首页 > 最新文献

2017 International Conference on Computing, Communication and Automation (ICCCA)最新文献

英文 中文
A Bee colony inspired clustering protocol for wireless sensor networks 一种蜂群启发的无线传感器网络聚类协议
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229865
Zaheeruddin, A. Pathak
A Wireless Sensor Network consists of enormous amount of sensor nodes. These sensor nodes sense the information from the sensing region and transmit to the sink. From the sink a client can access the required information. Essential part of the wireless sensor network is the sensor nodes that are driven with the batteries. Prolonging the network lifetime is very difficult and expensive in many conditions (eg. resource exploration in hostile locations, wildlife safety etc). Dividing the sensing area into clusters is advantages in wireless sensor network to enhance network lifetime. In this paper, Bee colony inspired clustering protocol is introduced which takes of inspiration for achieving high efficiency and stability performance from bee colonies. Experimental results demonstrate the efficiency of proposed protocol to strike the appropriate performance in the lifetime of the wireless sensor network.
无线传感器网络由大量的传感器节点组成。这些传感器节点从感知区域感知信息并传输到接收器。客户机可以从接收器访问所需的信息。无线传感器网络的重要组成部分是由电池驱动的传感器节点。在许多情况下,延长网络生命周期是非常困难和昂贵的。在危险地区的资源勘探,野生动物安全等)。将传感区域划分成簇是无线传感器网络中提高网络寿命的优势。本文介绍了蜂群启发聚类协议,该协议为实现蜂群高效、稳定的性能提供了灵感。实验结果表明,该协议能够在无线传感器网络的生命周期内达到适当的性能。
{"title":"A Bee colony inspired clustering protocol for wireless sensor networks","authors":"Zaheeruddin, A. Pathak","doi":"10.1109/CCAA.2017.8229865","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229865","url":null,"abstract":"A Wireless Sensor Network consists of enormous amount of sensor nodes. These sensor nodes sense the information from the sensing region and transmit to the sink. From the sink a client can access the required information. Essential part of the wireless sensor network is the sensor nodes that are driven with the batteries. Prolonging the network lifetime is very difficult and expensive in many conditions (eg. resource exploration in hostile locations, wildlife safety etc). Dividing the sensing area into clusters is advantages in wireless sensor network to enhance network lifetime. In this paper, Bee colony inspired clustering protocol is introduced which takes of inspiration for achieving high efficiency and stability performance from bee colonies. Experimental results demonstrate the efficiency of proposed protocol to strike the appropriate performance in the lifetime of the wireless sensor network.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84744666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Edge detection using particle swarm optimization technique 基于粒子群优化技术的边缘检测
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229843
Ruchika Chaudhary, A. Patel, Sushil Kumar, S. Tomar
Handwriting recognition has been a major topic of research since past many years. There have been several approaches to handwriting recognition but the recognition of handwritten characters using deep learning has been a hot topic of research in the past five years. This paper proposes a method of converting handwritten text into speech at real time using the concept of deep neural networks. Moreover the pre-processing is improved by using an enhanced edge detection method for thinning the boundaries of the segmented characters. The recognized text is converted into speech. This system provides the benefit of reducing the hectic task of manually going through the handwritten documents in places such as banks and post offices. It can have various applications such as the audio based checking of exam sheets of students in schools and colleges preventing the task of recognizing the handwritten characters, would be beneficial for the blind, for the people who are illiterate and do not know reading but know a specific language. It proposes to reduce the human effort in understanding one's handwriting and easily they can listen to the speech converted. It can be beneficial for the students as well as they can simple listen to their notes and learn better.
多年来,手写识别一直是一个重要的研究课题。手写识别的方法有很多种,但在过去五年中,使用深度学习来识别手写字符一直是研究的热点。本文提出了一种利用深度神经网络的概念将手写文本实时转换为语音的方法。此外,通过使用增强的边缘检测方法来细化分割字符的边界,改进了预处理。被识别的文本被转换成语音。该系统的好处是减少了在银行和邮局等地方手工检查手写文件的繁忙任务。它可以有各种各样的应用,例如基于音频的检查学生在学校和大学的试卷,防止识别手写字符的任务,这将有利于盲人,对于文盲和不知道阅读但知道特定语言的人。它提出了减少人类理解笔迹的努力,他们可以很容易地听转换后的演讲。这对学生来说是有益的,因为他们可以简单地听笔记,更好地学习。
{"title":"Edge detection using particle swarm optimization technique","authors":"Ruchika Chaudhary, A. Patel, Sushil Kumar, S. Tomar","doi":"10.1109/CCAA.2017.8229843","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229843","url":null,"abstract":"Handwriting recognition has been a major topic of research since past many years. There have been several approaches to handwriting recognition but the recognition of handwritten characters using deep learning has been a hot topic of research in the past five years. This paper proposes a method of converting handwritten text into speech at real time using the concept of deep neural networks. Moreover the pre-processing is improved by using an enhanced edge detection method for thinning the boundaries of the segmented characters. The recognized text is converted into speech. This system provides the benefit of reducing the hectic task of manually going through the handwritten documents in places such as banks and post offices. It can have various applications such as the audio based checking of exam sheets of students in schools and colleges preventing the task of recognizing the handwritten characters, would be beneficial for the blind, for the people who are illiterate and do not know reading but know a specific language. It proposes to reduce the human effort in understanding one's handwriting and easily they can listen to the speech converted. It can be beneficial for the students as well as they can simple listen to their notes and learn better.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90990651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Power and capacity optimization for wireless sensor network (WSN) 无线传感器网络(WSN)的功率和容量优化
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229895
A. Basnet, S. Shakya, Mandira Thapa
Latest technology requires increase in spectral efficiency by optimum utilization of the spectrum band with higher power efficiency. In this paper first, Altera FPGA for communication with FIR band pass filter has been analyzed and implemented in hardware and then maximum allowable total power that interferes below than limit is adaptively calculated. For power distribution, two power and capacity optimization algorithm; namely Water filling and Iterative water filling are used. The paper is also able to calculate and distribute power in different subcarrier for multiple nodes to maximize total system data rate or spectrum efficiency.
最新技术要求以更高的功率效率优化利用频谱带,从而提高频谱效率。本文首先对Altera带FIR带通滤波器通信FPGA进行了分析和硬件实现,然后自适应计算出干扰小于限值的最大允许总功率。对于配电,采用两种功率和容量优化算法;即充水法和迭代充水法。本文还能够计算和分配多个节点在不同子载波上的功率,以最大限度地提高系统的总数据速率或频谱效率。
{"title":"Power and capacity optimization for wireless sensor network (WSN)","authors":"A. Basnet, S. Shakya, Mandira Thapa","doi":"10.1109/CCAA.2017.8229895","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229895","url":null,"abstract":"Latest technology requires increase in spectral efficiency by optimum utilization of the spectrum band with higher power efficiency. In this paper first, Altera FPGA for communication with FIR band pass filter has been analyzed and implemented in hardware and then maximum allowable total power that interferes below than limit is adaptively calculated. For power distribution, two power and capacity optimization algorithm; namely Water filling and Iterative water filling are used. The paper is also able to calculate and distribute power in different subcarrier for multiple nodes to maximize total system data rate or spectrum efficiency.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87821063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review on finger vein feature extraction methods 手指静脉特征提取方法综述
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229983
Rahul Dev, Ruqaiya Khanam
In today's era, personal information security is major topic of concern. In this regard many advanced techniques are used but still in all of those biometric is most reliable. Biometric technologies are based on individual's biological and behavioural characteristics. These system includes human finger, vein, iris, hand and many other as its identifiers. Biometric system using finger-vein as one of its trait is most widely accepted. This paper reviews the various method of feature extraction in finger vein recognition. Most of the existing work is functionally described and compared in three parts i.e., Finger vein image acquisition, pre-processing and feature extraction.
在当今时代,个人信息安全是人们关注的重大话题。在这方面使用了许多先进的技术,但在所有这些生物识别技术中仍然是最可靠的。生物识别技术是基于个人的生物和行为特征。该系统包括人的手指、静脉、虹膜、手等多种身份标识。利用指静脉作为其特征之一的生物识别系统是最被广泛接受的。本文综述了手指静脉识别中的各种特征提取方法。现有的大部分工作主要从手指静脉图像采集、预处理和特征提取三个部分进行功能描述和比较。
{"title":"Review on finger vein feature extraction methods","authors":"Rahul Dev, Ruqaiya Khanam","doi":"10.1109/CCAA.2017.8229983","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229983","url":null,"abstract":"In today's era, personal information security is major topic of concern. In this regard many advanced techniques are used but still in all of those biometric is most reliable. Biometric technologies are based on individual's biological and behavioural characteristics. These system includes human finger, vein, iris, hand and many other as its identifiers. Biometric system using finger-vein as one of its trait is most widely accepted. This paper reviews the various method of feature extraction in finger vein recognition. Most of the existing work is functionally described and compared in three parts i.e., Finger vein image acquisition, pre-processing and feature extraction.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84025399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A medical image identification system based on mixture models 基于混合模型的医学图像识别系统
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229988
T. V. M. Rao, Yarramalle Srinivas
Content Based Image Retrievals has become the most abbreviated thrust area today. The article we propose is a methodology for identifying the images based on relevancy using Kullback-Leibler method together with Generalized Gamma mixture model. The experimentation is carried out on the medical dataset namely med.univ-rennes1.fr and the results derived are compared for accuracy in terms of better perception. The results showcase that the performance of the method is about 84% and it is also performing efficiently in case of huge datasets.
基于内容的图像检索已成为当今最热门的领域。本文提出了一种利用Kullback-Leibler方法结合广义伽玛混合模型进行图像相关性识别的方法。实验在医学数据集med.univ-rennes1.fr上进行,并从更好的感知角度比较了所得结果的准确性。结果表明,该方法的性能约为84%,并且在大数据集的情况下也能有效地执行。
{"title":"A medical image identification system based on mixture models","authors":"T. V. M. Rao, Yarramalle Srinivas","doi":"10.1109/CCAA.2017.8229988","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229988","url":null,"abstract":"Content Based Image Retrievals has become the most abbreviated thrust area today. The article we propose is a methodology for identifying the images based on relevancy using Kullback-Leibler method together with Generalized Gamma mixture model. The experimentation is carried out on the medical dataset namely med.univ-rennes1.fr and the results derived are compared for accuracy in terms of better perception. The results showcase that the performance of the method is about 84% and it is also performing efficiently in case of huge datasets.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82218940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient distribution of virtual machines using Honey bee windowing in cloud computing 在云计算中利用蜜蜂窗口实现虚拟机的高效分配
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229996
A. Firos, Seema Khanum
This paper presents an approach for developing virtual computing layer which is used by the cloud terminals during the virtual infrastructure downloading. The virtual computing layer is cable of image creation, maintenance and downloading on behalf of the cloud terminals. Using such virtual computing layer will considerably reduce the load maintained between the virtual computing client and the server. It also schedules the image downloading in the cloud infrastructure based on software image windows. The Honey bee foraging algorithm performs the work in different phases while creation of virtual images. The forage bees will search for the suitable image portion in the neighborhood and the scout bees will bring the found portion from the location indicated by the forage bees.
本文提出了一种开发虚拟计算层的方法,供云终端在虚拟基础设施下载过程中使用。虚拟计算层是代表云终端进行镜像创建、维护和下载的线缆。使用这种虚拟计算层将大大减少虚拟计算客户机和服务器之间的负载维护。它还基于软件镜像窗口调度云基础设施中的镜像下载。蜜蜂觅食算法在创建虚拟图像时分不同阶段进行工作。觅食蜂将在附近搜索合适的图像部分,侦察蜂将从觅食蜂所指示的位置带来找到的图像部分。
{"title":"Efficient distribution of virtual machines using Honey bee windowing in cloud computing","authors":"A. Firos, Seema Khanum","doi":"10.1109/CCAA.2017.8229996","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229996","url":null,"abstract":"This paper presents an approach for developing virtual computing layer which is used by the cloud terminals during the virtual infrastructure downloading. The virtual computing layer is cable of image creation, maintenance and downloading on behalf of the cloud terminals. Using such virtual computing layer will considerably reduce the load maintained between the virtual computing client and the server. It also schedules the image downloading in the cloud infrastructure based on software image windows. The Honey bee foraging algorithm performs the work in different phases while creation of virtual images. The forage bees will search for the suitable image portion in the neighborhood and the scout bees will bring the found portion from the location indicated by the forage bees.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84378614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent advancements in facial expression recognition systems: A survey 面部表情识别系统的最新进展:综述
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229981
Uzair Asad, Nirbhay Kashyap, Shailendra Narayan Singh
A facial expression is exhibited by the movement of muscles underneath the face skin. Automatic Facial Expression Recognition comprises of three main phases: Feature Extraction, Feature Selection and Expression Classification. Facial Expression Recognition (FER) has a very important role in computer vision, human machine interaction and modern gaming. The objective of this research work is to explore the latest developments in Facial Expression Recognition domain. Our work identified the different models that are being utilized for feature extraction, the methods used for feature selection process and the classifiers employed for the purpose of expression classification. We gathered all the data like the methods used in different publications and their main contribution in this field and assembled the information in a tabulated form. We also tried to find out what could be the upcoming developments in Facial Expression Recognition Systems as future scope.
面部表情是通过面部皮肤下肌肉的运动来表现的。面部表情自动识别主要包括三个阶段:特征提取、特征选择和表情分类。面部表情识别(FER)在计算机视觉、人机交互和现代游戏中有着非常重要的作用。本研究的目的是探讨面部表情识别领域的最新发展。我们的工作确定了用于特征提取的不同模型,用于特征选择过程的方法以及用于表达分类的分类器。我们收集了所有数据,如不同出版物使用的方法及其在该领域的主要贡献,并将这些信息汇总成表格。我们还试图找出面部表情识别系统未来的发展方向。
{"title":"Recent advancements in facial expression recognition systems: A survey","authors":"Uzair Asad, Nirbhay Kashyap, Shailendra Narayan Singh","doi":"10.1109/CCAA.2017.8229981","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229981","url":null,"abstract":"A facial expression is exhibited by the movement of muscles underneath the face skin. Automatic Facial Expression Recognition comprises of three main phases: Feature Extraction, Feature Selection and Expression Classification. Facial Expression Recognition (FER) has a very important role in computer vision, human machine interaction and modern gaming. The objective of this research work is to explore the latest developments in Facial Expression Recognition domain. Our work identified the different models that are being utilized for feature extraction, the methods used for feature selection process and the classifiers employed for the purpose of expression classification. We gathered all the data like the methods used in different publications and their main contribution in this field and assembled the information in a tabulated form. We also tried to find out what could be the upcoming developments in Facial Expression Recognition Systems as future scope.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89944557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fit-Wit: Design and development of wearable healthcare device based on Intel Curie platform Fit-Wit:基于英特尔Curie平台的可穿戴医疗设备的设计与开发
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230014
N. Sharma, Zeenat Shareef, S. Reddy
Many wearable devices have been developed with different technologies to track the fitness of human body. Smart watches, wrist bands, smart phones have been designed to support such applications. But many of them are unaffordable because of very high cost and high power consumption. This paper deals with the design and development of a smart wearable device called “Fit-Wit” as this device will witness the fitness of an individual. This device informs the user about their body temperature, heart-rate and motion. The device is based on Intel Genuino 101 development platform as it is specifically designed for wearable healthcare technology due to its small size and lower power dissipation. Effort is being taken to make this device simple, small size, portable and easy to use. Further, an analysis is conducted which ensures consistency and accuracy of the device.
许多可穿戴设备已经开发出来,采用不同的技术来跟踪人体的健康状况。智能手表、腕带、智能手机都是为支持此类应用而设计的。但由于成本高、功耗大,很多都是人们负担不起的。本文设计并开发了一款名为“Fit-Wit”的智能可穿戴设备,该设备将见证个人的健康状况。这个设备会告诉用户他们的体温、心率和运动情况。该设备体积小,功耗低,是专为可穿戴医疗技术设计的,基于英特尔Genuino 101开发平台。人们正在努力使这种设备简单、体积小、便于携带和使用。此外,还进行了分析,以确保设备的一致性和准确性。
{"title":"Fit-Wit: Design and development of wearable healthcare device based on Intel Curie platform","authors":"N. Sharma, Zeenat Shareef, S. Reddy","doi":"10.1109/CCAA.2017.8230014","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230014","url":null,"abstract":"Many wearable devices have been developed with different technologies to track the fitness of human body. Smart watches, wrist bands, smart phones have been designed to support such applications. But many of them are unaffordable because of very high cost and high power consumption. This paper deals with the design and development of a smart wearable device called “Fit-Wit” as this device will witness the fitness of an individual. This device informs the user about their body temperature, heart-rate and motion. The device is based on Intel Genuino 101 development platform as it is specifically designed for wearable healthcare technology due to its small size and lower power dissipation. Effort is being taken to make this device simple, small size, portable and easy to use. Further, an analysis is conducted which ensures consistency and accuracy of the device.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90179427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A comment on efficient certificateless aggregate signature scheme 关于高效无证书聚合签名方案的评述
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229854
Pankaj Kumar, Vishnu Sharma
Certificateless signature scheme provides the solution of key escrow problem inherit in ID based public key cryptography. Aggregate signature allows aggregating of n signature in one single short signature which is very efficient in ad-hoc networks, PDA, mobile computation and more. A certificateless aggregate signature scheme solves not only the certification problem and key escrow problem but also done aggregation of n user's signatures. Recently, Deng et al proposed a certificateless aggregate signature scheme in “Concurrency and Computation: Practice and Experience” [doi: 10.1002/cpe.3551] in 2015 and claims that it is unforgeable under some concrete attacks but during security analysis we found it is insecure by some concrete attacks. In this paper, we show that proposed scheme is forged by universal adversary.
无证书签名方案解决了基于ID的公钥加密中的密钥托管继承问题。聚合签名允许将n个签名聚合在一个短签名中,这在ad-hoc网络、PDA、移动计算等领域非常有效。无证书聚合签名方案不仅解决了证书问题和密钥托管问题,而且解决了n个用户签名的聚合问题。最近,Deng等人在“并发与计算:实践与经验”[doi: 10.1002/cpe]中提出了一种无证书聚合签名方案。3551]并声称它在一些具体攻击下是不可伪造的,但在安全分析期间,我们发现它在一些具体攻击下是不安全的。在本文中,我们证明了该方案是被普遍对手伪造的。
{"title":"A comment on efficient certificateless aggregate signature scheme","authors":"Pankaj Kumar, Vishnu Sharma","doi":"10.1109/CCAA.2017.8229854","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229854","url":null,"abstract":"Certificateless signature scheme provides the solution of key escrow problem inherit in ID based public key cryptography. Aggregate signature allows aggregating of n signature in one single short signature which is very efficient in ad-hoc networks, PDA, mobile computation and more. A certificateless aggregate signature scheme solves not only the certification problem and key escrow problem but also done aggregation of n user's signatures. Recently, Deng et al proposed a certificateless aggregate signature scheme in “Concurrency and Computation: Practice and Experience” [doi: 10.1002/cpe.3551] in 2015 and claims that it is unforgeable under some concrete attacks but during security analysis we found it is insecure by some concrete attacks. In this paper, we show that proposed scheme is forged by universal adversary.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90455015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
General study of intrusion detection system and survey of agent based intrusion detection system 入侵检测系统概论及基于agent的入侵检测系统综述
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229866
A. Saxena, S. Sinha, P. Shukla
In today's world one of the most severe threat to computer security is the illegal intrusion into a computer system. As the network applications are growing rapidly, new sort of network attacks are rising continuously. The intrusion detection system IDS is used for the detection of the intrusion activity extends over the public network. IDS may need to deal with different audit record format. IDS have turn out to be essential security tool for detecting the attacks on computer network and resources. Due to this, we presented a review (general study) on IDS. First, we will discuss about intrusion detection later will discuss the type of IDS. We have emphasize on the range of type of IDS like anomaly, misuse, host based, network based and hybrid IDS, specifically IDS based on the anomaly or behavior based IDS along with Agent based technology in real network. At last, the contribution of every single type of IDS is described.
在当今世界,对计算机安全最严重的威胁之一是非法侵入计算机系统。随着网络应用的快速增长,新型网络攻击也在不断涌现。入侵检测系统IDS用于检测扩展到公网的入侵活动。IDS可能需要处理不同的审计记录格式。入侵检测已成为检测对计算机网络和资源的攻击必不可少的安全工具。因此,我们对IDS进行了综述(一般研究)。首先,我们将讨论入侵检测,稍后将讨论入侵检测的类型。本文着重介绍了异常入侵、误用入侵、基于主机的入侵、基于网络的入侵和混合入侵,特别是基于异常的入侵和基于行为的入侵以及基于Agent技术的入侵。最后,介绍了各类入侵检测系统的贡献。
{"title":"General study of intrusion detection system and survey of agent based intrusion detection system","authors":"A. Saxena, S. Sinha, P. Shukla","doi":"10.1109/CCAA.2017.8229866","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229866","url":null,"abstract":"In today's world one of the most severe threat to computer security is the illegal intrusion into a computer system. As the network applications are growing rapidly, new sort of network attacks are rising continuously. The intrusion detection system IDS is used for the detection of the intrusion activity extends over the public network. IDS may need to deal with different audit record format. IDS have turn out to be essential security tool for detecting the attacks on computer network and resources. Due to this, we presented a review (general study) on IDS. First, we will discuss about intrusion detection later will discuss the type of IDS. We have emphasize on the range of type of IDS like anomaly, misuse, host based, network based and hybrid IDS, specifically IDS based on the anomaly or behavior based IDS along with Agent based technology in real network. At last, the contribution of every single type of IDS is described.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90461057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
2017 International Conference on Computing, Communication and Automation (ICCCA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1