2018 International Conference on System Modeling & Advancement in Research Trends (SMART)最新文献

筛选
英文 中文
Creating a Double Lock with the Help of Sound Programming and Image Programming for the Security of Data for Remote Location Treatment in Body Area Network 借助声音编程和图像编程创建双锁,实现体域网络远程定位处理数据的安全
P. Kumar, Anand Sharma
{"title":"Creating a Double Lock with the Help of Sound Programming and Image Programming for the Security of Data for Remote Location Treatment in Body Area Network","authors":"P. Kumar, Anand Sharma","doi":"10.1109/SYSMART.2018.8746970","DOIUrl":"https://doi.org/10.1109/SYSMART.2018.8746970","url":null,"abstract":"Body area network is creating engineering with medical science, and internet technology will take over in facilitating medical services to offer treatment at the remote destination. Advances in wireless technologies are perfectly allowing secure data communication. It allows for quality through mobile to mobile standardization and creating analyses for marketing and development specifically for medical applications. Market profit for Wireless Body area network is also taking concerns from different governments as to enhance remote medical facilities. Secure data transfer is also a prime concern of body area network technology, so cryptographic algorithms are required. This paper will propose an algorithm for authentication with the optimization process, using image data, sound data for cryptographic key management and a genetic algorithm for treating a patient through body area network technique. IEEE standards are allowing these technologies for this development are like ZigBee. Bluetooth etc. are the technologies of prime concern for body area networks. This paper will also demonstrate very possibility of sound that can be used as a key. Sound programming is the purest area for the utility of human culture. This paper is establishing more thoughts in the sound engineering area. Strings from image and sound can use as a double lock.","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115476435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Lightweight Game Theory Based Intelligent Routing Protocol in Sparsely Connected Opportunistic Networks 稀疏连接机会网络中一种高效的轻量级博弈论智能路由协议
Dishant Grover, Shivangi Kochhar, Ananya Sharma, Ashima Mittal, P. Nagrath
{"title":"An Efficient Lightweight Game Theory Based Intelligent Routing Protocol in Sparsely Connected Opportunistic Networks","authors":"Dishant Grover, Shivangi Kochhar, Ananya Sharma, Ashima Mittal, P. Nagrath","doi":"10.1109/SYSMART.2018.8746965","DOIUrl":"https://doi.org/10.1109/SYSMART.2018.8746965","url":null,"abstract":"Delay or disruption tolerant network (DTN) is a kind of an ad hoc networking i.e. where no infrastructure is available and no end to end connectivity is present. Nodes in DTN use Store and Forward technology (SFT) while communicating with each other and forwarding messages. There are limited resources in DTN. Sometimes a node misbehaves or act selfish by dropping the messages received by it, thus saving their resources (buffer and power). It lowers the delivery ratio and increases the overhead. To overcome this problem we used the concept of Game Theory which is a systematic and analytical study of tactical and complex interactions among entities or rational individuals having limited network resources (power/ bandwidth) present in the system in a challenged environment. Game theory helps in increasing the understanding of participants to behave rationally in the system. In this paper, the game theory is implemented in DTN environment and also focused its relationship with energy of the system and answered the question whether it makes the system energy efficient.","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115701027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security and Privacy in IoT based E-Business and Retail 基于物联网的电子商务和零售中的安全和隐私
Keshav Kaushik, Susheela Dahiya
{"title":"Security and Privacy in IoT based E-Business and Retail","authors":"Keshav Kaushik, Susheela Dahiya","doi":"10.1109/SYSMART.2018.8746961","DOIUrl":"https://doi.org/10.1109/SYSMART.2018.8746961","url":null,"abstract":"Interconnection of various \"things\" are resulting into many issues related to security and privacy of IoT platform. With the advancement in technology, many e-businesses and retail stores are using IoT based solutions for their sale, marketing, productivity and promotions. These IoT based solutions are much helpful in providing various benefits to owner and customers. However, these solutions are vulnerable to many security and privacy based concerns. This paper addressed the rise of cyber threats in IoT, Enterprise view of IoT for E-Business & Retail Security, advancements in e-business and retail because of IoT, flow of threat agents related to security and privacy concerns in e-business and retail.","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115713117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
SMART 2018 Track V Signal Image & Communicational Technology [breaker page] SMART 2018轨道V信号图像与通信技术
{"title":"SMART 2018 Track V Signal Image & Communicational Technology [breaker page]","authors":"","doi":"10.1109/sysmart.2018.8746944","DOIUrl":"https://doi.org/10.1109/sysmart.2018.8746944","url":null,"abstract":"","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Node Clustering in Wireless Sensor Networks using Fuzzy Logic: Survey 基于模糊逻辑的无线传感器网络节点聚类研究
Richa Sharma, Vasudha Vashisht, Umang Singh
{"title":"Node Clustering in Wireless Sensor Networks using Fuzzy Logic: Survey","authors":"Richa Sharma, Vasudha Vashisht, Umang Singh","doi":"10.1109/SYSMART.2018.8746977","DOIUrl":"https://doi.org/10.1109/SYSMART.2018.8746977","url":null,"abstract":"Selecting a deserving node as a cluster head (CH) has a symbolic impact on the energy efficient working of Wireless Sensor Networks (WSNs). With the reduction in network’s energy utilization, its lifetime can be increased up to a great extent. Clustering is a mechanism that helps in addressing both these issues efficiently. However, clustering also faces few challenges like making adequate decision during cluster head selection. This challenge arises due to the uncertain and dynamic nature of WSNs originated because of the random deployment of the sensor nodes in them. This paper tries to illustrate the potential of one of the soft computing paradigms i.e. fuzzy logic in overwhelming these issues in clustering WSNs. Since, Fuzzy Logic (FL) has the capability of simulating the mental process of human mind to observe, learn and understand things in the presence of uncertainty. So, this paper presents a systematic review of different fuzzy and hybrid fuzzy based approaches for handling clustering in WSNs.","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SMART 2018 Track II IOT & Wireless Communication [breaker page] SMART 2018 Track II物联网与无线通信[break page]
{"title":"SMART 2018 Track II IOT & Wireless Communication [breaker page]","authors":"","doi":"10.1109/sysmart.2018.8746973","DOIUrl":"https://doi.org/10.1109/sysmart.2018.8746973","url":null,"abstract":"","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122498475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Biometric Method for Authentication of User in Internet of Things 一种物联网用户身份认证的混合生物识别方法
J. Kaur, J. Sengupta
{"title":"A Hybrid Biometric Method for Authentication of User in Internet of Things","authors":"J. Kaur, J. Sengupta","doi":"10.1109/SYSMART.2018.8746952","DOIUrl":"https://doi.org/10.1109/SYSMART.2018.8746952","url":null,"abstract":"In near future, the world will be completely associated and the quantity of smart gadgets will develop to an extensive number, we can state ten times the human populace. IoT shall bring plethora of advantages and ease in our habitual life. But what about all the data including personal information, location monitoring, daily routine etc. be shared and stored over internet. In direction to maintain privacy of a user, we designed a hybrid biometric validation scheme for users access to a smart object. Our proposed system is the combination of users fingerprint and speech and it shows feasible results and guaranteed privacy of a user. In other words, our system will help building trust among the user who will be using intellectual body and making them feel secure on going away from the objects as only the validated user will be able to access the object.","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128636520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SMART 2018 Track IV Communication and Network Broadcast [breaker page] SMART 2018第四轨道通信与网络广播[中断页]
{"title":"SMART 2018 Track IV Communication and Network Broadcast [breaker page]","authors":"","doi":"10.1109/sysmart.2018.8746969","DOIUrl":"https://doi.org/10.1109/sysmart.2018.8746969","url":null,"abstract":"","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124060005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SMART 2018 Track III Digital India Initiative [breaker page] SMART 2018 Track III Digital India Initiative [break page]
{"title":"SMART 2018 Track III Digital India Initiative [breaker page]","authors":"","doi":"10.1109/sysmart.2018.8746844","DOIUrl":"https://doi.org/10.1109/sysmart.2018.8746844","url":null,"abstract":"","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124296559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Model of Data Protection in the Geographic Information System of Housing and Communal Services 住房和公共服务地理信息系统中的数据保护模式
Maksimova Elena, Zaikina Yuliya, V. Ekaterina, Ozhiganova Marina, T. Lily, Babenko Alexey
{"title":"The Model of Data Protection in the Geographic Information System of Housing and Communal Services","authors":"Maksimova Elena, Zaikina Yuliya, V. Ekaterina, Ozhiganova Marina, T. Lily, Babenko Alexey","doi":"10.1109/SYSMART.2018.8746933","DOIUrl":"https://doi.org/10.1109/SYSMART.2018.8746933","url":null,"abstract":"At present, the technologies of geoinformation systems are rapidly developing and cover more and more fields of application, one of which is the housing and communal services. However, certain cartographic data used in the geoinformation system of housing and communal services (hereinafter referred to as \" GeoIS HCS \") belong to information classified as state secret. This restriction requires the fulfillment of strict requirements for the protection of information and imposes a responsibility on users of information. In this regard, the article examines the problem of ensuring the safe storage, transmission and processing of information in all segments of the GeoIS HCS. To solve this problem, we analyzed: legislation in the field of cartographic data; types of data used in GeoIS HCS, methods of transformation of cartographic data and threats to GeoIS HCS.For the discussion, a model of data protection for GeoIS HCS is proposed, for which the software implementation has been carried out. The results of experimental studies on modeling situations for the implementation of threats to information security of cartographic data are presented.The effectiveness of the developed model was compared with the current model of the functioning of the GeoIS HCS. The model has a number of advantages and is able to ensure the safe transformation and transfer of cartographic data to the GeoIS HCS.","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"24 26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128466157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信