首页 > 最新文献

2017 International Conference on Computing, Communication and Automation (ICCCA)最新文献

英文 中文
Bigdata analysis and comparison of bigdata analytic approches 大数据分析和大数据分析方法的比较
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229821
S. Malhotra, M. Doja, Bashir Alam, Mansaf Alam
Recent technological advancements in typical domains (e.g. internet, financial companies, health care, user generated data, supply chain systems etc.) have directed to inundate of data from these domains. Data outburst trend gave the insight meaning to the buzz word ‘Bigdata’. If we compare with traditional data, Bigdata exhibits some unique characteristics like it is commonly enormous and unstructured type of data that cannot be handled using traditional databases. Hence new system designs are required for the following processes i.e. data collection, data transmission, storage, and large-scale data processing mechanisms. The definition of Bigdata has been presented from many aspects in this paper. We analyzed Bigdata system architecture and various challenges of Bigdata. The prevalent Hadoop framework, Hive, No SQL, New SQL, MapReduce and HBase for addressing the biggest challenge of Bigdata i.e Data Analytic has also been analyzed and compared.
典型领域(例如互联网、金融公司、医疗保健、用户生成数据、供应链系统等)的最新技术进步导致这些领域的数据泛滥。数据爆发趋势为“大数据”这个热词赋予了深刻的意义。与传统数据相比,大数据显示出一些独特的特点,比如它通常是庞大的非结构化数据,而传统数据库无法处理这些数据。因此,在数据采集、数据传输、数据存储和大规模数据处理机制方面,需要新的系统设计。本文从多个方面阐述了大数据的定义。我们分析了大数据系统架构和大数据面临的各种挑战。本文还对当前流行的Hadoop框架、Hive、No SQL、New SQL、MapReduce和HBase进行了分析和比较,以解决大数据面临的最大挑战,即数据分析。
{"title":"Bigdata analysis and comparison of bigdata analytic approches","authors":"S. Malhotra, M. Doja, Bashir Alam, Mansaf Alam","doi":"10.1109/CCAA.2017.8229821","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229821","url":null,"abstract":"Recent technological advancements in typical domains (e.g. internet, financial companies, health care, user generated data, supply chain systems etc.) have directed to inundate of data from these domains. Data outburst trend gave the insight meaning to the buzz word ‘Bigdata’. If we compare with traditional data, Bigdata exhibits some unique characteristics like it is commonly enormous and unstructured type of data that cannot be handled using traditional databases. Hence new system designs are required for the following processes i.e. data collection, data transmission, storage, and large-scale data processing mechanisms. The definition of Bigdata has been presented from many aspects in this paper. We analyzed Bigdata system architecture and various challenges of Bigdata. The prevalent Hadoop framework, Hive, No SQL, New SQL, MapReduce and HBase for addressing the biggest challenge of Bigdata i.e Data Analytic has also been analyzed and compared.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81623844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Model predictive control of two area power system with superconducting magnetic energy storage system 超导磁储能两区电力系统的模型预测控制
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230061
S. Z. N. Dar, M. Mufti
This work focuses on the incorporation of modelpredictive control based superconducting magnetic energy storage (SMES) within a two-area power system. In our work incorporation of governor dead band as well as generation rate constraint is taken into account. We have incorporated a custom made general self-tuning model predictive controller for single-input single output (SISO) system. Every area of power system is connected via this block. Which is further incorporated with the SMES. Simulation studies carried out in Matlab Simulink environment reflect significant improvement in frequency response and tie-power deviation of the system. The SMES current and power response is also depicted.
本文研究了基于模型预测控制的超导磁能存储(SMES)在双区电力系统中的应用。在本文的研究中,考虑了调速器死区和发电速率约束。我们为单输入单输出(SISO)系统集成了一个定制的通用自调谐模型预测控制器。电力系统的每个区域都通过这个街区连接起来。进一步与中小企业合并。在Matlab Simulink环境下进行的仿真研究表明,系统的频率响应和功率偏差有了明显改善。还描述了中小企业的电流和功率响应。
{"title":"Model predictive control of two area power system with superconducting magnetic energy storage system","authors":"S. Z. N. Dar, M. Mufti","doi":"10.1109/CCAA.2017.8230061","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230061","url":null,"abstract":"This work focuses on the incorporation of modelpredictive control based superconducting magnetic energy storage (SMES) within a two-area power system. In our work incorporation of governor dead band as well as generation rate constraint is taken into account. We have incorporated a custom made general self-tuning model predictive controller for single-input single output (SISO) system. Every area of power system is connected via this block. Which is further incorporated with the SMES. Simulation studies carried out in Matlab Simulink environment reflect significant improvement in frequency response and tie-power deviation of the system. The SMES current and power response is also depicted.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85071673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new 16-bit ALU using variable stage adder and PTL mux 一种采用可变级加法器和PTL复用器的新型16位ALU
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230050
Aradhana Uniyal, V. Niranjan
ALU is an integral part of the processor. And it is also one of the highest power density location in the processor. Hence in order to optimize the performance of processor, it is important to optimize the ALU. In this paper, proposed ALU having 8 functions has been designed using optimized adder structure. Also, use of pass transistors based multiplexer reduces the transistor count to around 80%. The proposed 16-bit ALU is implemented using 90 nm CMOS technology in Cadence Virtuoso. The results shows improvement in delay by 23.48 % and power consumption has been reduced by 2.76 %. It is pertinent to mention that the delay improvement in the proposed circuits have been achieved without increase in any circuit complexity and power dissipation. The proposed circuits are suitable for low power and high speed VLSI based arithmetic circuits.
ALU是处理器的一个组成部分。它也是处理器中功率密度最高的位置之一。因此,为了优化处理器的性能,对ALU进行优化是非常重要的。本文采用优化的加法器结构,设计了具有8个功能的ALU。此外,使用基于通路晶体管的多路复用器将晶体管数量减少到80%左右。所提出的16位ALU采用90nm CMOS技术在Cadence Virtuoso中实现。结果表明,该系统的时延提高了23.48%,功耗降低了2.76%。值得一提的是,在不增加任何电路复杂性和功耗的情况下,所提出电路的延迟改进已经实现。该电路适用于基于VLSI的低功耗、高速算术电路。
{"title":"A new 16-bit ALU using variable stage adder and PTL mux","authors":"Aradhana Uniyal, V. Niranjan","doi":"10.1109/CCAA.2017.8230050","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230050","url":null,"abstract":"ALU is an integral part of the processor. And it is also one of the highest power density location in the processor. Hence in order to optimize the performance of processor, it is important to optimize the ALU. In this paper, proposed ALU having 8 functions has been designed using optimized adder structure. Also, use of pass transistors based multiplexer reduces the transistor count to around 80%. The proposed 16-bit ALU is implemented using 90 nm CMOS technology in Cadence Virtuoso. The results shows improvement in delay by 23.48 % and power consumption has been reduced by 2.76 %. It is pertinent to mention that the delay improvement in the proposed circuits have been achieved without increase in any circuit complexity and power dissipation. The proposed circuits are suitable for low power and high speed VLSI based arithmetic circuits.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77230756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Advanced encryption standard (AES) security enhancement using hybrid approach 采用混合方法增强高级加密标准(AES)的安全性
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229881
Flevina D’souza, Dakshata M. Panchal
Security is major concern in data handling, communication, message transmission and electronic transaction on public network. Cryptography (secret writing) is the encryption process of transformation of messages to make information secure and resistant to attack. AES is symmetric encryption standard recommended by NIST. AES is proved to be highly secure, faster and strong encryption algorithm. AES is used commonly because of its great competence and easiness. But in recent years cyber-attacks are continuously developing, therefore security specialists must stay busy in the lab inventing new schemes to keep attackers at bay. Possible attacks on symmetric algorithm can be Brute-force Attack, Differential Attack, Algebraic Attack and Linear Attack. So to provide strong security in message transmission, AES algorithm with hybrid approach of Dynamic Key Generation and Dynamic S-box Generation is proposed. In hybrid approach first we will add more complexity in data to increase Confusion and Diffusion in Cipher text by using Dynamic Key Generation and then by using Dynamic S-Box Generation we will make it difficult for attacker to do any down study of static set of S-box.
在公共网络上进行数据处理、通信、信息传输和电子交易时,安全是一个重要的问题。密码学(密码学)是对消息进行转换的加密过程,使信息安全、抗攻击。AES是NIST推荐的对称加密标准。AES是一种安全性高、速度快、性能强的加密算法。AES因其易用性强而被广泛使用。但近年来,网络攻击不断发展,因此安全专家必须在实验室里忙着发明新的方案来阻止攻击者。对对称算法可能的攻击有暴力攻击、微分攻击、代数攻击和线性攻击。为了保证消息传输的安全性,提出了采用动态密钥生成和动态s盒生成混合方法的AES算法。在混合方法中,我们首先通过使用动态密钥生成来增加数据的复杂性,从而增加密文中的混淆和扩散,然后通过使用动态s盒生成来使攻击者难以对静态s盒集进行任何向下研究。
{"title":"Advanced encryption standard (AES) security enhancement using hybrid approach","authors":"Flevina D’souza, Dakshata M. Panchal","doi":"10.1109/CCAA.2017.8229881","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229881","url":null,"abstract":"Security is major concern in data handling, communication, message transmission and electronic transaction on public network. Cryptography (secret writing) is the encryption process of transformation of messages to make information secure and resistant to attack. AES is symmetric encryption standard recommended by NIST. AES is proved to be highly secure, faster and strong encryption algorithm. AES is used commonly because of its great competence and easiness. But in recent years cyber-attacks are continuously developing, therefore security specialists must stay busy in the lab inventing new schemes to keep attackers at bay. Possible attacks on symmetric algorithm can be Brute-force Attack, Differential Attack, Algebraic Attack and Linear Attack. So to provide strong security in message transmission, AES algorithm with hybrid approach of Dynamic Key Generation and Dynamic S-box Generation is proposed. In hybrid approach first we will add more complexity in data to increase Confusion and Diffusion in Cipher text by using Dynamic Key Generation and then by using Dynamic S-Box Generation we will make it difficult for attacker to do any down study of static set of S-box.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85520393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Machine learning and time series: Real world applications 机器学习和时间序列:现实世界的应用
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229832
P. Misra, Siddharth
There are in-numerous applications that deal with real scenarios where data are captured over time making them potential candidates for time series analysis. Time series contain temporal dependencies that divide different points in time into different classes. This paper aims at reviewing marriage of a concept i.e. time series modeling with an approach i.e. Machine learning in tackling real life problems. Like time series is ubiquitous and has found extensive usage in our daily life, machine learning approaches have found its applicability in dealing with complex real world scenarios where approximation, uncertainty, chaotic data are prime characteristics.
有许多应用程序处理随着时间推移捕获数据的真实场景,使其成为时间序列分析的潜在候选。时间序列包含将不同时间点划分为不同类别的时间依赖性。本文旨在回顾一个概念的结合,即时间序列建模与一种方法,即机器学习在解决现实生活中的问题。就像时间序列无处不在,在我们的日常生活中得到了广泛的应用一样,机器学习方法在处理复杂的现实世界场景中发现了它的适用性,在这些场景中,近似、不确定性、混沌数据是主要特征。
{"title":"Machine learning and time series: Real world applications","authors":"P. Misra, Siddharth","doi":"10.1109/CCAA.2017.8229832","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229832","url":null,"abstract":"There are in-numerous applications that deal with real scenarios where data are captured over time making them potential candidates for time series analysis. Time series contain temporal dependencies that divide different points in time into different classes. This paper aims at reviewing marriage of a concept i.e. time series modeling with an approach i.e. Machine learning in tackling real life problems. Like time series is ubiquitous and has found extensive usage in our daily life, machine learning approaches have found its applicability in dealing with complex real world scenarios where approximation, uncertainty, chaotic data are prime characteristics.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78000094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Different sources of energy harvesting: A survey 能源收集的不同来源:一项调查
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230039
Sushant Sharma, Varij Panwar, S. C. Yadav, Sachin, Lokesh.
21st Century has seen a paradigm shift in use of technology and the thoughts of using the natural sources for energy has led to thinking of using the energy wasted around us, in technical term, we can say harvesting of the energy. The paper aims at covering various techniques used in harvesting energy with focus on cantilever based energy harvesting. Interestingly the vibrations can be captured and converted into electricity. Up until now researchers have been able to produce upto 66 μ-w electricity using cantilevers with different materials in fans and bridges. Sources for energy harvesting and techniques have been covered in the paper.
21世纪已经见证了技术使用的范式转变,利用自然资源作为能源的想法导致了对利用我们周围浪费的能源的思考,用技术术语来说,我们可以说是收获能源。本文旨在涵盖各种用于能量收集的技术,重点是基于悬臂梁的能量收集。有趣的是,振动可以被捕获并转化为电能。到目前为止,研究人员已经能够在风扇和桥中使用不同材料的悬臂产生高达66 μ w的电力。能量收集的来源和技术已在文中介绍。
{"title":"Different sources of energy harvesting: A survey","authors":"Sushant Sharma, Varij Panwar, S. C. Yadav, Sachin, Lokesh.","doi":"10.1109/CCAA.2017.8230039","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230039","url":null,"abstract":"21st Century has seen a paradigm shift in use of technology and the thoughts of using the natural sources for energy has led to thinking of using the energy wasted around us, in technical term, we can say harvesting of the energy. The paper aims at covering various techniques used in harvesting energy with focus on cantilever based energy harvesting. Interestingly the vibrations can be captured and converted into electricity. Up until now researchers have been able to produce upto 66 μ-w electricity using cantilevers with different materials in fans and bridges. Sources for energy harvesting and techniques have been covered in the paper.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80444638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient fuzzy and morphology based approach to metal artifact reduction from dental CBCT image 一种有效的基于模糊和形态学的牙齿CBCT图像金属伪影还原方法
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229985
Anita Thakur, Vishu Pargain, Pratul Singh, S. Chauhan, P. Khare, Prashant Mor
New generation image modality which is low radiation dose is highly used in dentistry. In that category, Cone Beam Computed Tomography CBCT are in demand in dental medical application. Due to low radiation dose imaging technique, image reconstruction is prone to artifacts. Artifacts are the discrepancies between the original physical image to the mathematical modelling image process. In dental treatment, mostly metallic filling is done which produces metal artifact in imaging. Which metallic felling produces the reflection effect on imaging that mislead the diagnosis of treatment. Proposed research algorithm which is morphology based reduces the reflection effect of metal artifacts. Metal artifact also effect the visual contrast of CBCT image so that contrast enhancement method is compared which are histogram and fuzzy based method. The output image has been analysed and evaluated using structure of similarity index matrix (SSIM) and peak value ratio in term of Signal versus Noise (PSNR). Visual perception also shows the performance of the proposed work.
低辐射剂量的新一代成像技术在牙科领域得到了广泛应用。其中,锥形束计算机断层扫描(CBCT)在牙科医学领域的应用需求较大。由于低辐射剂量成像技术,图像重建容易产生伪影。伪影是原始物理图像与数学建模图像之间的差异。在牙科治疗中,多采用金属充填,在成像中产生金属伪影。其中金属屑对影像产生反射作用,误导诊断治疗。提出了一种基于形态学的减小金属伪影反射效应的研究算法。金属伪影也会影响CBCT图像的视觉对比度,因此比较了直方图增强和模糊增强两种增强方法。利用相似指数矩阵(SSIM)结构和峰值比的信噪比(PSNR)对输出图像进行分析和评价。视觉感知也显示了所提出的工作的性能。
{"title":"An efficient fuzzy and morphology based approach to metal artifact reduction from dental CBCT image","authors":"Anita Thakur, Vishu Pargain, Pratul Singh, S. Chauhan, P. Khare, Prashant Mor","doi":"10.1109/CCAA.2017.8229985","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229985","url":null,"abstract":"New generation image modality which is low radiation dose is highly used in dentistry. In that category, Cone Beam Computed Tomography CBCT are in demand in dental medical application. Due to low radiation dose imaging technique, image reconstruction is prone to artifacts. Artifacts are the discrepancies between the original physical image to the mathematical modelling image process. In dental treatment, mostly metallic filling is done which produces metal artifact in imaging. Which metallic felling produces the reflection effect on imaging that mislead the diagnosis of treatment. Proposed research algorithm which is morphology based reduces the reflection effect of metal artifacts. Metal artifact also effect the visual contrast of CBCT image so that contrast enhancement method is compared which are histogram and fuzzy based method. The output image has been analysed and evaluated using structure of similarity index matrix (SSIM) and peak value ratio in term of Signal versus Noise (PSNR). Visual perception also shows the performance of the proposed work.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81254193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A triple BandStop frequency selective surface for escalation in the security of WiMax and WLAN application 一种用于WiMax和WLAN应用安全性提升的三重带阻频率选择表面
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229857
D. Noor, S. Yadav, S. Yadav, Monika Garg, Shweta Garg
A bandstop FSS has presented in this paper that works at 1.8GH, 3.5GHz and 5.5GHz. The dielectric constant of 4.4mm and dimension of substrate 0.24 X × 0.24X, tangential loss 0.025 and substrate FR-4 with thickness is 1.6mm is used. The structure consist of three elements Two Squares and a Decagon engraved on the substrate and provides three stable frequency response of 1.8GHz, 3.5GHz, and 5.5GHz. The proposed design is polarization independent and has stable frequency response at various angles of incidence for both perpendicular and parallel TE and TM wave modes respectively as the structure is symmetrical. The simulated results prove that a good insertion loss at desired resonant frequency was achieved in both TE and TM mode. Simulation is carried out in CST microwave studio that is based on FDTD method in frequency domain solver.
本文提出了一种工作在1.8 ghz、3.5GHz和5.5GHz的带阻FSS。介质常数为4.4mm,衬底尺寸0.24X × 0.24X,切向损耗0.025,衬底FR-4厚度1.6mm。该结构由三个元素组成,两个正方形和一个刻印在衬底上的十角形,提供1.8GHz, 3.5GHz和5.5GHz三个稳定的频率响应。由于结构对称,所提出的设计是极化无关的,并且在不同入射角下,垂直和平行的TE和TM波模式分别具有稳定的频率响应。仿真结果表明,在期望的谐振频率下,TE和TM模式都能获得较好的插入损耗。在基于频域求解器FDTD方法的CST微波工作室中进行了仿真。
{"title":"A triple BandStop frequency selective surface for escalation in the security of WiMax and WLAN application","authors":"D. Noor, S. Yadav, S. Yadav, Monika Garg, Shweta Garg","doi":"10.1109/CCAA.2017.8229857","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229857","url":null,"abstract":"A bandstop FSS has presented in this paper that works at 1.8GH, 3.5GHz and 5.5GHz. The dielectric constant of 4.4mm and dimension of substrate 0.24 X × 0.24X, tangential loss 0.025 and substrate FR-4 with thickness is 1.6mm is used. The structure consist of three elements Two Squares and a Decagon engraved on the substrate and provides three stable frequency response of 1.8GHz, 3.5GHz, and 5.5GHz. The proposed design is polarization independent and has stable frequency response at various angles of incidence for both perpendicular and parallel TE and TM wave modes respectively as the structure is symmetrical. The simulated results prove that a good insertion loss at desired resonant frequency was achieved in both TE and TM mode. Simulation is carried out in CST microwave studio that is based on FDTD method in frequency domain solver.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78964685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis and detection of fake profile over social network 社交网络虚假个人资料的分析与检测
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229795
V. Tiwari
Latest developments have seen exponential increase in clientele of social networks. Facebook has 1.5 billion users. More than 10 million likes and shares are executed daily. Many other networks like ‘linkedin’, ‘Instagram’, ‘Pinterest’, ‘Twitter’ etc are fast growing. Growth of social networks has given rise to a very high number of fake user profiles created out of ulterior motives. Fake profiles are also known as Sybils or social Bots. Many such profiles try and befriend the benign users with an ultimate aim of gaining access to privileged information. Social engineering is the primary cause of threats in any Online Social Network (OSN). This paper reviews many methods to detect the fake profiles and their online social bot. Multi agent perspective of online social networks has also been analysed. It also discusses the Machine learning methods useful in profile creation and analysis.
最新的发展趋势是社交网络用户呈指数级增长。Facebook拥有15亿用户。每天有超过1000万的点赞和分享。许多其他网络,如linkedin、Instagram、Pinterest、Twitter等都在快速增长。社交网络的发展导致了大量别有用心的虚假用户资料的出现。虚假的个人资料也被称为Sybils或社交机器人。许多这样的配置文件试图与善意的用户交朋友,最终目的是获得特权信息的访问权。社交工程是任何在线社交网络(OSN)威胁的主要原因。本文综述了许多检测虚假个人资料及其在线社交机器人的方法。本文还分析了在线社交网络的多智能体视角。它还讨论了在概要文件创建和分析中有用的机器学习方法。
{"title":"Analysis and detection of fake profile over social network","authors":"V. Tiwari","doi":"10.1109/CCAA.2017.8229795","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229795","url":null,"abstract":"Latest developments have seen exponential increase in clientele of social networks. Facebook has 1.5 billion users. More than 10 million likes and shares are executed daily. Many other networks like ‘linkedin’, ‘Instagram’, ‘Pinterest’, ‘Twitter’ etc are fast growing. Growth of social networks has given rise to a very high number of fake user profiles created out of ulterior motives. Fake profiles are also known as Sybils or social Bots. Many such profiles try and befriend the benign users with an ultimate aim of gaining access to privileged information. Social engineering is the primary cause of threats in any Online Social Network (OSN). This paper reviews many methods to detect the fake profiles and their online social bot. Multi agent perspective of online social networks has also been analysed. It also discusses the Machine learning methods useful in profile creation and analysis.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76365886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Bacteria foraging based task scheduling algorithm in cloud computing environment 云计算环境下基于细菌觅食的任务调度算法
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229901
Juhi Verma, Srichandan Sobhanayak, Suraj Sharma, A. K. Turuk, B. Sahoo
Cloud computing is a distributed system which gives the facilities of resource sharing and coordinates over different topographical areas. Because of its dynamic and heterogeneous nature of the virtual machine, the virtual machine scheduling is a complicated job in cloud computing. In recent past, bacterial foraging has come into views as a worldwide maximization algorithm for control and optimization. For cloud resource scheduling we propose an optimization technique for bacterial foraging. Effectively scheduling the tasks on an available physical machine in a cloud environment a unique resource scheduling hyper-heuristic based improved bacteria foraging algorithm (IBFA) has been proposed. Proposed scheduling algorithms performance is evaluated CloudSim toolkit and compared with existing algorithms. The exploratory results demonstrate that the proposed algorithms outplay the developed algorithm by reducing makespan and expense of client applications submitted to the cloud.
云计算是一种分布式系统,它提供了资源共享和在不同地形区域进行协调的功能。由于虚拟机的动态性和异构性,在云计算中虚拟机调度是一项复杂的工作。近年来,细菌觅食作为一种控制和优化的全球最大化算法被人们所关注。针对云资源调度问题,提出了一种细菌觅食优化技术。提出了一种独特的基于超启发式资源调度的改进细菌觅食算法(IBFA),可有效地调度云环境下可用物理机上的任务。对所提出的调度算法的性能进行了评估,并与现有算法进行了比较。探索性结果表明,通过减少提交到云的客户端应用程序的完工时间和费用,所提出的算法优于所开发的算法。
{"title":"Bacteria foraging based task scheduling algorithm in cloud computing environment","authors":"Juhi Verma, Srichandan Sobhanayak, Suraj Sharma, A. K. Turuk, B. Sahoo","doi":"10.1109/CCAA.2017.8229901","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229901","url":null,"abstract":"Cloud computing is a distributed system which gives the facilities of resource sharing and coordinates over different topographical areas. Because of its dynamic and heterogeneous nature of the virtual machine, the virtual machine scheduling is a complicated job in cloud computing. In recent past, bacterial foraging has come into views as a worldwide maximization algorithm for control and optimization. For cloud resource scheduling we propose an optimization technique for bacterial foraging. Effectively scheduling the tasks on an available physical machine in a cloud environment a unique resource scheduling hyper-heuristic based improved bacteria foraging algorithm (IBFA) has been proposed. Proposed scheduling algorithms performance is evaluated CloudSim toolkit and compared with existing algorithms. The exploratory results demonstrate that the proposed algorithms outplay the developed algorithm by reducing makespan and expense of client applications submitted to the cloud.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86555562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2017 International Conference on Computing, Communication and Automation (ICCCA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1