2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)最新文献

筛选
英文 中文
Usability and Security Go Together: A Case Study on Database 可用性和安全性并存:数据库的案例研究
Yong Wang, B. Rawal, Q. Duan, Ping Zhang
{"title":"Usability and Security Go Together: A Case Study on Database","authors":"Yong Wang, B. Rawal, Q. Duan, Ping Zhang","doi":"10.1109/ICRTCCM.2017.86","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.86","url":null,"abstract":"In this paper, we review security and usability scenarios. We propose security enhancement without losing usability. We apply this approach to popular application systems in the database. Specifically, we analyze database security in access control, auditing, authentication, encryption, integrity control, and backups. Finally, we present our recommendations for system security and usability to go together.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134457478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secured Medical Data Storage over Cloud for Comprehensive Treatment 云上安全的医疗数据存储,实现综合治疗
Sathya Sankaran, R. Rajasekaran
{"title":"Secured Medical Data Storage over Cloud for Comprehensive Treatment","authors":"Sathya Sankaran, R. Rajasekaran","doi":"10.1109/ICRTCCM.2017.78","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.78","url":null,"abstract":"E-health is becoming an ideal, alternative approach to the traditional approach of handling and giving health care. This paper offers a solution for good health by observing and recording the details of each and every consultation made for a patient on the cloud and not merely the storage of milestone observations. The cloud provides a virtualized source of resources including hardware and software. Two algorithms, Difference and Distance Difference provide security. Distance Difference is an advanced version of Difference algorithm.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115691607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Enhancement of Low Noise Amplifier Using Cadence Virtuoso Tool 使用Cadence Virtuoso工具自适应增强低噪声放大器
K. S. Sankaran, K. E. Purushothaman
{"title":"Adaptive Enhancement of Low Noise Amplifier Using Cadence Virtuoso Tool","authors":"K. S. Sankaran, K. E. Purushothaman","doi":"10.1109/ICRTCCM.2017.37","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.37","url":null,"abstract":"This paper mainly focuses on low power based amplifier (LNA) design. These types of amplifier design are suitable for low power wireless applications. Here different types of low noise amplifier designs are considered for designing a front end receiver. LNA is used for impedance matching, amplify weak signal and eliminate the unwanted noise signal. Selecting proper circuit element, this delivers better output and prevent short circuitry. Noise cancellation technique, which eliminates unwanted signals are present in the incoming signal. Common gate, resistive parallel feedback and cascading feedback network are designed for low power. Transient analysis and AC analysis are used for calculating the power consumption and the bandwidth respectively. Using current reuse circuit, this enables the generation of necessary current to the design. Cadence analog library is used for designing a low noise amplifier in 180nm technology.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114324615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Age Forecasting Analysis - Over Microblogs 年龄预测分析——基于微博
Prasad Koti, Sujatha Pothula, P. Dhavachelvan
{"title":"Age Forecasting Analysis - Over Microblogs","authors":"Prasad Koti, Sujatha Pothula, P. Dhavachelvan","doi":"10.1109/ICRTCCM.2017.38","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.38","url":null,"abstract":"Age predictive analysis is to predict the age of the users who posted the message in any microblog. By using some keywords, we extract the messages as dataset and processed for predicting the age of the user. Here, the design and techniques to foreseen the age of the user by microblog dataset are presented. In recent years, microblogging services like Twitter and SinaWeibo become an essential part in everyone's life. Due to enormous growth in microblogging services, various challenges arise in research fields like detection, sentiment analysis, user classification, etc. due to the data produced by the huge number of microbloggers. In this paper, we used dataset from Twitter and showed promising results for predicting age ranges.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114645759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CRF Based Machine Learning Approach for Biomedical Named Entity Recognition 基于CRF的生物医学命名实体识别的机器学习方法
U. Kanimozhi, D. Manjula
{"title":"A CRF Based Machine Learning Approach for Biomedical Named Entity Recognition","authors":"U. Kanimozhi, D. Manjula","doi":"10.1109/ICRTCCM.2017.23","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.23","url":null,"abstract":"The amount of biomedical textual information available in the web becomes more and more. It is very difficult to extract the right information that users are interested in considering the size of documents in the biomedical literatures and databases. It is nearly impossible for human to process all these data and it is even difficult for computers to extract the information since it is not stored in structured format. Identifying the named entities and classifying them can help in extracting the useful information in the unstructured text documents. This paper presents a new method of utilizing biomedical knowledge by both exact matching of disease dictionary and adding semantic concept feature through UMLS semantic type filtering, in order to improve the human disease named entity recognition by machine learning. By engineering the concept semantic type into feature set, we demonstrate the importance of domain knowledge on machine learning based disease NER. The background knowledge enriches the representation of named entity and helps to disambiguate terms in the context thereby improves the overall NER performance.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Energy Awake Network Traffic Steering Using SDN in Cloud Environment 云环境下基于SDN的能量唤醒网络流量引导
Sankari Subbiah, V. Perumal
{"title":"Energy Awake Network Traffic Steering Using SDN in Cloud Environment","authors":"Sankari Subbiah, V. Perumal","doi":"10.1109/ICRTCCM.2017.56","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.56","url":null,"abstract":"The energy consumed by the networking resources to access the computational and storage resources is one of the factors to be considered in the cloud data center. In SDN, the network virtualization showcases the business in the network resource allocation when traffic is generated from the source host to the destination host. The network switches in the cloud based data centric network acquire the most energy during the traffic flow from source to destination. In this paper, an Energy Efficient Routing Through Open Virtual Switches (EERTOVS) algorithm is proposed to route the traffic efficiently in the power-optimal selected path. The proposed algorithm was implemented using Open Flow Protocol in the forthcoming development of Software Defined Networks. Thereby, the network management entails the improvement in energy conservation with tolerable level of compromising the network performance.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121428341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Robust and Efficient Three-Factor Authentication and Session Key Agreement Mechanism for SIP 一种鲁棒高效的SIP三因素认证与会话密钥协商机制
S. H. Islam, Varun Rajeev, Ruhul Amin
{"title":"A Robust and Efficient Three-Factor Authentication and Session Key Agreement Mechanism for SIP","authors":"S. H. Islam, Varun Rajeev, Ruhul Amin","doi":"10.1109/ICRTCCM.2017.30","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.30","url":null,"abstract":"Session Initiation Protocol (SIP), which is an IP based telephony protocol, is used mainly for the purpose of starting, sustaining and ending sessions related to multimedia communications on the Internet. The SIP protocol, which works on the top of TCP or UDP, is basically an open text-based protocol. Hence, to ensure security is of utmost importance. The original SIP used HTTP-digest based challenge-response authentication process. However, HTTP digest-based authentication is insecure and pre-existing user configuration on the remote server is needed. Moreover, it provides only one-way message authentication and replay protection, but not the support message integrity and confidentiality. Although, quite a few three factor SIP protocols using password, smartcard and biometric are existing in the literature, however, none of them are robust against known attacks. In this paper, a robust and cost-efficient VoIP based three-factor SIP is proposed based on the computational Diffie-Hellman problem.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130771095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Detailed Study on Security Services in Cloud Environment 云环境下安全服务的详细研究
S. Rajakumar, A. S. Anakath, R. Naresh, S. Senthilkmar
{"title":"A Detailed Study on Security Services in Cloud Environment","authors":"S. Rajakumar, A. S. Anakath, R. Naresh, S. Senthilkmar","doi":"10.1109/ICRTCCM.2017.24","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.24","url":null,"abstract":"Cloud computing is a powerful service that allows the cloud users to utilize the resources located in the cloud servers by pay-per-use or charge-per-use mode through the internet. The cloud users are enjoying the on-demand services provided by the cloud computing environment without maintaining the data in a local system. Even though the service is offered to cloud users in an efficient way, there are some serious security issues to be considered very much for maintaining and accessing the data in a secure way from the Cloud Service Provider (CSP). On the data placed in the cloud servers located in any part of the world, various security attacks might be performed by both the internal and external attackers to break the security services like confidentiality on data, user and server authentication, data integrity, and access control of data. This survey provides a detailed study of the recent security issues existing in the cloud environment. This study shows communication architecture of cloud computing and exhibits the security services data confidentiality, data integrity, user privacy, authentication and access control. There are five security services that need to be provided in the cloud network to make it a safe one in real time environment. This paper discusses about various existing works that are used to provide the five security services. For each security service, we have given a short description of the existing works and evaluated the efficiency of each existing works individually. Finally, based on the summary of the existing works, we have also proposed new solutions to mitigate the computation cost and to improve communication efficiency for providing the security services of the data stored in CSP.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127680267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
QOS Routing Protocol to Detect Maximum Available Bandwidth in WMCs 用于检测wmc中最大可用带宽的QOS路由协议
R. Manikandan, A. Rajan, L. Deborah
{"title":"QOS Routing Protocol to Detect Maximum Available Bandwidth in WMCs","authors":"R. Manikandan, A. Rajan, L. Deborah","doi":"10.1109/ICRTCCM.2017.70","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.70","url":null,"abstract":"Wi-Fi Mesh Community has turn out to be an important area community to offer internet to challenge the thrown domains and wireless link in metropolitan environments. In this paper, hassle of figuring out the most to be had bandwidth direction is targeted, which is an essential problem in helping pleasant-of-carrier in WMCs. Due to the concept of interference, bandwidth, which is a familiar challenging metric in restive networks, a new direction is validated in which the weight captures the available route bandwidth statistics. It is also proved that the hop using the hop routing procedure based on the new path weight completely satisfies the consistency and loop-freeness necessities. The property of consistency ensures that each node follows a proper packet forwarding choice, in order that a statistics packet traverses over the supposed path. The experimental results additionally show that our proposed work on direction weight outperforms all the other existing direction metrics in figuring out excessive-throughput paths.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124146636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Bibliometric Analysis of Journal of Informetrics – A Decade Study 《信息计量学杂志》文献计量学分析——十年研究
G. Mahalakshmi, G. M. Selvi, S. Sendhilkumar
{"title":"A Bibliometric Analysis of Journal of Informetrics – A Decade Study","authors":"G. Mahalakshmi, G. M. Selvi, S. Sendhilkumar","doi":"10.1109/ICRTCCM.2017.22","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.22","url":null,"abstract":"Research and practice are perennial, the scientific articles that get published in line are also the same. Numerous journals are in place – some specialized and many, publishing scientific articles on general and wide discipline. However, there are few research disciplines which have only very less number of focused and specialized journal titles, and, the field of Bibliometrics is one among so. Journal of Informetrics is a dedicated journal involved in publishing scientific articles related to bibliometrics. This paper presents a case study on articles published in Journal of Informetrics.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121741045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信