{"title":"A novel adaptive algorithm for estimation of sparse parameters in non-Gaussian noise","authors":"M. Hajiabadi, Behrooz Razeghi, Mahdi Mir","doi":"10.1109/IEMCON.2015.7344492","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344492","url":null,"abstract":"The goal of this paper is to propose a novel diffusion adaptive algorithm for estimation of sparse system with non- Gaussian noise. The proposed adaptive algorithm uses zero-norm regularization for accelerating the speed of convergence in sparse conditions and it uses maximum correntropy criterion (MCC) to access lower steady-state error in the presence of non-Gaussian noise. In order to reach more reduction in both transient and steady-state error, a diffusion strategy of the proposed algorithm is also employed where each local adaptive filter solves its own optimization problem and then diffuses information to its neighbors. The superiority of the proposed algorithm for non- Gaussian noises and sparse conditions is shown via computer simulations.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123457553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review of trust based secure routing protocols in MANETs","authors":"Prachatos Mitra, Soham Mukherjee","doi":"10.1109/IEMCON.2015.7344490","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344490","url":null,"abstract":"A mobile ad-hoc network or MANET is a wireless, self-configuring and infrastructure-less mobile network. Due to its dynamic nature, secure routing is an inherent issue in a MANET. Cryptographic and trust based methods can be used to prevent attacks from malicious nodes in MANET. Cryptographic methods are computationally intensive and hence usually unfeasible for a low infrastructure network such as a MANET. Trust based methods are generally more efficient in comparison and can be used for secure routing. Several trust based protocols have been proposed in literature. A `trust' value is defined, using various network parameters, which represents an opinion based on behavior of a certain node or a set of nodes. This trust value is used to compute secure routes in a MANET. In this paper, different trust based routing algorithms are discussed. The performance, strengths and possible issues with the protocols are also analyzed.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126447354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Mukhopadhyay, K. Gupta, Diptarshi Sen, Piyali Gupta
{"title":"Heuristic Intrusion Detection and Prevention System","authors":"I. Mukhopadhyay, K. Gupta, Diptarshi Sen, Piyali Gupta","doi":"10.1109/IEMCON.2015.7344479","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344479","url":null,"abstract":"The Heuristic Intrusion Detection and Prevention System (HIDPS) is a system that can intelligently scan for malicious behavior from a program either within the system, or trying to access the system. The aforementioned system contains no `Virus definitions' as such but works “Intelligently” using heuristics and online scanning techniques. The proposed system will be able to analyze the program and make decisions about its nature i.e. malicious or non-malicious. Depending upon the nature of the program access is granted or revoked. The system does not rely on time to time updates or any kind of updates at all, reason being the use of heuristics and online scanning techniques. It functions as a standalone script which can be a complete security suite in itself. Since every active process and network packet is monitored, the possibility of rootkits or Trojans remaining undetected is small.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130210287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Manjunath, A. Behnad, Xianbin Wang, A. Dounavis
{"title":"Analytical performance of millimeter-wave OFDM systems in presence of power amplifier nonlinear distortions","authors":"S. Manjunath, A. Behnad, Xianbin Wang, A. Dounavis","doi":"10.1109/IEMCON.2015.7344471","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344471","url":null,"abstract":"In this paper, the performance of a millimeter wave Orthogonal Frequency Division Multiplexing (OFDM) wireless communication system in presence of power amplifier nonlinear distortions is studied. An analytical expression for the symbol error probability has been derived to evaluate the performance of a millimeter wave system in presence of power amplifier nonlinear distortions, which can be used to avoid the cumbersome evaluation through complex experiments or simulations. The results of the proposed analytical expression is compared to the practical values of computer simulated communication system and verified.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130219660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Different secured routing protocols for mobile Ad Hoc networks and its vulnerabilities: A review","authors":"A. Majumdar, Saptarshi Banerjee","doi":"10.1109/IEMCON.2015.7344453","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344453","url":null,"abstract":"A Mobile Ad Hoc Network (MANET) is self-organizing, infrastructureless, multi-hop network. The open and distributive nature of MANET posses a big challenge to design the secure routing protocols. So, secure routing in MANET has become the important research area. Taking into consideration that there is the possibility for the proper authenticated nodes to come under the control of malicious agents, there must be the presence of secure routing protocols which will permit nodes to work in unfavorable potential system within MANET. In this paper we have illustrated different existing secured routing protocols with their advantages and disadvantages. We have also described the necessity of robust and light weight secured routing protocols to solve problems of existing secured routing protocols.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132787754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accumulative feedback adaptation transmission rate in mobile ad-hoc networks","authors":"Ashraf Al-Sharah, S. Shetty","doi":"10.1109/IEMCON.2015.7344460","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344460","url":null,"abstract":"Mobile adhoc networks (MANET) are commonly used in a lot of applications in military and civilian domains. MANET are self-organized networks and depend on the ability of each node to optimize the transmission parameters to meet applications' bandwidth requirements. MANET nodes need to adapt their transmission parameters depending on the channel status and network dynamics like variation in node density, traffic, and mobility. In this paper, we will present an accumulative feedback adaptation transmission rate scheme (AFAT) that ensures MANET nodes will be able to maximize the transmission rates to ensure applications' bandwidth requirements are met. AFAT a d o pts a decentralized approach which involves communication of transmission rates between neighboring nodes. The knowledge of neighbor nodes' transmission rates allows an individual node to adjust the rates accordingly. AFAT is scalable because the overhead only involves exchange of transmission rates between neighboring nodes. Simulation results confirm that MANET nodes adopting the AFAT scheme will converge to a transmission rate that will meet applications' bandwidth requirements.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"372 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128353459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human decision making expert system which takes decision depending upon previous decisions by weight rearrangement technique","authors":"N. Prakash","doi":"10.1109/IEMCON.2015.7344455","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344455","url":null,"abstract":"Expert system is a term that describes a computer program that simulates the judgment and behaviour of a human or an organization that has expert knowledge and experience in a particular field. Our aim is to design an expert system which will help a person to take decision based upon his previous decisions. In other words, our system can analyse human behaviour and can help him take decisions depending upon his previous decisions by predicting what his decision is going to be. Here, the system can aid him to take decisions in various genres for example: Family, Friends, Career/job/current work, Music, Financial status, assets, and education. Each category will have a database of questions, from which the question will be asked to the user. The user will provide answers and depending upon it, the system will arrange weights of parameters and provide final decisions for the user.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122220265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterization of defects in production systems","authors":"M. Vora","doi":"10.1109/IEMCON.2015.7344507","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344507","url":null,"abstract":"In complex production systems, finding the right cause for a perceived failure and exact location of the defect causing this failure has always been a painful exercise. In the past, many attempts have been made to characterize the defect along many dimensions. In this paper we present the results of our empirical analysis of the defect reports received from a live financial trading application. Here we analyze these defects along the three practically important dimensions: defect types, root cause factors and correction mechanism. This analysis helps to identify what makes a failure difficult to reproduce and the corresponding defect difficult to uncover. It will improve defect detection ability as well as it will give directions and pointers for the correction measures to be taken.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114133538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FARBAC: A fine-grained administrative RBAC model","authors":"Xiaoning Jiang, Min-Chen Su, Wenli Shen","doi":"10.1109/IEMCON.2015.7344526","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344526","url":null,"abstract":"Aiming at the deficiency of traditional Role Based Access Control model in practical application, this paper puts forward an improved RBAC administrative model on the basis of RBAC, namely FARBAC (Fine-grained Administrative Role Based Access) model, and also gives the formal description of this model. Apart from the introduction of user groups, object groups and the creation of relationship between user and user groups, object and object groups, user groups and object groups, this model gives full play to the administrative section (administrative roles and administrative permissions). By using a relatively simple mechanism to administrate itself, this model guarantees the access control for the ultimate object, which has certain feasibility and reference value.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116101665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sarkar, B. Das, Trishayan Dutta, P. Dey, Aindrila Mukherjee
{"title":"An alternative voltage and frequency monitoring scheme for SCADA based communication in power system using data compression","authors":"S. Sarkar, B. Das, Trishayan Dutta, P. Dey, Aindrila Mukherjee","doi":"10.1109/IEMCON.2015.7344469","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344469","url":null,"abstract":"Conventionally in SCADA based system used in power system, voltage & frequency is monitored sequentially at regular intervals by employing suitable communication schemes. By suitable data compression techniques, it is possible to compress the measured voltage & frequency data to a reduced single string which is then transmitted to monitoring / control room. At the receiving end, the necessary data can be extracted from the transmitted string by using the respective decompression technique. A MATLAB based system is developed which can produce the compressed string corresponds to input voltage & frequency which can be decoded to obtain the voltage & frequency at the receiving end.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127888501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}