首页 > 最新文献

2017 International Conference on Computing, Communication and Automation (ICCCA)最新文献

英文 中文
Vehicle detection using acoustic signatures 利用声学特征进行车辆检测
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229975
M. Uttarakumari, A. S. Koushik, Anirudh S Raghavendra, Akshay Adiga, P. Harshita
This paper deals with the problem of classification of vehicles based on their acoustic signatures. Each type of vehicle transmits a particular type of engine sound, which can be used as a basis of classification. The samples are first collected using a reliable recording device. The signals so obtained are de-noised using wavelet analysis. The frames to be analyzed are selected using a unique energy index method. The prominent features of the obtained frame are then extracted. A novel feature selection method based on mean and variance is used to select the required features for analysis. The paper then focuses on a fast and potent method for classification of vehicles using k-nearest neighbours algorithm (kNN) into three categories: Two wheelers, four wheelers and Heavy Transport Vehicles (HTVs). Thus the method achieves its required results by using expeditive algorithms.
本文研究了基于车辆声特征的车辆分类问题。每种类型的车辆都会发出一种特定类型的发动机声音,这可以作为分类的基础。首先使用可靠的记录设备收集样品。得到的信号用小波分析去噪。采用一种独特的能量指数法选择待分析的框架。然后提取得到的帧的显著特征。提出了一种基于均值和方差的特征选择方法来选择分析所需的特征。然后,本文重点研究了一种快速有效的方法,该方法使用k近邻算法(kNN)将车辆分为三类:两轮车、四轮车和重型运输车辆(HTVs)。该方法采用快速算法,达到了预期的效果。
{"title":"Vehicle detection using acoustic signatures","authors":"M. Uttarakumari, A. S. Koushik, Anirudh S Raghavendra, Akshay Adiga, P. Harshita","doi":"10.1109/CCAA.2017.8229975","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229975","url":null,"abstract":"This paper deals with the problem of classification of vehicles based on their acoustic signatures. Each type of vehicle transmits a particular type of engine sound, which can be used as a basis of classification. The samples are first collected using a reliable recording device. The signals so obtained are de-noised using wavelet analysis. The frames to be analyzed are selected using a unique energy index method. The prominent features of the obtained frame are then extracted. A novel feature selection method based on mean and variance is used to select the required features for analysis. The paper then focuses on a fast and potent method for classification of vehicles using k-nearest neighbours algorithm (kNN) into three categories: Two wheelers, four wheelers and Heavy Transport Vehicles (HTVs). Thus the method achieves its required results by using expeditive algorithms.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89083348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Prevention of illegal distribution line tappings 防止非法抽打配电线路
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230035
Sheikh Suhail Mohammad, Auqib Ahmed Dar, Peerzada Aamir Javaid, P. Ranjan
Power theft is one of the major concerns of many developing countries including India. The state of Jammu and Kashmir is one of the worst affected states of India, having about 50% of transmission and distribution losses. The proposed work is an attempt to stop the losses by preventing the power theft, using encoding and decoding techniques of the analog signal. Encoding is done at the distribution transformer and the decoding circuit is incorporated within the smart electrical energy meter. The power line between the distribution transformer and the energy meter is protected as encoded power flows through it which cannot be used for running the home appliances, therefore providing protection against illegal distribution line tapping's. The proposed system is developed using Simulink.
电力盗窃是包括印度在内的许多发展中国家关注的主要问题之一。查谟和克什米尔邦是印度受影响最严重的邦之一,约有50%的传播和分配损失。提出的工作是利用模拟信号的编码和解码技术,通过防止电力盗窃来阻止损失。编码在配电变压器上完成,解码电路并入智能电能表内。配电变压器和电能表之间的电力线受到保护,因为经过编码的电流不能用于运行家用电器,因此可以防止非法窃听配电线路。该系统采用Simulink进行开发。
{"title":"Prevention of illegal distribution line tappings","authors":"Sheikh Suhail Mohammad, Auqib Ahmed Dar, Peerzada Aamir Javaid, P. Ranjan","doi":"10.1109/CCAA.2017.8230035","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230035","url":null,"abstract":"Power theft is one of the major concerns of many developing countries including India. The state of Jammu and Kashmir is one of the worst affected states of India, having about 50% of transmission and distribution losses. The proposed work is an attempt to stop the losses by preventing the power theft, using encoding and decoding techniques of the analog signal. Encoding is done at the distribution transformer and the decoding circuit is incorporated within the smart electrical energy meter. The power line between the distribution transformer and the energy meter is protected as encoded power flows through it which cannot be used for running the home appliances, therefore providing protection against illegal distribution line tapping's. The proposed system is developed using Simulink.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88904847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application of genetic algorithm in cryptanalysis of mono-alphabetic substitution cipher 遗传算法在单字母替代密码分析中的应用
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229834
Piyush Kumar Mudgal, Rajesh Purohit, Rajesh D. Sharma, Mahendra Kumar Jangir
Today, security is a vital concern in computer science, cryptography is used vastly for implementation of the same. Cryptanalysis is a process in which the security is attempted to breach and the complexity of this process is considered as security measurement. As cryptographic algorithm is open to all, the whole strength lies in the complexity of the key i.e. efforts to crack the key. Mostly the strength of the key is shown through its length, eventually the number of communication (Brute-force method). Genetic algorithms are considered to be a tool for meta heuristic applications. In this work an attempt is made to carry out cryptanalysis, through genetic algorithms. In this, mono-alphabetic substitution cipher technique is considered. The experiment is carried out for four key samples, and attempt to break with variations in genetic operators i.e. selection, crossover and mutation. Regarding variations, for selection-random with elitism, roulette wheel and tournament options are used, for crossover — 1-point, 2-point and Uniform options are used, with interchanging mutation.
今天,安全是计算机科学的一个重要问题,密码学被广泛用于实现同样的问题。密码分析是一个试图破坏安全性的过程,该过程的复杂性被认为是安全度量。由于密码算法是对所有人开放的,所以整个强度取决于密钥的复杂性,即破解密钥的努力。大多数情况下,密钥的强度是通过它的长度来显示的,最终是通信的数量(暴力破解方法)。遗传算法被认为是元启发式应用的一种工具。在这项工作中,试图通过遗传算法进行密码分析。本文考虑了单字母替代密码技术。实验以四个关键样本为对象,试图打破遗传操作的变异,即选择、交叉和突变。关于变化,对于精英主义的随机选择,使用轮盘赌和锦标赛选项,对于交叉- 1分,2分和统一选项,使用互换突变。
{"title":"Application of genetic algorithm in cryptanalysis of mono-alphabetic substitution cipher","authors":"Piyush Kumar Mudgal, Rajesh Purohit, Rajesh D. Sharma, Mahendra Kumar Jangir","doi":"10.1109/CCAA.2017.8229834","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229834","url":null,"abstract":"Today, security is a vital concern in computer science, cryptography is used vastly for implementation of the same. Cryptanalysis is a process in which the security is attempted to breach and the complexity of this process is considered as security measurement. As cryptographic algorithm is open to all, the whole strength lies in the complexity of the key i.e. efforts to crack the key. Mostly the strength of the key is shown through its length, eventually the number of communication (Brute-force method). Genetic algorithms are considered to be a tool for meta heuristic applications. In this work an attempt is made to carry out cryptanalysis, through genetic algorithms. In this, mono-alphabetic substitution cipher technique is considered. The experiment is carried out for four key samples, and attempt to break with variations in genetic operators i.e. selection, crossover and mutation. Regarding variations, for selection-random with elitism, roulette wheel and tournament options are used, for crossover — 1-point, 2-point and Uniform options are used, with interchanging mutation.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79605043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cause effect testing of flu in medical sciences 医学上流感的因果检验
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229769
Nishant Mathur, Reema Ajmera, J. Yadav
Now day's technology improves our living standards and life style and makes many things easier for us. But is the technology creates a gap between human and daily life routine which affects human body and their health and makes them sick so often. Using this approach we are proposed a basic model and try to find out various reasons by which Flu spreads among us and so often. With the help of data mining algorithms first do the analysis of the data which you provide, and find out the specific patterns. The algorithm uses the result of the analysis of data over much iteration to find optimal parameters for creating the mining model and using these parameters for finding out the details about different statistics and patterns which can came out while applying data mining technique on the data set.
现在的科技提高了我们的生活水平和生活方式,让很多事情对我们来说更容易。但是,这项技术在人类和日常生活之间造成了差距,影响了人类的身体和健康,使他们经常生病。利用这种方法,我们提出了一个基本模型,并试图找出流感在我们之间如此频繁地传播的各种原因。在数据挖掘算法的帮助下,首先对您提供的数据进行分析,找出具体的模式。该算法利用多次迭代的数据分析结果,找到最优参数来创建挖掘模型,并利用这些参数来找出在数据集上应用数据挖掘技术所能得到的不同统计和模式的细节。
{"title":"Cause effect testing of flu in medical sciences","authors":"Nishant Mathur, Reema Ajmera, J. Yadav","doi":"10.1109/CCAA.2017.8229769","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229769","url":null,"abstract":"Now day's technology improves our living standards and life style and makes many things easier for us. But is the technology creates a gap between human and daily life routine which affects human body and their health and makes them sick so often. Using this approach we are proposed a basic model and try to find out various reasons by which Flu spreads among us and so often. With the help of data mining algorithms first do the analysis of the data which you provide, and find out the specific patterns. The algorithm uses the result of the analysis of data over much iteration to find optimal parameters for creating the mining model and using these parameters for finding out the details about different statistics and patterns which can came out while applying data mining technique on the data set.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84621026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Triboelectric nanogenerator based on vertical contact separation mode for energy harvesting 基于垂直接触分离方式的能量收集摩擦纳米发电机
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230037
Khushboo, Puneet Azad
Triboelectric effect works on the principle of triboelectrification and electrostatic induction. This principle is used to generate voltage by converting mechanical energy into electrical energy. This paper presents the charging behavior of different capacitors by rubbing of two different materials using mechanical motion. The numerical and simulation modeling, describes the charging performance of a TENG with a bridge rectifier. It is also demonstrated that a 10 μF capacitor can be charged to a maximum of 24.04 volt in 300 seconds and it is also provide 2800 μJ/cm3 maximum energy density. Such system can be used for ultralow power electronic devices, biomedical devices and self-powered appliances etc.
摩擦电效应是根据摩擦带电和静电感应原理产生的。这个原理被用来把机械能转换成电能来产生电压。本文介绍了利用机械运动对两种不同材料进行摩擦后,不同电容器的充电行为。通过数值和仿真建模,描述了带桥式整流器的TENG充电性能。结果表明,一个10 μF的电容在300秒内可充至24.04伏,最大能量密度为2800 μJ/cm3。该系统可用于超低功耗电子器件、生物医学器件和自供电电器等。
{"title":"Triboelectric nanogenerator based on vertical contact separation mode for energy harvesting","authors":"Khushboo, Puneet Azad","doi":"10.1109/CCAA.2017.8230037","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230037","url":null,"abstract":"Triboelectric effect works on the principle of triboelectrification and electrostatic induction. This principle is used to generate voltage by converting mechanical energy into electrical energy. This paper presents the charging behavior of different capacitors by rubbing of two different materials using mechanical motion. The numerical and simulation modeling, describes the charging performance of a TENG with a bridge rectifier. It is also demonstrated that a 10 μF capacitor can be charged to a maximum of 24.04 volt in 300 seconds and it is also provide 2800 μJ/cm3 maximum energy density. Such system can be used for ultralow power electronic devices, biomedical devices and self-powered appliances etc.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89368570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An advanced AES algorithm using swap and 400 bit data block with flexible S-Box in Cloud Computing 云计算中采用交换和400位数据块的一种先进的AES算法
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229888
C. P. Pramod, Manjit Jaiswal
This paper suggests a new Advance Encryption Standard (AES) encryption technique. New Algorithm uses 400 bit block encryption scheme and a key dependent rotated S-Box which varies according to the 200 bit key provided by the user. Fixed S-box allows hackers to study S-box and find weaker points, whereas using key-dependent S-Box, it is harder for attacker to do any offline analysis of an attack on one particular set of S-boxes. This helps to store data in cloud securely and to transfer data without any obstruction or modification in Cloud Computing and big data.
提出了一种新的高级加密标准(AES)加密技术。新算法采用400位分组加密方案和一个密钥相关的旋转s盒,该s盒根据用户提供的200位密钥而变化。固定的S-box允许黑客研究S-box并找到弱点,而使用依赖密钥的S-box,攻击者很难对一组特定的S-box进行任何离线攻击分析。这有助于在云中安全地存储数据,并在云计算和大数据中不受任何阻碍或修改地传输数据。
{"title":"An advanced AES algorithm using swap and 400 bit data block with flexible S-Box in Cloud Computing","authors":"C. P. Pramod, Manjit Jaiswal","doi":"10.1109/CCAA.2017.8229888","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229888","url":null,"abstract":"This paper suggests a new Advance Encryption Standard (AES) encryption technique. New Algorithm uses 400 bit block encryption scheme and a key dependent rotated S-Box which varies according to the 200 bit key provided by the user. Fixed S-box allows hackers to study S-box and find weaker points, whereas using key-dependent S-Box, it is harder for attacker to do any offline analysis of an attack on one particular set of S-boxes. This helps to store data in cloud securely and to transfer data without any obstruction or modification in Cloud Computing and big data.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87226795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel polarization independent triple bandstop frequency selective surface for the mobile and wireless communication 一种用于移动和无线通信的新型极化无关三带阻频率选择表面
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230042
Monika Garg, Rekha Chahar, S. Yadav, Shweta Garg, D. Noor
In this paper, a novel and stable frequency selective surface has been proposed. The proposed design has incorporated a single sided FR-4 substrate with one square and two-crossed shaped loops which led to triple band reject (1.8 GHz, 2.5 GHz and 3.5 GHz) characteristics. The FR-4 substrate has a dielectric constant of 4.4 with loss tangent of 0.02 and dimension of 0.12 λ × 0.12 λ. The projected FSS design is polarization independent due to symmetrical structure. Therefore, it has produced a stable resonant frequency response at normal and oblique angles of incidences for both perpendicular TE and parallel TM wave modes. This stability of designed FSS has verified by its simulated results and realized in CST Microwave studio in frequency domain solver based on FDTD method. The transmission and reflection characteristics have analyzed at the selected band-stop/notch frequencies 1.8 GHz, 2.5 GHz and 3.5 GHz. More importantly, the proposed FSS is well suited to electromagnetic shielding in mobile and wireless indoor applications covering a wide spectrum with wider employability.
本文提出了一种新的稳定的频率选择曲面。提出的设计包含单面FR-4衬底,具有一个方形和两个交叉形状的环路,可实现三频段抑制(1.8 GHz, 2.5 GHz和3.5 GHz)特性。FR-4衬底的介电常数为4.4,损耗正切为0.02,尺寸为0.12 λ × 0.12 λ。由于结构对称,投影FSS设计与偏振无关。因此,在垂直的TE和平行的TM波模式下,它都产生了稳定的法向和斜入射角谐振频率响应。仿真结果验证了所设计的FSS的稳定性,并在CST微波工作室中基于FDTD方法的频域求解器中实现。分析了在1.8 GHz、2.5 GHz和3.5 GHz带阻/陷波频率下的传输和反射特性。更重要的是,所提出的FSS非常适合于移动和无线室内应用中的电磁屏蔽,覆盖广泛的频谱,具有更广泛的就业能力。
{"title":"A novel polarization independent triple bandstop frequency selective surface for the mobile and wireless communication","authors":"Monika Garg, Rekha Chahar, S. Yadav, Shweta Garg, D. Noor","doi":"10.1109/CCAA.2017.8230042","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230042","url":null,"abstract":"In this paper, a novel and stable frequency selective surface has been proposed. The proposed design has incorporated a single sided FR-4 substrate with one square and two-crossed shaped loops which led to triple band reject (1.8 GHz, 2.5 GHz and 3.5 GHz) characteristics. The FR-4 substrate has a dielectric constant of 4.4 with loss tangent of 0.02 and dimension of 0.12 λ × 0.12 λ. The projected FSS design is polarization independent due to symmetrical structure. Therefore, it has produced a stable resonant frequency response at normal and oblique angles of incidences for both perpendicular TE and parallel TM wave modes. This stability of designed FSS has verified by its simulated results and realized in CST Microwave studio in frequency domain solver based on FDTD method. The transmission and reflection characteristics have analyzed at the selected band-stop/notch frequencies 1.8 GHz, 2.5 GHz and 3.5 GHz. More importantly, the proposed FSS is well suited to electromagnetic shielding in mobile and wireless indoor applications covering a wide spectrum with wider employability.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86947891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance analysis of hybrid & non-hybrid approaches in digital image analysis 数字图像分析中混合与非混合方法的性能分析
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229948
Mohammad Shahnawaz, R. Dwivedi
In this paper general study on performance analysis like Entropy, Correlation, Execution time, Histograme etc are discussed. On the basis of this study a model on digital image analysis will propose which is also using hybrid & non-hybrid approaches like Fuzzy c-means (FCM), Possibilistic c-means (PCM).
本文讨论了性能分析的一般研究,如熵、相关性、执行时间、直方图等。在本研究的基础上,将提出一个数字图像分析模型,该模型也使用混合和非混合方法,如模糊c均值(FCM),可能性c均值(PCM)。
{"title":"Performance analysis of hybrid & non-hybrid approaches in digital image analysis","authors":"Mohammad Shahnawaz, R. Dwivedi","doi":"10.1109/CCAA.2017.8229948","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229948","url":null,"abstract":"In this paper general study on performance analysis like Entropy, Correlation, Execution time, Histograme etc are discussed. On the basis of this study a model on digital image analysis will propose which is also using hybrid & non-hybrid approaches like Fuzzy c-means (FCM), Possibilistic c-means (PCM).","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82012214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indirect mutual trust for third party proving data stored in distributed-cloud storage 间接相互信任第三方证明数据存储在分布式云存储
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229870
M. Saleem, Mohd Naqeeb, Abdul Quyoom, Mudasser Nazar
Checking data integrity remotely is of essential significance in cloud storage. It enables customers to check if their remotely stored information is intact or not without downloading the entire information. Out of two main focuses, we propose a remote information integrity checking model: ID-DPDP (personality based conveyed provable information ownership) in distributed-cloud storage. The conventional framework and security model are specified. Taking into account the bilinear pairings, a solid ID-DPDP model is planned. The proposed ID-DPDP model is provably secure under the hardness suspicion of the standard CDH (computational Deffie-Hellman) issue. Notwithstanding the auxiliary favourable position of end of authentication administration, our ID-DPDP protocol is likewise proficient and adaptable. In light of the customer's approval, the proposed ID-DPDP model can understand private confirmation, group check and public verification.
远程检查数据完整性在云存储中具有重要意义。它使客户无需下载全部信息就可以检查远程存储的信息是否完整。基于两个主要关注点,我们提出了一种远程信息完整性检查模型:分布式云存储中的ID-DPDP(基于个性的可证明信息所有权)。指定了常规框架和安全模型。考虑双线性配对,规划了实体ID-DPDP模型。在标准CDH (computational Deffie-Hellman)问题的硬度怀疑下,所提出的ID-DPDP模型是安全的。除了身份验证管理的辅助优势之外,我们的ID-DPDP协议同样精通且适应性强。根据客户的批准,提出的ID-DPDP模型可以理解私人确认、组检查和公共验证。
{"title":"Indirect mutual trust for third party proving data stored in distributed-cloud storage","authors":"M. Saleem, Mohd Naqeeb, Abdul Quyoom, Mudasser Nazar","doi":"10.1109/CCAA.2017.8229870","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229870","url":null,"abstract":"Checking data integrity remotely is of essential significance in cloud storage. It enables customers to check if their remotely stored information is intact or not without downloading the entire information. Out of two main focuses, we propose a remote information integrity checking model: ID-DPDP (personality based conveyed provable information ownership) in distributed-cloud storage. The conventional framework and security model are specified. Taking into account the bilinear pairings, a solid ID-DPDP model is planned. The proposed ID-DPDP model is provably secure under the hardness suspicion of the standard CDH (computational Deffie-Hellman) issue. Notwithstanding the auxiliary favourable position of end of authentication administration, our ID-DPDP protocol is likewise proficient and adaptable. In light of the customer's approval, the proposed ID-DPDP model can understand private confirmation, group check and public verification.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89982462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research directions in the Internet of Every Things(IoET) 物联网(IoET)研究方向
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230008
Prachi Deshpande, B. Iyer
It is believed that technology will take over the day to day life of human begin. No one can remain isolated from the adaptation of technology. Hence it is the need of the hour to introduce a technology which will do the day to day life tasks in human life with smart and intelligent way. Hence, this paper critically discuss the emergence and progress of Internet of Every Things (IoET) as the next generation communication tool. Further, the various research avenues and open challenges in the area of IoET are discussed in detail.
人们相信科技将接管人类的日常生活。没有人能够孤立于技术的适应之外。因此,现在需要引入一种技术,以智能和智能的方式完成人类生活中的日常生活任务。因此,本文批判性地讨论了作为下一代通信工具的物联网(IoET)的出现和发展。此外,详细讨论了物联网领域的各种研究途径和开放挑战。
{"title":"Research directions in the Internet of Every Things(IoET)","authors":"Prachi Deshpande, B. Iyer","doi":"10.1109/CCAA.2017.8230008","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230008","url":null,"abstract":"It is believed that technology will take over the day to day life of human begin. No one can remain isolated from the adaptation of technology. Hence it is the need of the hour to introduce a technology which will do the day to day life tasks in human life with smart and intelligent way. Hence, this paper critically discuss the emergence and progress of Internet of Every Things (IoET) as the next generation communication tool. Further, the various research avenues and open challenges in the area of IoET are discussed in detail.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89584769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
期刊
2017 International Conference on Computing, Communication and Automation (ICCCA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1