{"title":"Distributed Component-Based Crawler for AJAX Applications","authors":"Suryanshu Raj, R. Krishna, A. Nayak","doi":"10.1109/ICAECC.2018.8479454","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479454","url":null,"abstract":"Crawling web applications is important for indexing websites as well as for testing vulnerabilities present in the website. The research area of crawling traditional websites has made significant progress and many software suites are available which can carry deep crawls of large traditional websites in limited time. The modern AJAX (asynchronous JavaScript and XML) based websites, however, cannot be crawled by traditional crawlers. The area is open to research and many open-source software suites are being developed. However, the software suites developed so far still face the issues of state space explosion, poor time efficiency and incomplete content coverage. This research work aims to develop a distributed component-based crawler for deterministic AJAX applications to reduce state space explosion, improve time efficiency and provide complete content coverage. It uses a combination of multiple approaches to develop the solution. Firstly, it takes into account a Component-Based approach to reduce state space explosion. It then takes a Distributed-Crawling approach to process the events concurrently in order to improve efficiency. It employs a Breadth First Search (BFS) strategy to provide complete content coverage.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130033330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Analysis of Two Novel Metamaterial Unit Cell for Antenna Engineering","authors":"T. Ali, S. B K, R. Biradar","doi":"10.1109/ICAECC.2018.8479435","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479435","url":null,"abstract":"In this research we present a detailed analysis of two metamaterial unit cell through waveguide medium. The first unit cell consists of four G-shaped resonators with split gap and thus named as G-shaped split ring resonator (GSRR). This unit cell exhibit stop-band phenomenon at 3.3GHz. The second unit cell is of Hexagonal shaped with split gaps, and thus named as, hexagonal split-ring resonator (HSRR). This unit cell exhibits stop-band phenomenon at 8.1GHz. Detailed analysis of extraction of medium parameters like permeability and refractive index for both metamaterial unit cells have been discussed in detail.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127600683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Microaggregation- A technique of Statistical Disclosure Control for Privacy Preserving and Data Publishing in Inter-Cloud","authors":"Veena Gadad, S. N","doi":"10.1109/ICAECC.2018.8479452","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479452","url":null,"abstract":"In today’s world organizations outsource their data to cloud to enjoy number of advantages such as location independent data storage, ubiquitous data access and on demand high quality service. Data is collected by many of independent sources as micro data and published for decision making, predictions and to improve research. Outsourcing the data has an important side effect- the privacy of the individuals whose data are being collected and analyzed is at risk. It becomes the responsibility of the data curator i.e., the cloud service provider to preserve the privacy. Statistical Disclosure control or Statistical Disclosure Limitation seeks to alter the original microdata so that the utility of original microdata and modified microdata are at least same. Microaggregation is one of Statistical Disclosure Control methods used to protect the individual identification present in the microdata. This method works by partitioning the microdata into groups called cluster of k records and then replaces the record in each group with the centroid of the group. This paper defines microdata, provides the overview of various existing microaggregation methods for Statistical Disclosure Control. The paper also provides a novel model of microaggregation method in inter-cloud infrastructure.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127263938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. R. Vanamala, Deeksha Nandur, C. Ashutosh, F. Glavan, M. Ganesh
{"title":"Texture Analysis of Brain Mr Images","authors":"H. R. Vanamala, Deeksha Nandur, C. Ashutosh, F. Glavan, M. Ganesh","doi":"10.1109/ICAECC.2018.8479530","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479530","url":null,"abstract":"This proposed work is the method to perform texture analysis of human brain MR image and to provide a method for decision making using MATLAB tool in medical field. Hospitals throughout the world are witnessing huge volumes of digital medical images and associated clinical data on a daily basis. The number of people available in the hospitals to analyze and take decisions are very less when compared to images that need to be analyzed by these experts and hence automation of this process is necessary. We have implemented a system for automatic segmentation and extraction of different texture features of human brain images. SVM is used for classification and K-fold validation is performed.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116072918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Ransomware using GURLS","authors":"N. Harikrishnan, K. Soman","doi":"10.1109/ICAECC.2018.8479444","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479444","url":null,"abstract":"Ransomware is a malware, which upon execution scrambles the framework and it denies the client from accessing the data until the point when a payoff sum is not met from the victim. Recently, this kind of malware has shown a massive growth and had affected nearly 100 nations around the globe. In this paper we propose GURLS (Grand Unified Regularized Least Square) based approach to detect ransomware and classify it into different categories. The features used for training and testing are application programming interface (API) invocations and strings. This paper compares the performance of each of these features for classification and the effectiveness of RBF Kernel. The results obtained shows that using RBF kernel gives better accuracy.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129662413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Performance Analysis Of Integrated Antenna With LNA For Air Bound Tracking","authors":"Gadi Anvesh, M. Jayakumar","doi":"10.1109/ICAECC.2018.8479430","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479430","url":null,"abstract":"A high gain and best matching antenna integrated low noise amplifier is designed using CMOS 65nm technology is reported. The purpose of designing a prototype for an integrated antenna with LNA is to provide the best receiving of data without path loss in air bound tracking and proceed throughout the receiver stage. A single stage cascode topology is adopted for LNA to achieve a higher gain in c-band applications generally. A quarter wave impedance transformer technique was used for microstrip antenna to achieve best matching. Combined with cascode topology an L-based tuning network is developed to achieve the band of frequency range. The designed LNA achieves the high power gain of 26dB and a constant noise figure of 1. 3db. The antenna achieved best matching of -44dB with a moderate gain of 4dB which is amplified by the proposed LNA.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130502825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Li-Fi Based Automatic Traffic Signal Control for Emergency Vehicles","authors":"Shanmughasundaram, Prasanna Vadanan, Vivek Dharmarajan","doi":"10.1109/ICAECC.2018.8479427","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479427","url":null,"abstract":"India is one of the fastest developing country in the world. One of the disadvantages of this unprecedented growth is the ineffective traffic management. Light Fidelity (Li-Fi) is a form of bi-directional Visible Light Communication (VLC) in which light is modulated at speeds greater than a human eye can follow. Li-Fi can be used to implement Vehicle to Vehicle (V2V) communication as it has many advantages over other communication protocols. One of the main advantages of Li-Fi is that it provides connectivity within a very large area with more security and higher data rates. Emergency vehicles such as Ambulances, Firefighting trucks, Police vehicles etc. can propagate faster through traffic-dense roads using Li-Fi based V2V communication system. In this paper, a V2V communication system is proposed in which the headlight and tail light of a vehicle are made as Li-Fi transmitter and Li-Fi receiver respectively. Using the proposed system, when a traffic signal receives an alert regarding an emergency vehicle, the traffic signal would immediately turn green. Thus, decreasing the waiting time of emergency vehicles in traffic dense lanes. The proposed system was designed, implemented and tested for its operation.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123611295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Localization for Underwater Wireless Sensor Networks Based on Probabilistic Approach","authors":"M. Shanthi, D. Anvekar","doi":"10.1109/ICAECC.2018.8479451","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479451","url":null,"abstract":"The Underwater Wireless Sensor Network (UWSN) is a special class of Wireless Sensor Network (WSN), which is basically deployed inside water bodies for performing the required sensing tasks. Unlike WSN, identifying the location information of the different sensor nodes is a challenging task, mainly due to the signal problems associated with the water medium. Node Localization refers to identifying or estimating the location co-ordinates of the required sensor nodes. Many effective node localization techniques have been proposed in the literature. A new challenge has emerged related to security of the node localization technique, wherein, intruder or compromised sensor nodes provide faulty information for the node localization process. This specialized attack can result in improper node localization, and may result in network disconnection. Currently, effective solution to address this problem in the literature is still lacking. In this work, a secure localization framework based on probabilistic model is presented. This proposed localization framework, substantially outperforms the contemporary framework in-terms of security effectiveness when demonstrated empirically.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116191921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cartilage Segmentation of Knee OsteoArthritis From Magnetic Resonance Images(MRI)","authors":"R. A, Dr. Ganga Holi","doi":"10.1109/ICAECC.2018.8479529","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479529","url":null,"abstract":"Human Knee joint is one of the commonly offended components of the human motion system. This paper, presents a segmentation method that segments the cartilage from magnetic resonance (MR) image of knee. We implement two process of segmentation here one after the other that is the amount of the morphological operations at the final segmentation process. Qualitatively, outcome obtained in this work show fine performance as the method is capable of segmenting cartilage area. The overall performance of developed method was evaluated by comparing obtained results with the manual segmented cartilage.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134016713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Javali, Laxmi Sharma, Richa Tengshe, Sutapa Sarkar
{"title":"A comparitive study on the performance of circular patch antenna using low cost substrate for S-band applications","authors":"A. Javali, Laxmi Sharma, Richa Tengshe, Sutapa Sarkar","doi":"10.1109/ICAECC.2018.8479475","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479475","url":null,"abstract":"This paper focusses on comparison of the performance of Circular Microstrip Patch Antenna(CMPA) in S-band between CMPA with soil as substrate and CMPA with RT/Duroid 5880 as substrate. RT/Duroid 5880 is commonly used in the fabrication of Microstrip Patch Antennas (MPA) due to its low electrical loss, low dielectric loss, low moisture absorption etc. However, it is costly. This work tries to prove that soil substrate can be one of the contenders in the future to replace RT/Duroid 5880. The simulation is carried out in Computational Electromagnetic Software FEKO (suite 7.0). The paper concludes by stating that soil substrate being economical can be a potential candidate to replace RT/Duroid 5880 as there is very little to minimal change in key parameters such as bandwidth (a difference of 14.07 MHz), gain (a difference of 0.18 dBi) and directivity (a difference of 0.41 dBi) when the simulation results are compared.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132796777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}