turn the stability can be increased by proper design of controllers. The oscillations can be diminished and thus the solidness can be expanded by appropriate outline of controllers. The essential element of the proposed approach is plan of a fuzzy based PID controller (FPID) that uses a rearranged configuration. FPID controller, which exploits the properties of fuzzy PI and PD controllers, is proposed. This approach doesn't require exact learning of plant's characteristics for execution of the controller. The performance when compared with the conventional controllers, the results of fuzzy controller are quite encouraging and satisfactory.
为了提高电力系统的稳定性能,本文提出了一种基于混合模糊的PID控制器。电力框架中机电运动阻尼不足一直是困扰电力工程师的一个问题。这限制了输电线路的传输能力,并进一步加剧了机器机械轴的担忧。由于电力系统的大规模互连和结构的复杂性,会产生一些干扰,导致低频振荡不随时间衰减,有时会使系统失去平衡。该框架的动力学还受到这些低频振荡的影响。通过合理设计控制器,可以减小系统的振荡,从而提高系统的稳定性。通过适当的控制器轮廓可以减小振荡,从而扩大坚固性。该方法的核心是采用重排结构的模糊PID控制器(FPID)的设计。利用模糊PI和PD控制器的特性,提出了FPID控制器。这种方法不需要精确地学习植物的特性来执行控制器。与常规控制器的性能比较,模糊控制器的效果是令人满意的。
{"title":"Fuzzy tuned PID controller for power system stability","authors":"Zubair Iqbal, Shoeb Hussain, M. A. Bazaz","doi":"10.1109/CCAA.2017.8230056","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230056","url":null,"abstract":"This paper introduces a hybrid fuzzy based PID controller to improve the performance of power system stabilization. The inadequately damped electromechanical motions in power frameworks has been an issue to power engineers for quite a while. This restrains the ability of transfer of power in transmission lines and further incites worry in the mechanical shaft of machine. Owing to large scale interconnections and structured complexity of power systems, some disturbances arise which result in poorly damped low-frequency oscillations that don't damp out with time and at some occasions system is shaken out of equilibrium. The dynamics of this framework is additionally influenced by these oscillations at low frequency. The oscillations can be reduced and in turn the stability can be increased by proper design of controllers. The oscillations can be diminished and thus the solidness can be expanded by appropriate outline of controllers. The essential element of the proposed approach is plan of a fuzzy based PID controller (FPID) that uses a rearranged configuration. FPID controller, which exploits the properties of fuzzy PI and PD controllers, is proposed. This approach doesn't require exact learning of plant's characteristics for execution of the controller. The performance when compared with the conventional controllers, the results of fuzzy controller are quite encouraging and satisfactory.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85994937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power efficient voltage controlled oscillator design in 180nm CMOS technology 180nm CMOS技术的高效电压控制振荡器设计
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230032
Prachi Gupta, Manoj Kumar
In this paper, four different single ended delay cells based ring oscillators have been presented. Output frequencies of ring oscillators have been controlled by varying the supply voltage 1.4V to 3.0V. The active load concept has been used in proposed circuits. First design shows frequency variation in the range [4.50–1.40] GHz with phase noise −87.79dBc/Hz @1MHz in saturated load. Second design shows frequency variation of [6.26–2.85] GHz with pseudo-NMOS logic. Third design shows frequency variation in the range [4.54–0.77] GHz with phase noise −85.38dBc/Hz @1MHz and tuning range of 141.8% in unsaturated load. Fourth design shows frequency variation of [2.66–2.38] GHz with linear load. Simulations have been performed using SPICE based on 180nm CMOS technology at 1.8V. The proposed designs of 3-Stage, 5-Stage, 7-Stage have been compared with previous work for frequency and power consumption, phase noise, tuning range. Proposed methods show the improvement with low power consumption, low phase noise and wide tuning range.
本文提出了四种基于单端延时单元的环形振荡器。通过改变电源电压1.4V至3.0V来控制环形振荡器的输出频率。主动负载的概念已被应用于所提出的电路中。第一个设计显示,饱和负载下频率变化范围为[4.50-1.40]GHz,相位噪声为- 87.79dBc/Hz @1MHz。第二种设计采用伪nmos逻辑实现了[6.26-2.85]GHz的频率变化。第三种设计的频率变化范围为[4.54-0.77]GHz,相位噪声为−85.38dBc/Hz @1MHz,非饱和负载下的调谐范围为141.8%。第四种设计为线性负载下的[2.66-2.38]GHz频率变化。利用基于180nm CMOS技术的SPICE在1.8V下进行了仿真。本文从频率、功耗、相位噪声、调谐范围等方面对3级、5级、7级设计进行了比较。所提出的方法具有低功耗、低相位噪声和宽调谐范围等优点。
{"title":"Power efficient voltage controlled oscillator design in 180nm CMOS technology","authors":"Prachi Gupta, Manoj Kumar","doi":"10.1109/CCAA.2017.8230032","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230032","url":null,"abstract":"In this paper, four different single ended delay cells based ring oscillators have been presented. Output frequencies of ring oscillators have been controlled by varying the supply voltage 1.4V to 3.0V. The active load concept has been used in proposed circuits. First design shows frequency variation in the range [4.50–1.40] GHz with phase noise −87.79dBc/Hz @1MHz in saturated load. Second design shows frequency variation of [6.26–2.85] GHz with pseudo-NMOS logic. Third design shows frequency variation in the range [4.54–0.77] GHz with phase noise −85.38dBc/Hz @1MHz and tuning range of 141.8% in unsaturated load. Fourth design shows frequency variation of [2.66–2.38] GHz with linear load. Simulations have been performed using SPICE based on 180nm CMOS technology at 1.8V. The proposed designs of 3-Stage, 5-Stage, 7-Stage have been compared with previous work for frequency and power consumption, phase noise, tuning range. Proposed methods show the improvement with low power consumption, low phase noise and wide tuning range.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85158633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IoT based smart health care system using CNT electrodes (for continuous ECG monitoring) 使用碳纳米管电极的基于物联网的智能医疗系统(用于连续心电监测)
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230002
Malti Bansal, Bani Gandhi
As the world population is growing at a rapid pace, the demand for better health care facilities is increasing steadily. It has been observed that many health problems are unpredictable; especially heart diseases; hence it is important to monitor heart continuously. Earlier it was not always possible to monitor the patient continuously and for longer durations, but thanks to the latest developments in the domain of Information and Communications Technology (ICT), that facilitate the acquirement, transmission, interpretation and reception of various bio-signals, from permanent or mobile sites. The developments in the sphere of sensing technologies, wireless communication, embedded systems, nano-electronics, etc make it feasible to build intelligent systems to monitor bio-signals especially heart signals (ECG) of the patient; and further with the help of necessary protocols, the information can be promptly sent to the doctor, hospitals, etc. Thanks to the concept of Internet-of-Things (IoT), which provides necessary help in emergency situations. Nanomaterials are now being used in a big way because of their several advantages over the conventional materials. So, getting together the concept of IoT and nanomaterials will restructure the field of health-care, promising economic, technological and social benefits.
随着世界人口的快速增长,对更好的卫生保健设施的需求正在稳步增加。据观察,许多健康问题是不可预测的;尤其是心脏病;因此,持续监测心脏是非常重要的。早些时候,不可能持续和长时间地监测患者,但由于信息和通信技术(ICT)领域的最新发展,方便了从永久或移动站点获取、传输、解释和接收各种生物信号。随着传感技术、无线通信、嵌入式系统、纳米电子学等领域的发展,建立智能系统监测患者的生物信号特别是心电信号已成为可能;此外,在必要的协议的帮助下,这些信息可以及时发送给医生、医院等。这要归功于在紧急情况下提供必要帮助的物联网(IoT)概念。纳米材料由于其优于传统材料的优点而得到广泛应用。因此,将物联网和纳米材料的概念结合在一起,将重塑医疗保健领域,具有良好的经济、技术和社会效益。
{"title":"IoT based smart health care system using CNT electrodes (for continuous ECG monitoring)","authors":"Malti Bansal, Bani Gandhi","doi":"10.1109/CCAA.2017.8230002","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230002","url":null,"abstract":"As the world population is growing at a rapid pace, the demand for better health care facilities is increasing steadily. It has been observed that many health problems are unpredictable; especially heart diseases; hence it is important to monitor heart continuously. Earlier it was not always possible to monitor the patient continuously and for longer durations, but thanks to the latest developments in the domain of Information and Communications Technology (ICT), that facilitate the acquirement, transmission, interpretation and reception of various bio-signals, from permanent or mobile sites. The developments in the sphere of sensing technologies, wireless communication, embedded systems, nano-electronics, etc make it feasible to build intelligent systems to monitor bio-signals especially heart signals (ECG) of the patient; and further with the help of necessary protocols, the information can be promptly sent to the doctor, hospitals, etc. Thanks to the concept of Internet-of-Things (IoT), which provides necessary help in emergency situations. Nanomaterials are now being used in a big way because of their several advantages over the conventional materials. So, getting together the concept of IoT and nanomaterials will restructure the field of health-care, promising economic, technological and social benefits.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82082334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Data security using authenticated encryption and decryption algorithm for Android phones 数据安全使用认证的加密和解密算法的Android手机
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229903
A. Vichare, T. Jose, Jagruti Tiwari, U. Yadav
With the growing number of mobile applications, secure storage of information is essential. A strong encryption system is required to protect the data stored in android phones at a maximum level. Traditional encryption schemes have the disadvantage that communication overheads and the computation costs are too high. And also there is a possibility that the data is lost after encryption. Hence, it is necessary to implement a “Data Encryption and Decryption” scheme with “Cloud Backup” feature which is more efficient in order to provide high level of data security for android phones. It is necessary to create means which will enable a user to encrypt confidential data present in the mobile phones. Decrypt it to recover the encrypted data. In case of brute force attack, user need not worry about losing the data as “Automatic encryption” is triggered. “Cloud Backup” is another mechanism to prevent the data from being known by an adversary. This paper proposes an Android Application which will provide the features of automatic encryption, data encryption/decryption, and cloud backup all in one single mobile application. AES −256 bit algorithm is used for this purpose. The sole purpose of using AES for encryption/decryption is that it is secure and has high computational complexity. Due to this the intruder will require comparatively more time to decrypt the data.
随着移动应用程序数量的增加,信息的安全存储是必不可少的。为了最大程度地保护存储在安卓手机中的数据,需要一个强大的加密系统。传统的加密方案存在通信开销和计算成本过高的缺点。而且数据在加密后也有可能丢失。因此,有必要实现一种具有“云备份”功能的“数据加解密”方案,该方案效率更高,为android手机提供高水平的数据安全性。有必要创建一种方法,使用户能够加密存在于移动电话中的机密数据。解密它以恢复加密的数据。在暴力攻击的情况下,用户无需担心丢失数据,因为“自动加密”被触发。“云备份”是防止对手知道数据的另一种机制。本文提出了一个Android应用程序,该应用程序将自动加密、数据加解密和云备份功能集成在一个移动应用程序中。采用AES−256位算法。使用AES加密/解密的唯一目的是它是安全的,并且具有很高的计算复杂度。因此,入侵者将需要相对较多的时间来解密数据。
{"title":"Data security using authenticated encryption and decryption algorithm for Android phones","authors":"A. Vichare, T. Jose, Jagruti Tiwari, U. Yadav","doi":"10.1109/CCAA.2017.8229903","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229903","url":null,"abstract":"With the growing number of mobile applications, secure storage of information is essential. A strong encryption system is required to protect the data stored in android phones at a maximum level. Traditional encryption schemes have the disadvantage that communication overheads and the computation costs are too high. And also there is a possibility that the data is lost after encryption. Hence, it is necessary to implement a “Data Encryption and Decryption” scheme with “Cloud Backup” feature which is more efficient in order to provide high level of data security for android phones. It is necessary to create means which will enable a user to encrypt confidential data present in the mobile phones. Decrypt it to recover the encrypted data. In case of brute force attack, user need not worry about losing the data as “Automatic encryption” is triggered. “Cloud Backup” is another mechanism to prevent the data from being known by an adversary. This paper proposes an Android Application which will provide the features of automatic encryption, data encryption/decryption, and cloud backup all in one single mobile application. AES −256 bit algorithm is used for this purpose. The sole purpose of using AES for encryption/decryption is that it is secure and has high computational complexity. Due to this the intruder will require comparatively more time to decrypt the data.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81729432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Ant colony optimization routing in mobile adhoc networks — A survey paper 移动自组网中的蚁群优化路由研究
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229858
Mohd. Sharique Khan, Vishnu Sharma
This survey paper basically going to represent AODV algorithm to examined or explained ant colony optimization (ACO) in mobile AdHoc networks (MANETs). Here, in network routing we widely used two optimization techniques i.e. ACO and a swarm intelligence based optimization techniques. On-demand routing protocol is very highly potential, adaptive and scalable. These ant colony optimization and swarm intelligence based techniques will use to design the result of swarm ability to engineering and mathematical errors. These types of networks are soft or flexible, these networks will not require any kind of existing central administration or infrastructure or base. Therefore, mobile ad-hoc networks are those type of network which is consist completely of infrastructure less nodes, which is work concurrently in an AdHoc way (i.e., in an air and on fly) and also suitable or appropriate for temporary communication links. The major aim in the designing of these protocols was to decrease the overhead for routing. Mobile ad-hoc networks are a set of mobile nodes which always communicate in the air or fly over radio waves.
本文主要是用AODV算法来检验或解释移动AdHoc网络中的蚁群优化(ACO)。在网络路由中,我们广泛使用了两种优化技术,即蚁群算法和基于群体智能的优化技术。按需路由协议具有很高的潜力、适应性和可扩展性。这些基于蚁群优化和群体智能的技术将用于设计结果的群体能力,以消除工程和数学误差。这些类型的网络是软的或灵活的,这些网络不需要任何现有的中央管理或基础设施或基地。因此,移动自组织网络是完全由基础设施较少的节点组成的网络类型,它以自组织方式(即空中和飞行)并发工作,也适合或适合于临时通信链路。设计这些协议的主要目的是减少路由开销。移动自组织网络是一组始终在空中或在无线电波上通信的移动节点。
{"title":"Ant colony optimization routing in mobile adhoc networks — A survey paper","authors":"Mohd. Sharique Khan, Vishnu Sharma","doi":"10.1109/CCAA.2017.8229858","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229858","url":null,"abstract":"This survey paper basically going to represent AODV algorithm to examined or explained ant colony optimization (ACO) in mobile AdHoc networks (MANETs). Here, in network routing we widely used two optimization techniques i.e. ACO and a swarm intelligence based optimization techniques. On-demand routing protocol is very highly potential, adaptive and scalable. These ant colony optimization and swarm intelligence based techniques will use to design the result of swarm ability to engineering and mathematical errors. These types of networks are soft or flexible, these networks will not require any kind of existing central administration or infrastructure or base. Therefore, mobile ad-hoc networks are those type of network which is consist completely of infrastructure less nodes, which is work concurrently in an AdHoc way (i.e., in an air and on fly) and also suitable or appropriate for temporary communication links. The major aim in the designing of these protocols was to decrease the overhead for routing. Mobile ad-hoc networks are a set of mobile nodes which always communicate in the air or fly over radio waves.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81806217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Student academic performance and social behavior predictor using data mining techniques 利用数据挖掘技术预测学生学习成绩和社会行为
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229794
Suhas Athani, Sharath A Kodli, Mayur N Banavasi, P. Hiremath
Education can be utilized as a tool to face many problems, overcome many hurdles in life. The knowledge obtained from education helps to enhance opportunities in one's employment development. To extract useful information from the knowledge obtained, Educational Data Mining is widely used. Educational data mining provides the process of applying different data mining tools and techniques to analyze and visualize the data of an institution (school) and can be used to discover a unique pattern of students' academic performance and behavior. The present work intends to enhance students' academic performance in secondary school using data mining techniques. Real data was collected using school reports and questionnaire method by the Portugal school which has been used in this paper. Naive Bayesian algorithm can be easily implemented to predict the students' academic performance and behavior. Classification of students into two classes, pass and fail, involves training phase and testing phase. In training phase, Naive Bayes classifier is built and in the testing phase, Naive Bayes classifier is used to make the prediction. The accuracy of the classifier is calculated using WEKA tool in which confusion matrix is generated. The accuracy of the classifier obtained is 87% which can be further improved by the selection of appropriate attributes. Developing the classification algorithms in this way helps to obtain a more efficient student performance predictor tool using other data mining algorithms and it also helps to improve the quality of education in an educational institution.
教育可以作为一种工具来面对许多问题,克服生活中的许多障碍。从教育中获得的知识有助于增加就业发展的机会。为了从获得的知识中提取有用的信息,教育数据挖掘得到了广泛的应用。教育数据挖掘提供了应用不同的数据挖掘工具和技术来分析和可视化一个机构(学校)的数据的过程,可以用来发现学生的学习成绩和行为的独特模式。本研究旨在利用数据挖掘技术来提高中学生的学习成绩。本文采用的葡萄牙学校采用学校报告和问卷调查法收集真实数据。朴素贝叶斯算法可以很容易地实现对学生学习成绩和行为的预测。将学生分为及格和不及格两类,包括培训阶段和测试阶段。在训练阶段,建立朴素贝叶斯分类器,在测试阶段,使用朴素贝叶斯分类器进行预测。使用WEKA工具计算分类器的准确率,并生成混淆矩阵。得到的分类器准确率为87%,通过选择合适的属性可以进一步提高分类器的准确率。以这种方式开发分类算法有助于使用其他数据挖掘算法获得更有效的学生成绩预测工具,也有助于提高教育机构的教育质量。
{"title":"Student academic performance and social behavior predictor using data mining techniques","authors":"Suhas Athani, Sharath A Kodli, Mayur N Banavasi, P. Hiremath","doi":"10.1109/CCAA.2017.8229794","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229794","url":null,"abstract":"Education can be utilized as a tool to face many problems, overcome many hurdles in life. The knowledge obtained from education helps to enhance opportunities in one's employment development. To extract useful information from the knowledge obtained, Educational Data Mining is widely used. Educational data mining provides the process of applying different data mining tools and techniques to analyze and visualize the data of an institution (school) and can be used to discover a unique pattern of students' academic performance and behavior. The present work intends to enhance students' academic performance in secondary school using data mining techniques. Real data was collected using school reports and questionnaire method by the Portugal school which has been used in this paper. Naive Bayesian algorithm can be easily implemented to predict the students' academic performance and behavior. Classification of students into two classes, pass and fail, involves training phase and testing phase. In training phase, Naive Bayes classifier is built and in the testing phase, Naive Bayes classifier is used to make the prediction. The accuracy of the classifier is calculated using WEKA tool in which confusion matrix is generated. The accuracy of the classifier obtained is 87% which can be further improved by the selection of appropriate attributes. Developing the classification algorithms in this way helps to obtain a more efficient student performance predictor tool using other data mining algorithms and it also helps to improve the quality of education in an educational institution.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84401547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Sentiment analysis: Approaches and open issues 情感分析:方法和开放的问题
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229791
Shahnawaz, Parmanand Astya
Sentiment Analysis is the process which helps to identify and classifying the opinions or feelings expressed in opinioned data, in order to ascertain whether the attitude of the writer towards a particular service, product etc. is negative, positive or neutral. Sentiment analysis also helps the consumers to identify if the information in the neighborhood of the product or service is satisfactory or not before the customers buy it. The interest of the scientific communities and business world is increasing day by day to gather, process and extract the knowledge from the public opinions available on different types of social media. The main problems that exist in the current techniques are: inability to perform well in different domains, inadequate accuracy and performance in sentiment analysis based on insufficient labeled data, incapability to deal with complex sentences that require more than sentiment words and simple analyzing. This article discusses the different approaches for sentiment analysis and open problems and issues present in performing sentiment analysis.
情感分析是帮助识别和分类意见数据中表达的意见或感受的过程,以确定作者对特定服务、产品等的态度是消极的、积极的还是中立的。情感分析还可以帮助消费者在购买之前识别产品或服务附近的信息是否令人满意。科学界和商界对收集、处理和提取不同类型的社交媒体上的公众意见的兴趣与日俱增。目前的技术存在的主要问题是:无法在不同的领域表现良好;在标记数据不足的基础上进行情感分析的准确性和性能不足;无法处理需要更多情感词和简单分析的复杂句子。本文讨论了情感分析的不同方法以及执行情感分析中存在的开放性问题和问题。
{"title":"Sentiment analysis: Approaches and open issues","authors":"Shahnawaz, Parmanand Astya","doi":"10.1109/CCAA.2017.8229791","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229791","url":null,"abstract":"Sentiment Analysis is the process which helps to identify and classifying the opinions or feelings expressed in opinioned data, in order to ascertain whether the attitude of the writer towards a particular service, product etc. is negative, positive or neutral. Sentiment analysis also helps the consumers to identify if the information in the neighborhood of the product or service is satisfactory or not before the customers buy it. The interest of the scientific communities and business world is increasing day by day to gather, process and extract the knowledge from the public opinions available on different types of social media. The main problems that exist in the current techniques are: inability to perform well in different domains, inadequate accuracy and performance in sentiment analysis based on insufficient labeled data, incapability to deal with complex sentences that require more than sentiment words and simple analyzing. This article discusses the different approaches for sentiment analysis and open problems and issues present in performing sentiment analysis.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84419169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
期刊
2017 International Conference on Computing, Communication and Automation (ICCCA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1