2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)最新文献

筛选
英文 中文
Implementation of optical OFDM based system for optical networks 基于光OFDM的光网络系统实现
B. Rindhe, J. Digge, S. K. Narayankhedkar
{"title":"Implementation of optical OFDM based system for optical networks","authors":"B. Rindhe, J. Digge, S. K. Narayankhedkar","doi":"10.1109/EIC.2015.7230706","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230706","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM), a frequency division multiplexing scheme utilized as a digital multi-carrier modulation technique, implemented using optical fiber link for practical applications thereby developing optical OFDM using OptSim simulation. OFDM has many advantages over other modulation techniques such as a high resistance to inter-symbol interference (ISI) and it is robust against fading caused by multipath propagation. Optical fiber cable (OFC) as a transmission media is used for distortion less transmission of data at a very higher data speed. OFC cable has a lot of advantages over other media. And OFDM over OFC cable will provide data speeds at a very high speed and with very less losses. In this work optical transmitter and receiver for OFDM based optical network has designed for high speed data transmission over optical fiber. While modeling the system we have also used post, pre and symmetric compensation technique to reconfigure the bandwidth along with add drop multiplexer, tunable filters and optical amplifiers to achieve high performance with minimum distortion and low bit error rate (BER).","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126318754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Analysisof Photonic bandgap structure in 2-D hexagonal and square lattice structure of photonic crystal 光子晶体二维六边形和方形晶格结构的光子带隙结构分析
M. Waghmare, K. Reddy
{"title":"Analysisof Photonic bandgap structure in 2-D hexagonal and square lattice structure of photonic crystal","authors":"M. Waghmare, K. Reddy","doi":"10.1109/EIC.2015.7230704","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230704","url":null,"abstract":"This paper revels a defected 2-D hexagonal lattice structure for large frequency range. The 2-D Plane wave expansion (PWE) method is used to investigate large frequency range. It has been shown theoretically that it is possible to obtain large frequency range by adjusting filling factor and absolute frequency.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126507782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Private cloud security: Secured user authentication by using enhanced hybrid algorithm 私有云安全:通过使用增强的混合算法保护用户身份验证
Nikhil Gajra, S. Khan, Pradnya B. Rane
{"title":"Private cloud security: Secured user authentication by using enhanced hybrid algorithm","authors":"Nikhil Gajra, S. Khan, Pradnya B. Rane","doi":"10.1109/EIC.2015.7230712","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230712","url":null,"abstract":"Using cloud computing, users store their data remotely to third party owners and enjoy the on-demand applications, services and storage from a shared pool of configurable computing resources, without the burden of data storage and maintenance and costs. However, we must provide security guarantees not only on authentication but also on files over the cloud for the outsourced data, which is now maintained by third parties such as cloud providers. This research focuses on mechanism, the hybrid of AES and Blowfish for encryption. For key management and key exchange, Key is generated by the ECC key generator and then Key agreement can be done by Diffie-Hellman. Combining the concept of ECC and DH is called Elliptic Curve Diffie-Hellman (ECDH) key exchange. Authentication should be done by Using Elliptic Curve Digital Signature Algorithm (ECDSA). This provides security protection for outsourced data, while introducing only minimal performance and monetary cost overhead.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132063719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
CAPTCHA: A robust approach to resist online password guessing attacks 验证码:一种抵御在线密码猜测攻击的强大方法
Rohini B. Varne, R. Mane
{"title":"CAPTCHA: A robust approach to resist online password guessing attacks","authors":"Rohini B. Varne, R. Mane","doi":"10.1109/EIC.2015.7230731","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230731","url":null,"abstract":"Brute force and Dictionary attacks have become an inevitable security threat to web applications today. Common measures taken to prevent online password guessing attacks like account locking mechanism are ineffective if an attacker has access to a number of compromised machines from a botnet. The main goal is to design a web application that restricts such attacks and at the same time enable convenient login to valid users. CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is an effective challengeresponse test to achieve this goal because of its usability and robustness. These are the tests that cannot be solved by current computer programs or bots, but are easily solvable by humans. This ensures that the account is being accessed by a human and not by an automated program. The proposed system implements a secure CAPTCHA that withstands segmentation attacks and also provides various difficulty levels in CAPTCHA design. Classification of CAPTCHA and its robustness is discussed","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130024167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new avatar dynamic image based CAPTCHA service on cloud for Mobile devices 一种新的基于移动设备云上头像动态图像的验证码服务
Prasad V. Kalne, V. Kolhe
{"title":"A new avatar dynamic image based CAPTCHA service on cloud for Mobile devices","authors":"Prasad V. Kalne, V. Kolhe","doi":"10.1109/EIC.2015.7230732","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230732","url":null,"abstract":"Use of Mobile devices and internet developed gradually into a ubiquitous network and web has taken an increasingly central role in our communication. Recently the emergence of intelligent, sophisticated attacks like DOS (Denial of Service) makes web services more vulnerable than ever. To handle the DOS attacks, CAPTCHAs are used as one of the standard security technology. CAPTCHAs generate grade tests that most humans can pass but current computer programs can't. Human users and automated scripts can be classified and CAPTCHA is one of the possible ways to classify them. Text based CAPTCHAs are used in many applications but they face a challenge due to language dependency. Dynamic image based CAPTCHAs can strength the robustness of CAPTCHAs. It improves the human success rate. The probability of a BOT hacking the system is considerably low as compared to existing text based CAPTCHA. In this paper, an image-based Avatar CAPTCHA for mobile devices has been proposed as a potential solution. The solution of CAPTCHA is that users must correctly identify visually distorted human faces embedded in a complex background without selecting any non-human Avatar face. With this proposed work, CAPTCHA service is hosted on cloud that will generate CAPTCHA on cloud, so it improves efficiency of CAPTCHA generation also reduces response time for the use to authenticate as human. The need for usability and presentation that is required for a mobile device is considered during implementation. The proposed algorithm generates a CAPTCHA that offers better accuracy and lower machine attack rates compared to existing approaches.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132044573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applications of Rafid operator to analytic and multivalent functions with negative coefficient Rafid算子在负系数解析函数和多价函数中的应用
J. Jain, S. Khairnar
{"title":"Applications of Rafid operator to analytic and multivalent functions with negative coefficient","authors":"J. Jain, S. Khairnar","doi":"10.1109/EIC.2015.7230713","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230713","url":null,"abstract":"The aim of this paper is to introduce and investigate the class P(p,α,β,μ,λ) which consist of analytic and multivalent functions with negative coefficient in the unit disc, defined by hadamard product with Rafid operator. To obtain Coefficient bounds, extreme points, hadamard product, radius of starlikeness, convexity and close to convexity. Also to determine the distortion theorem using fractional techniques of this class.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128524449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of Fountain Coded OFDM system over Rician fading channel 喷泉编码OFDM系统在专家衰落信道下的性能分析
K. Sharma, Ambika Verma, J. Kaur
{"title":"Performance analysis of Fountain Coded OFDM system over Rician fading channel","authors":"K. Sharma, Ambika Verma, J. Kaur","doi":"10.1109/EIC.2015.7230702","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230702","url":null,"abstract":"Fountain Codes belongs to the class of rateless codes[4] which effectively improves the performance of systems used for wireless data transmission. In this paper, we present a quantitative analysis of Fountain Coded Orthogonal Frequency Division Multiplexing (OFDM) systems over Rician faded channel. Bit Error Rate (BER) performance evaluation and comparison is carried out for Fountain Coded and Convolution Coded OFDM systems. Utilizing this model we investigated the merits of Fountain Codes over OFDM and Convolution Codes, resulting in better system performance. The simulated results of OFDM system in terms of BER shows that Fountain Coded OFDM system has a coding gain of 3.25 dB as compared to Convolution Coded OFDM system.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security issues related to web services in e-commerce 电子商务中与web服务相关的安全问题
P. Chandratre, U. Kulkarni
{"title":"Security issues related to web services in e-commerce","authors":"P. Chandratre, U. Kulkarni","doi":"10.1109/EIC.2015.7230735","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230735","url":null,"abstract":"E-commerce web sites how to use web mining technology for providing security on e-commerce web sites. The connection between web mining security and ecommerce analyzed based on user behavior on web. Different web mining algorithms and security algorithm are used to provided security on e-commerce web sites. Based on customer behavior different web mining algorithms like page rank algorithm and trust rank algorithm is used for developing web mining framework in e-commerce web sites. This application will develop false hit database algorithm and nearest neighbor algorithm to provide security on e-commerce web site.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121252474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud workload management and utilization measurement using Host Controller and even distribution criterion 基于主机控制器和均匀分布准则的云工作负载管理和利用率测量
Nikita Haryani, Nishi Tikku, Dhanamma Jagli
{"title":"Cloud workload management and utilization measurement using Host Controller and even distribution criterion","authors":"Nikita Haryani, Nishi Tikku, Dhanamma Jagli","doi":"10.1109/EIC.2015.7230737","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230737","url":null,"abstract":"The up-and-coming cloud computing model endeavors to deal with the explosive growth of web-connected devices and manage colossal amount of data and patron demands. Thereby, giving rise to the query whether this escalating load can be managed by this cloud model or not. Cloud workload management is one of the primary challenges which must be addressed in the cloud computing paradigm. Instantaneous and concurrent requests from various clients to access the cloud application over the internet can generate bottlenecks moreover delay in response. This Paper presents an efficient dynamic technique along with the system architecture to solve this issue and also utilization function is given to measure the cloud server utilization. It allocates the client requests systematically and uniformly with the help of Host Controller by checking certain parameters such as request rate and server utilization. An even distribution criterion is defined in order to check whether any server is overloaded or underloaded. Thus, the utilization and performance of the system will improve and response will be given quicker.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122807604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Green Technology for avoiding E-waste with the help of GIS 利用地理信息系统避免电子废物的绿色科技
Nikhita Mangaonkar, Pooja Sabhani, S. Sirsat
{"title":"Green Technology for avoiding E-waste with the help of GIS","authors":"Nikhita Mangaonkar, Pooja Sabhani, S. Sirsat","doi":"10.1109/EIC.2015.7230750","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230750","url":null,"abstract":"Electronic waste or e-waste is one of the fast growing problems of the world. E-waste consists of variety of components, containing toxic substances which lead to environment and health hazards if not handled properly. It is important to find out what is the main source of this e-waste with the help of GIS and how we can minimize the e-wastage through green technology. This paper provides a concise overview of Mumbai's current e-waste scenario, namely to locate the source of e-wastage, environmental and health hazards, green technology methods to reduce the e-wastage.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122861378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信