R. Hemavathy, G. Rashmi, Pooja Ashok Varambally, G. Shobha
{"title":"Segmenting of object in postprocessing stage in underwater video sequences under dynamic condition","authors":"R. Hemavathy, G. Rashmi, Pooja Ashok Varambally, G. Shobha","doi":"10.1109/IADCC.2015.7154681","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154681","url":null,"abstract":"Information assimilation and dissemination is the major task and challenge in the new era of technology. There are many means of information storing. Underwater Videos and images reveal much information when they are analyzed. The proposed method uses Mixture of Gaussian as a basic model to segment the moving object under dynamic condition. The proposed method remove the motion of the underwater algae or plants which exists as background by checking the status of each foreground pixels in each frame and decides whether to be present as output or not in the post processing stage. Finally the output is compared with a validated ground truth.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129982379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sanket Salvi, H. A. Sanjay, K. Deepika, S. Rangavittala
{"title":"An encryption, compression and key(ECK) management based data security framework for infrastructure as a service in Cloud","authors":"Sanket Salvi, H. A. Sanjay, K. Deepika, S. Rangavittala","doi":"10.1109/IADCC.2015.7154830","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154830","url":null,"abstract":"Cloud Computing is the recent technology that is based on shared pool of resources and provides features like Ubiquitous access, multi-tenancy, flexibility, scalability and pay as you use, which makes it more resource efficient and cost effective. But Cloud-based systems open unfamiliar threats in authentication and authorization. Explicit authorization accordance must be defined at smallest level, especially in multi-tenant environments. The liaison between Cloud Service Provider & customer must also be clearly mentioned in relation like who holds administrative rights and indirect access to privileged customer information. Moreover the scenario of cloud in educational and research community is still developing and has some security concerns. This paper provides a brief review about Cloud Security concerns for adoption of cloud computing in data sensitive research and technology aided education. Also this paper proposes, ECK based framework for securing end-user data in Community Cloud. Implications and considerations for additional research are provided as well.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure 3GPP-WLAN authentication protocol based on EAP-AKA","authors":"Shruti S. Patkar, D. Ambawade","doi":"10.1109/IADCC.2015.7154857","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154857","url":null,"abstract":"EAP-AKA is used as an authentication protocol during handoff across heterogeneous systems with different underlying technologies like the 3GPP-WLAN internetwork. However the protocol cannot be put to practical use due to its high authentication delay and vulnerabilities to several attacks like user identity disclosure, man in the middle attack and DoS attack. Moreover, the validity of Access Point of the WLAN network is often not checked, leaving the user vulnerable to several attacks even after heavy authentication procedure. For this purpose we propose a modified, secure EAP-SAKA protocol using Elliptic Curve Diffie Hellman for symmetric key generation by taking into consideration the validation of access point. Additionally, we make EAP-SAKA faster by decreasing the propagation delay of the signaling messages. The proposed protocol is supported using detailed security analysis and performance analysis. Also, security validation of EAP-SAKA is carried out using a widely accepted formal verification tool called AVISPA and is found to be safe.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128922368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extended species for code parallelization through algorithmic classification","authors":"Bilal Mustafa, W. Ahmed","doi":"10.1109/IADCC.2015.7154862","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154862","url":null,"abstract":"Multicore systems along with GPUs enabled to increase the parallelism extensively. Few compilers are enhanced to emerging issues with respect to threading and synchronization. Proper classification of algorithms and programs will benefit largely to the community of programmers to get chances for efficient parallelization. In this work we analyzed the existing species for algorithm classification, where we discuss the classification of related work and compare the amount of problems which are difficult for classification. We have selected set of algorithms which resemble in structure for various problems but perform given specific tasks. These algorithms are tested using existing tools such as Bones compiler and A-Darwin, an automatic species extraction tool. The access patterns are produced for various algorithmic kernels by running against A-Darwin and analysis is done for various code segments. We have identified that all the algorithms cannot be classified using only existing patterns and created new set of access patterns.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131064978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced Control Distributed Processing Architecture (ACDPA) using SDN and Hadoop for identifying the flow characteristics and setting the quality of service(QoS) in the network","authors":"Abhijeet Desai, K. S. Nagegowda","doi":"10.1109/IADCC.2015.7154814","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154814","url":null,"abstract":"Today the network is seemingly complex and vast and it is difficult to gauge its characteristics. Network administrators need information to check the network behavior for capacity planning, quality of service requirements and planning for the expansion of the network. Software defined networking (SDN) is an approach where we introduce abstraction to simplify the network into two layers, one used for controlling the traffic and other for forwarding the traffic. Hadoop is used for distributed processing. In this paper we combine the abstraction property of SDN and the processing power Hadoop to propose an architecture which we call as Advanced Control Distributed Processing Architecture (ACDPA), which is used to determine the flow characteristics and setting the priority of the flows i.e. essentially setting the quality of service(QoS). We provide experimental details with sample traffic to show how to setup this architecture. We also show the results of traffic classification and setting the priority of the hosts.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"348 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132948487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A quad-band hybrid fractal antenna for wireless applications","authors":"Y. Kumar, Surinder Singh","doi":"10.1109/IADCC.2015.7154803","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154803","url":null,"abstract":"Hybrid fractal multiband antenna is designed using Koch and meander geometry and its characteristics are investigated. The proposed antenna helps to achieve multiband behavior due to its multiple resonance characteristics. It has planar structure, compact size and suitable for wireless applications. IFS approach has been used to obtain the hybrid structure using MATLAB and scripting method of HFSS. Perturbation of basic structure is done to achieve quad-band behavior. Proposed antenna resonates at four different frequencies including Bluetooth (2.12-2.95 GHz), WLAN (4.82-5.95 GHz), 4.07 GHz and 7.3 GHz. It is a low cost antenna designed on easily available FR4 substrate. It exhibits nearly omnidirectional radiation pattern and VSWR ≤ 2 for all resonating frequencies.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132161545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bio-metric credential system: Multimodal cancelable anonymous identity management","authors":"P. Suresh, K. Radhika","doi":"10.1109/IADCC.2015.7154729","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154729","url":null,"abstract":"Digital transactions have permeated almost every sphere of activity in today's world. This increase in digital transactions has introduced additional and stringent requirements with regard to security and privacy. People reveal lots of personal information by compromising their private credentials during digital interactions. It is imperative that in addition to security of on-line transactions, user credentials must also be safeguarded. This has necessitated the requirement for a rigorous and foolproof credential system with provision for anonymous and revocable identity management system. Biometric system based identity management systems offer advantage over conventional knowledge and possession based systems. Considerable research has been undertaken in the past to identify newer and reliable biometrics for more efficient and secure identity management. Fusion of multiple biometrics to achieve better results is also an area of active research. However, making biometric credential systems revocable and anonymous without sacrificing efficiency and efficacy of detection, still remains a challenge. This survey paper makes an attempt to give an insight into the approaches that have been made in the direction of multimodal biometric fusion and into the various options that have been explored to make biometric authentication systems revocable and anonymous.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132770778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy based dynamic load balancing scheme for efficient edge server selection in Cloud-oriented content delivery network using Voronoi diagram","authors":"Sandip Roy, R. Bose, D. Sarddar","doi":"10.1109/IADCC.2015.7154822","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154822","url":null,"abstract":"Any given Euclidean space can be partitioned into non-overlapping regions using Voronoi diagram and the Delaunay triangulation connects sites using nearest-neighbor fashion. Realistically in this context, all the edge servers are scattered over the Earth surface and can be clustered using Voronoi diagram. Now nearest edge server selection by Delaunay triangulation over the Voronoi diagram is our prime target. Due to the large demand of Internet content coming from burst crowd, performance of the Cloud-oriented content delivery networks is drastically reduced. To improve the said performance degradation, nearest edge server selection is a primary goal of cloud service provider (like Akamai Technologies, Amazon CloudFront, Mirror Image Internet etc.). Empirically all the time load of the nearest edge server is not eligible for responding the user request. Therefore load balancing is also important criteria for selecting suitable edge server. In this paper, we have presented Fuzzy Based Least Response Time (FLRT) dynamic load balancing algorithm and which is effective for crisps input from different heterogeneous system. Thus, FLRT is a novel paradigm which can select nearest neighbor edge server from user's current location where response time and load of the edge server is lowest.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127427666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Inzamam-Ul-Hossain, L. Mackinnon, Md. Rafiqul Islam
{"title":"Parkinson disease detection using ensemble method in PASW benchmark","authors":"Md. Inzamam-Ul-Hossain, L. Mackinnon, Md. Rafiqul Islam","doi":"10.1109/IADCC.2015.7154790","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154790","url":null,"abstract":"We present an ensemble method to classify Parkinson patients and healthy people. C&R Tree, Bayes Net and C5.0 are used to generate ensemble method. Using supervised learning technique, the proposed method generates rules to distinguish Parkinson patients from healthy people. The proposed method uses single classifier to generate rules which are used as input for the next used classifier and in this way final rules are generated to predict more accurate results than individual classifier used to generate ensemble method. This method shows lower number of misclassification instances than single classifiers used to build model. Ensemble method shows better results for training and testing accuracy than single classifier.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115233138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A reliable cross layer routing scheme (CL-RS) for wireless sensor networks to prolong network lifetime","authors":"S. Kusumamba, S. D. Dilip Kumar","doi":"10.1109/IADCC.2015.7154865","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154865","url":null,"abstract":"Design of conventional protocols for wireless sensor networks(WSN) are mainly based on energy management. The solutions for layered protocol of the WSN network are inefficient as sensors network mainly delivers real-time content thus, cross layer communication between layers of the protocol stack is highly required. In this paper, a reliable cross layer routing scheme (CL - RS) is proposed to balance energy to achieve prolonged lifetime through controlled utilization of limited energy. CL - RS considers 2 adjacent layers namely, MAC layer and network layer. Optimization issues are identified in these two layers and solutions are provided to reduce energy consumption thereby increasing network lifetime. To achieve higher energy efficiency MAC layer protocols compromise on packet latency. It is essential to attempt reduce the end-to-end delay and energy consumption using low duty cycle cross layer MAC (CL-MAC). The joint optimization design is formulated as a linear programming problem. The network is partitioned into four request zones to enable increase in network performance by using an appropriate duty cycle and routing scheme. We demonstrate by simulations that the strategy designed by combining (CL - RS) and (CL-MAC) algorithms at each layer significantly increases the network lifetime and a relation exists between the network lifetime maximization and the reliability constraint. We evaluate the performance of the proposed scheme under different scenarios using ns-2. Experimental results shows that proposed scheme outperforms the layered AODV in terms of packet loss ratio, end-to-end delay, control overhead and energy consumption.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"44 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115549312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}