2019 4th International Conference on Information Systems and Computer Networks (ISCON)最新文献

筛选
英文 中文
Additive Fabrication and Additive Technique: A Survey 增材制造与增材技术综述
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036292
V. Dwivedi, M. Raj, Ajeet Yadav, A. Sharma
{"title":"Additive Fabrication and Additive Technique: A Survey","authors":"V. Dwivedi, M. Raj, Ajeet Yadav, A. Sharma","doi":"10.1109/ISCON47742.2019.9036292","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036292","url":null,"abstract":"In the process of additive fabrication, information for manufacturing is taken from CAD(computer aided design) or other designing software. It generate sliced file following layer by layer step of fabrication process. Several classifications were made during the year of 2004 by the Society of manufacturing engineering. This paved a better opportunity to develop the product in non-conventional manufacturing process. There where certain review up on the various technique and the process to be followed for standardizing the manufacturing units, because it is very difficult materials by conventional processes. There is a great requirement for improving the finishing processes. After great reflection and analysis about certain technique of additive fabrication in current scenario has lead to the consequences that the process has a good future in the upcoming era. This technique uses converted stereo lithography files and generates the product. It still requires more research and a lot discovery.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132729277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning Based Approach for Progeria Syndrome Detection 基于机器学习的早衰综合征检测方法
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036229
Dhairya Chandra, S. Rawat, Rahul Nijhawan
{"title":"A Machine Learning Based Approach for Progeria Syndrome Detection","authors":"Dhairya Chandra, S. Rawat, Rahul Nijhawan","doi":"10.1109/ISCON47742.2019.9036229","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036229","url":null,"abstract":"We proposed a generic framework for diagnosis of Progeria syndrome among the newborns. We proposed novel framework architecture of VGG-16. We have used multiple machine learning algorithms and feature extraction tools and we got best results in Logistic Regression algorithm. Disease identification helps us in early stage diagnosis of a disease. It also helps us to find out effective medicines or treatment for it. Our model gives us the best accuracy of 99.8%.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134147988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Security Model for Intrusion Detection and Prevention over Wireless Network 一种无线网络入侵检测与防御的安全模型
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036288
Anurag Yadav, Himanshu Gupta, S. Khatri
{"title":"A Security Model for Intrusion Detection and Prevention over Wireless Network","authors":"Anurag Yadav, Himanshu Gupta, S. Khatri","doi":"10.1109/ISCON47742.2019.9036288","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036288","url":null,"abstract":"In today's world where everything is going towards wireless. The messages are also sent through this wireless platform. But as we all know with technology there also threats which comes alongside with it. So with wireless communication we also have a thread of someone can interfere with our communication, listen to our communication or damage our network. Attackers and unsocial elements are everywhere to cause damage to society so to overcome this kind of problem we have IDPS i.e Intrusion Detection and Prevention System. IDPS helps others to prevent interception to our network and makes wireless communication safe for us. The purpose behind this research is that the communication which takes place through the wireless system becomes more save and no intrusion takes place while passing of message and if any intrusion takes place it get notified then and there so the prevention can come in and prevent the communication from intrusion from the third party.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133103378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Security Mechanism for Software Defined Vulnerabilities 软件定义漏洞的安全机制
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036247
S. Sidhu, Himanshu Gupta
{"title":"A Security Mechanism for Software Defined Vulnerabilities","authors":"S. Sidhu, Himanshu Gupta","doi":"10.1109/ISCON47742.2019.9036247","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036247","url":null,"abstract":"In the era of technological world many activities are done by the digitalized platforms, but still the IP networks are difficult and puzzled that are not easy to manage. A new architecture of SDN decouples the data and control plane which simplifies the network management, which further enhances the performance of the network and enables the efficient configuration of the network which helps in effective monitoring of the system. Therefore, the software defined networking also faces difficulties in the network management these vulnerabilities of SDN can be resolved through the security framework. Thus, this papers deals with the challenges of network, the architecture of the SDN security and privacy of the networks and the programmable networks.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"14 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133204580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Optimization of 6nm Finfet Tunneling Effect under Overlap and Underlap Condition 重叠和搭接条件下6nm Finfet隧穿效应的设计与优化
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036230
Intekhab Usta, Manish Singhal
{"title":"Design and Optimization of 6nm Finfet Tunneling Effect under Overlap and Underlap Condition","authors":"Intekhab Usta, Manish Singhal","doi":"10.1109/ISCON47742.2019.9036230","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036230","url":null,"abstract":"FinFET is a type of multi-gate Metal Oxide Semiconductor Field Effect Transistor where gate covers around the slim tri-gate FinFET [1]. Since the channels are completely surrounded by the gate, the overall inversion layer is larger, which results more drain current. It can be optimized with multiple fins. This structure also characterize very little leakage current flow through the body when the transistor is in OFF state and therefore results in optimized performance and low static power.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114403190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey of Different Methods in Finding Latent Relationships among Complex Networks 寻找复杂网络间潜在关系的不同方法综述
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036260
Deepanshu Malhotra, R. Katarya
{"title":"A Survey of Different Methods in Finding Latent Relationships among Complex Networks","authors":"Deepanshu Malhotra, R. Katarya","doi":"10.1109/ISCON47742.2019.9036260","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036260","url":null,"abstract":"Predicting relationships or links in a network is one of the major problems in computer science and has found applications in a variety of complex networks. In the prediction of link in a highly connected or sparse network at a time w1, we have to find the probability of occurrence of the missing links or links that might manifest in the future at a new point of time $mathrm{w}1+1$. It can also be used to remove spurious links or noisy links in the network that might have cropped up as the complexity of the network is very high. In this article, we have tried to summaries four different approaches to solving link prediction problem which is based on similarity measures from nodes in a graph. These approaches have been developed recently and have taken their inspiration from various fields of study. Finally, we have presented the results, preprocessing approach and evaluation metrics used in order to compare these new techniques, also we have mentioned future challenges and applications of the link prediction algorithm.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tourist Recommender System using Hybrid Filtering 基于混合过滤的旅游推荐系统
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036308
Maddala Lakshmi Bai, R. Pamula, P. Jain
{"title":"Tourist Recommender System using Hybrid Filtering","authors":"Maddala Lakshmi Bai, R. Pamula, P. Jain","doi":"10.1109/ISCON47742.2019.9036308","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036308","url":null,"abstract":"Recommendation has become difficult task to predict the ratings for the new user and new item in the recommender systems. This problem is known as ‘cold-start’. In this paper a hybrid filtering which uses content-based filtering, collaborative filtering and demographic is proposed to address the ‘cold-start’ problem. To predict the new user rating and hence to find the similar items with neighborhood, hybrid filtering uses demographic details. This proposed approach uses the advantages and overcomes the drawbacks that are in existing recommendation methods like CB and CF. In this paper different dataset are used to predict the ratings for the new user using the demography and different POIs are extracted that satisfy the new user. The results produced by this approach are relatively acceptable. This proposed method can work effectively and efficiently to solve the cold-start problem.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132944295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Spatial Correlation Based Energy Transmission in Wireless Sensor Networks 基于空间相关的无线传感器网络能量传输
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036198
Pallavi Chaudhary, Manas Kumar Mishra, Mohd. Aamir Khan, Alpna Singh
{"title":"A Spatial Correlation Based Energy Transmission in Wireless Sensor Networks","authors":"Pallavi Chaudhary, Manas Kumar Mishra, Mohd. Aamir Khan, Alpna Singh","doi":"10.1109/ISCON47742.2019.9036198","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036198","url":null,"abstract":"Modern pace in hardware technology such as low cost CMOS cameras and microphones has prompted the evolution of Wireless Multimedia Sensor Networks. This network of sensors is equipped with multimedia devices such as microphones and cameras to capture multimedia data such as images, videos and audios streams along with scalar data from the environment. High data rate and directional sensing range of video sensors demands a novel solution in order to reduce the amount of data and workload on individual node. So, in this reference, this paper proposed a rare approach by utilizing spatial correlation that exists in the visual information captured by captured by the video sensors having overlapped field of views. By estimating the overlapped region in the video frames, a binary mask has been calculated that has been resent to the video sensors in order to receive only desired portion of consecutive video frames by mutual cooperation of different video sensors. Energy analysis based on the number of bits needed to be transmitted from each video sensor node has also been studied. Experimental results shows that the proposed approach is capable of transmitting videos with low computational cost and without much affecting the video quality and that has been shown by calculating the PSNR values. And also proposed approach is compared with video stitching method. Further simulations shows that proposed method can increase network lifetime by using less energy levels and is an energy efficient approach.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133374711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IISR: A Secure Router for IoT Networks IISR:物联网网络的安全路由器
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036313
A. Dua, Vibhore Tyagi, N. Patel, B. Mehtre
{"title":"IISR: A Secure Router for IoT Networks","authors":"A. Dua, Vibhore Tyagi, N. Patel, B. Mehtre","doi":"10.1109/ISCON47742.2019.9036313","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036313","url":null,"abstract":"With the increasing popularity of IoT devices, the vulnerabilities & security issues concerned with these devices are also increasing. The lack of security mechanisms and vulnerable protocols make IoT devices easy targets for hackers, for example, the “Mirai Botnet Attack” in 2016. There is a very critical requirement for security of IoT systems. In this paper, we propose the IDRBT-IoT Secure Router (IISR), which is immune to a large number of cyber attacks. IISR protects the network against malicious activities by providing a one-step solution for securing the IoT ecosystem. It consists of a Raspberry Pi 3 Model B+, five IoT devices, and an attacker machine. The router has been tested by conducting ten attacks namely: Deauthentication, Fake-Authentication, MAC Spoofing, Denial of Service, Port Scanning, WiFi Cracking, ARP Poisoning, DNS Spoofing, Malware Injection, and Firmware Exploitation. We developed security mechanisms for detection and mitigation of these attacks. They consist of Snort IDS rules, Arduino programming, Packet Sniffer, and configuration of connection methods. The test results show that IISR can detect and mitigate seven out of ten attacks. Thus, the initial results are encouraging.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122089582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Low Power Transimpedance Amplifier (TIA) Using Bulk Driven FVF 基于批量驱动FVF的低功率跨阻放大器
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036259
Priya Singh, V. Niranjan, Ashwni Kumar
{"title":"Low Power Transimpedance Amplifier (TIA) Using Bulk Driven FVF","authors":"Priya Singh, V. Niranjan, Ashwni Kumar","doi":"10.1109/ISCON47742.2019.9036259","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036259","url":null,"abstract":"In this paper a low power transimpedance amplifier is designed using Bulk driven flipped voltage follower- FVF. A bulk driven MOS is used as current source in FVF topology instead of normal current source. This change in FVF topology helps to execute class AB operation of FVF and thus gives symmetrical slew rate. This circuit works on power supply of 1.8V with very less power consumption of 0.371mW. The transimpedance gain is increased by 4 % and −3 dB bandwidth also increased by 152%. The reliability of proposed circuit is tested at different temperature and load capacitor. The result shows the proposed work performance is improved as compared to conventional FVF configuration of TIA. This circuit can be used in low power medical devices and high portability electronics devices due to its advantage of very less power consumption.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125861300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信