Sagnik Banerjee, Basudeb Mitra, Avimita Chatterjee, A. Santra, Baisakhi Chatterjee
{"title":"Identification of relevant physico chemical properties of amino acids with respect to protein glycosylation prediction","authors":"Sagnik Banerjee, Basudeb Mitra, Avimita Chatterjee, A. Santra, Baisakhi Chatterjee","doi":"10.1109/IEMCON.2015.7344520","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344520","url":null,"abstract":"Glycosylation is the process of adding carbohydrates to a protein residue. It is an important part of post-translational modification undergone by protein chains. Over 40 disorders have been linked to improper glycosylation bonds, over 80% of which affect the nervous system. Our aim is to study glycosylation in proteins and to understand the properties that affect this change. A detailed study using support vector machines has given us a computer that accurately predicts 79% percent of the possibility of positive glycan-bond. In this paper we attempt to discuss the entire study and our conclusions. We target to find out which of the physicochemical properties of amino acids are relevant for glycosylation.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128125052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An NFC featured three level authentication system for tenable transaction and abridgment of ATM card blocking intricacies","authors":"Anusha Mandalapu, Daffney Deepa V, Laxman Deepak Raj, Anish Dev J","doi":"10.1109/IEMCON.2015.7344491","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344491","url":null,"abstract":"The flexible use of credit and debit card transactions has become increasingly ubiquitous and so have the associated vulnerabilities that make them a common target for cyber criminals. Furthermore, a prevalent complication associated with blocking of ATM cards involves tedious interactive processes and even possibly long waiting times during interaction with customer care services. Using a three factor authentication scheme employing NFC (Near Field Communication: an emerging technology evolved from a combination of contact-less identification and interconnection providing data exchange), Dash Matrix Algorithm and One-time password, we describe and quantify the potential to overcome common transaction liabilities (brute force attack, shoulder surfing, skimming of ATM cards, etc.). The auxiliary feature of blocking ATM cards is implemented using a QR code authentication scheme and NFC technology, implemented both in NFC enabled phones and non-NFC phones (with the help of an NFC transmitter, receiver and Bluetooth). The proposed system, therefore, ensures both secure usage of ATM cards and cost effectiveness by utility of novel and increasingly common technology, when also simultaneously proving to be user friendly.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125597928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sayantan Banerjee, Roshni Nandi, R. Dey, Himadri Nath Saha
{"title":"A review on different Intrusion Detection Systems for MANET and its vulnerabilities","authors":"Sayantan Banerjee, Roshni Nandi, R. Dey, Himadri Nath Saha","doi":"10.1109/IEMCON.2015.7344466","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344466","url":null,"abstract":"In recent years, Mobile Ad hoc NETwork (MANET) have become a very popular research topic. By providing communications in the absence of a fixed infrastructure MANET are an attractive technology for many applications such as resource app, military app, environmental monitoring and conferences. However, this flexibility introduces new security threats due to the vulnerable nature of MANET, there will be the necessity of protecting the data, information from the attackers as it is an infrastructure-less network. Thus, securing such demanding network is a big challenge. At this point, IDS came into existence to secure MANET in detecting at what point they are getting weak. In this review paper, we will discuss, MANET and its vulnerabilities, and how we can tackle it using different techniques of IDS (Intrusion Detection System).","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"132 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130212295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient MAC protocol for Wireless Body Area Networks","authors":"Richard Jaramillo, A. Quintero, S. Chamberland","doi":"10.1109/IEMCON.2015.7344452","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344452","url":null,"abstract":"The Medium Access Control (MAC) protocol for a Wireless Body Area Network (WBAN) should allow body sensors to get quick access to the channel and send data to the hub, especially in emergency situations while reducing power consumption. IEEE 802.15.6 Standard proposes a MAC protocol that could be applicable to all kinds of WBAN. The WBAN MAC protocol proposed in this paper is based on the existing MAC protocol described on IEEE 802.15.6 Standard, but taking into account characteristics for some WBAN where low emergency traffic and a very high normal traffic can be expected. The proposed protocol is energy-efficient and emergency-aware and it changes transmission schedules in order to provide quality of service for emergency traffic.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115239682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing energy consumption of nodes using force based auto deployment of Wireless Sensor Networks","authors":"A. Pandita, P. K. Upadhyay","doi":"10.1109/IEMCON.2015.7344474","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344474","url":null,"abstract":"Networked tiny sensors technologies have been recognized among the most significant technologies for the 21st century. Because of hardware and network technology advancements we have low-cost, low-power multifunctional miniature sensor devices. These sensor nodes team up between themselves to create a sensing network. A sensor network can be used to access information anytime, anywhere. Data can be collected, processed, analyzed and disseminated. Wireless Sensor Networks (WSNs) have many applications but typically take in some kind of supervisory, monitoring and tracking. Specific applications for WSNs include infrastructure security, environmental monitoring, object tracking, nuclear reactor control, green house monitoring, industrial monitoring, fire detection, traffic monitoring, and infrastructure security. There are many issues in WSN: power management, security, privacy, routing, localization etc. In view of reducing energy consumption of sensor nodes this paper presents the force based algorithm to auto deploy a sensor network to reduce the power consumed by the sensor nodes to improve their lifetime.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116191048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficient scheduling in LTE-advanced for Machine Type Communication","authors":"Basel Barakat, K. Arshad","doi":"10.1109/IEMCON.2015.7344443","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344443","url":null,"abstract":"Machine Type Communication (MTC) is gaining an enormous interest among communication industry and academia all around the world. The variety of services offered by MTC is expected to significantly increase the number of MTC Devices (MTCD) on wireless networks. The huge number of MTCD poses several challenges to cellular network operators such as efficient radio resource management, energy efficiency (EE) etc. Two main radio resource management techniques to support MTC over 4G Long Term Evolution (LTE) were proposed in the literature: Group Based Scheduling (GBS) and Time Granularity Scheduling (TGS). In this paper, we compare the EE of GBS and TGS by formulating a general expression for the downlink transmit power by eNodeB. The numerical results show that the GBS is more energy efficient that TGS under given quality of service constraints.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129854205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Global navigation satellite system based scintillation characterization in the low latitudes","authors":"K. Chatterjee, A. Basu, P.B. Ghosh","doi":"10.1109/IEMCON.2015.7344488","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344488","url":null,"abstract":"Due to the formation of irregularities in the electron density distribution, amplitude and phase of the satellite links fluctuates. Magnetic equator passes through the southern tip of Indian peninsula and as a result high ionospheric activity is observed in the Indian region. Quality of the satellite links passing through these irregularities degrades and it presents a very challenging situation for high dynamic platforms such as aircraft or trains. In this paper, the authors tried to identify1. specific regions of the sky where scintillation is maximum, while observing from Calcutta. In addition with that, the authors2. proposed the possibility of better Quality of Service (QoS) in the presence of GNSS satellites compared to GPS satellites.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131487637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sagnik Banerjee, Subhadip Basu, Debjyoti Ghosh, M. Nasipuri
{"title":"PhospredRF: Prediction of protein phosphorylation sites using a consensus of random forest classifiers","authors":"Sagnik Banerjee, Subhadip Basu, Debjyoti Ghosh, M. Nasipuri","doi":"10.1109/IEMCON.2015.7344514","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344514","url":null,"abstract":"Post translational modification (PTM) is a process by which proteins undergo chemical changes after they are translated from RNA. Among the various types of PTM, phosphorylation is the most important one since it assists in almost all the activities of the cell. In this research work we have used machine learning based approaches to predict the position where phosphorylation has occurred. Random forest has been used as the machine learning tool for this work. As features we have used evolutionary information extracted from Position Specific Scoring Matrices (PSSM). When tested with an independent set of 141 proteins our system achieved an AUC of 0.699. Also our system could attain the best performance for a set of 22 non-trivial proteins.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Various types of routing protocols in Wireless Sensor Network with vulnerabilities: A review","authors":"A. Majumdar, Debabrata Sarkar","doi":"10.1109/IEMCON.2015.7344446","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344446","url":null,"abstract":"Wireless Sensor Network (WSN) is made of a large number of sensor devices where the mode of communication is done over wireless media. Advancement in this field of application opens the path of availability of small and low costing sensors which are involved in different types of physical and environmental condition states, data process management and communication in the wireless media. WSN provides a large scale of sensor nodes which have transmission in the limited scale, along with their limited process, storage and energy availability through the clustering techniques, thus provides new and efficient way towards the prolonged lifetime of WSN system. It provides lot of its applications in the fields of military and health. Though the sensor networks are restricted towards resource utility, the network system becomes the open threat towards different types of traditional attacks. But the conventional techniques fail to find its way from security threats due to the limited resource availability in these types of networks. As a result of it, the security in WSN model becomes an important and challenging task in the research field due to inherited limitations of sensors itself. In this paper we are highly focused on the discussions on different type of attacking scopes in Wireless Sensor Network followed by the security description, analysis of routing protocols in terms of attacks and security goals, which concludes in some simulation results of the stated protocols with their merits and demerits.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134516089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WSN LEACH based protocols: A structural analysis","authors":"Kamaljot Singh","doi":"10.1109/IEMCON.2015.7344478","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344478","url":null,"abstract":"The Researchers and the actual users had given much attention to Wireless sensor networks (WSNs). The energy utilization in these wireless sensor networks is very important task that increases the lifetime of the sensor network. In WSNs the researchers had explored numerous new protocols by considering the energy utilization as crucial task. Although, we have so many WSN protocols, but the importance is given to clustering based hierarchal routing protocols because of their better scalability. The sensor nodes are generally battery-powered devices, the important task in WSN is to reduce the energy consumption of nodes so that the life time of the network can be increased. Among the all present energy efficient Sensor networks protocols, the most common is LEACH. All other protocols are developed by taking the LEACH as reference. In this paper, we had analyzed the various LEACH Based protocols.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115173360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}