{"title":"Feature Selection on High Dimensional Data Using Wrapper Based Subset Selection","authors":"G. Manikandan, E. Susi, S. Abirami","doi":"10.1109/ICRTCCM.2017.58","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.58","url":null,"abstract":"In recent years, feature subset selection and classification in high dimensional data is a major challenge faced by the researchers. The main aim of the feature subset selection is to find most informative features from the vast number of features in the high dimensional data. Filter, wrapper and embedded methods are currently used to solve these issues. In this paper, we have incorporated wrapper based subset selection technique for selecting a subset from the high dimensional datasets. In this approach to find the optimal threshold value, the feature subsets are given to the classifier iteratively until the maximum accuracy is obtained. The symmetrical uncertainty method is used to weight the features to predict the predominant feature. For validating the incorporated algorithm, we have used 10-fold cross validation against the two standard classification techniques such as Naive Bayes and Support Vector Machine (SVM) and the results are tabulated and compared. The comparison between the results shows that the proposed method gives the better accuracy and results.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132584937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Trust Based Routing Protocol to prevent the Malicious Nodes in Wireless Sensor Networks","authors":"B. Priayoheswari, K. Kulothungan, A. Kannan","doi":"10.1109/ICRTCCM.2017.35","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.35","url":null,"abstract":"In Wireless Sensor Networks, topology management guarantees energy efficiency and maintains the connection among the nodes.Most of the existing systems are not providing trust among the sensor nodes.Therefore,issues in security should also be considered in the management of topology in WSN.To overcome the above problem,in this paper,we propose (TBR) a TRust Based Routing with Topology management.Moreover this Topology Management uses RSSI values for constructing Topology in WSN and for maintaining the nodes in transmission range in the presence of malicious nodes.This model is used to perform secure routing in WSN. From the experiment conducted it is observed that the proposed method provides an efficient trust based routing in WSN compared to existing methods.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124029769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Channel Access Techniques in Wireless Body Area Network","authors":"M. Ambigavathi, D. Sridharan","doi":"10.1109/ICRTCCM.2017.28","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.28","url":null,"abstract":"Wireless Body Area Network (WBAN) is an excellent technology for chronic healthcare monitoring applications. In which, sensor nodes are connected wirelessly in, on or near the human body and also responsible for Data Collection, Data Processing and Data Transmission. Sensor nodes are generally powered by small batteries with sturdily restricted energy resources, so minimizing the energy consumption of each sensor node and elongate the life time are the major concern in WBAN. The Channel Access layer performs a great role in determining the Quality of Service (QoS). This paper aims to draw attention towards the recent challenges exist in WBAN MAC protocols concerning energy consumption and delay. Then, discoursed about some of the open research problems with their possible solutions and the future enhancements. Finally, this paper is concluded by deliberating the challenging issues in WBAN.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"346 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124277127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing: Fundamentals and Research Issues","authors":"S. Namasudra, Pinki Roy, B. Balusamy","doi":"10.1109/ICRTCCM.2017.49","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.49","url":null,"abstract":"Nowadays, access control and data security are two most critical problems with cloud computing. Access control can be defined as a procedure by which users can access data from the cloud server. At the time of accessing data, there are many problems, such as data security, high data accessing time, data lost, overhead, data redundancy, etc. In the first part of this paper, a brief discussion of fundamentals of cloud computing are presented. Moreover, all the issues of cloud computing are also discussed in this paper. Finally, future work directions have been identified for the cloud computing environment.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121082820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Gesture Based Authentication Scheme to Unlock the Smartphones","authors":"S. Ganesh, P. Vijayakumar, L. Deborah","doi":"10.1109/ICRTCCM.2017.31","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.31","url":null,"abstract":"In the recent times, the smart phones have become versatile that they are used for sensitive applications such as m-banking, m-commerce, m-governance, m-health, digital marketing, SMS and have become a vital gadget to share posts in social networking applications such as Facebook, Twitter, WhatsApp and others. It is also used for online gaming, surfing, chatting and also used for storing the personal information like photos, videos, documents and other important files. In this scenario, it is no surprise that the basic demand for utilizing a smart phone is secure authentication. Though a number of authentication schemes have been proposed in the literature through PIN numbers, passwords and patterns, they are susceptible for shoulder surfing or smudging attacks. Thus, combing gestures with such authentication schemes prove to be more successful in the present times and hence a new kind of pattern has been proposed with essential gestures such as finger pressure and inclination of the phone while it is being unlocked. This work is different from the previous works in two dimensions. First, the proposed pattern is secure against both shoulder surfing and smudging attacks. Second, the computational complexity of authentication scheme has been reduced. Through extensive experiments it can be proved that this work outperforms many works in the recent literature and hence it would be an ideal candidate for the secure authentication of smart phones.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127485151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Intrusion Detection System in Mobile Ad Hoc Networks Using RSA Algorithm","authors":"S. Sankaranarayanan, G. Murugaboopathi","doi":"10.1109/ICRTCCM.2017.73","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.73","url":null,"abstract":"Nowadays Mobile Ad Hoc Networks has become a popular research subject due to its characteristics. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices. With this problem there are many chances that the intruders may attack the nodes over the function. Using Intrusion Detection Techniques we can find the intruders before it may attack the nodes. Intrusion Detection System (IDS) is considered as the first line of defence for security in MANET. In this paper we discuss intrusion detection system using public RSA algorithm.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123137391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Meenakshi, Gauri Agarwal, Saumya Bakshi, S. Bhatter, P. Sivakumar
{"title":"Cognitive Agents for Web Based Search Engines: A Review","authors":"S. Meenakshi, Gauri Agarwal, Saumya Bakshi, S. Bhatter, P. Sivakumar","doi":"10.1109/ICRTCCM.2017.50","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.50","url":null,"abstract":"Search Engine (SE) is the most used information retrieval tool in the present scenario. In spite of the huge involvement of users in search engines, their limited capabilities to understand the user context and emotions places high load on the user to maintain the search momentum. Thus the research is being done on the web search process including the users. The aim is to reduce the contextual and emotional mismatch between the SE's and users. Personalized user query processing, current knowledge updation on users, information retrieval effectiveness and user satisfaction are the major challenges to be addressed in this field. To meet the high level requirements of the users and to improve the intellectualization level of the search, various cognitive agent based SE models are proposed in the literature. The challenges of the cognitive agents in present search engine scenario are obtaining sufficient percepts from the environment, understanding it, gathering the knowledge and retrieving the information from the huge volume of data. Recent advancements in the field of semantic search engines, knowledge gathering techniques and information retrieval methods are discussed which can better the cognitive agent based search engines by addressing the challenges. Overall the goal is to enhance the search experience by fewer repetitions of queries and making it easier for the users to retrieve the highly relevant documents of their interest.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128258019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Mobile Technologies: 3G, 4G and 5G","authors":"E. Ezhilarasan, M. Dinakaran","doi":"10.1109/ICRTCCM.2017.90","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.90","url":null,"abstract":"In the recent decades, wireless communication system development has been changing enormously. The Wireless application services are increasing quickly and the service provider is very hard to manage the user requested services. As per the Ericson mobility report on 2016 utters in 2021, the worldwide mobile subscriptions will accomplish 9,000 million, then W-CDMA and HSPA subscriptions will reach 3,100 million and LTE will attain 4,300 million subscriptions, so in upcoming years 3G and 4G technologies will difficult to handle the mobile traffics. 5G subscriptions are expecting to be commercial technology from 2020 onwards and it can assure 5G is capable of managing the mobile traffic. The purpose of the research is a detailed study on 3G, 4G, and 5G network technologies.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132774972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Auditing of Data Integrity over Dynamic Data in Cloud","authors":"S. P, L. Parthiban, V. Jegatheeswari","doi":"10.1109/ICRTCCM.2017.45","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.45","url":null,"abstract":"Cloud computing is a new computing paradigm which encourages remote data storage. This facility shoots up the necessity of secure data auditing mechanism over outsourced data. Several mechanisms are proposed in the literature for supporting dynamic data. However, most of the existing schemes lack the security feature, which can withstand collusion attacks between the cloud server and the abrogated users. This paper presents a technique to overthrow the collusion attacks and the data auditing mechanism is achieved by means of vector commitment and backward unlinkable verifier local revocation group signature. The proposed work supports multiple users to deal with the remote cloud data. The performance of the proposed work is analysed and compared with the existing techniques and the experimental results are observed to be satisfactory in terms of computational and time complexity.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114176168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of the Monitoring and Control System for Unified Power Quality Conditioner Using Soft Computing Method","authors":"S. Arulkumar, P. Madhavasarma, P. Veeraragavan","doi":"10.1109/ICRTCCM.2017.52","DOIUrl":"https://doi.org/10.1109/ICRTCCM.2017.52","url":null,"abstract":"This paper presents a design and simulation of UPQC system for limitations of non linear load factors. The fuzzy logic controller is designed for tuning the PI controller parameters for achieving the optimal voltage is the solar power connected in the UPQC system. Solar power used to improve the power for load side power system designed in network. The MATLAB simulation software is used for simulation of results. From the simulation results, the Total Harmonics Distortion value is reduced from 2.77% to 1.29% in the voltage side similarly 4.88% to 2.01% in the current side. Also the waveform of the supply system is improved.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"420 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132244407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}