2017 International Conference on Information Communication and Embedded Systems (ICICES)最新文献

筛选
英文 中文
Comparison of LIFI and WIFI and study of smart meter-survey LIFI与WIFI的比较及智能电表测量的研究
N. Kumar, Akella Srikanth, Arunangshu Singha, B. Sam
{"title":"Comparison of LIFI and WIFI and study of smart meter-survey","authors":"N. Kumar, Akella Srikanth, Arunangshu Singha, B. Sam","doi":"10.1109/ICICES.2017.8070715","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070715","url":null,"abstract":"Li-Fi stands for Light-Fidelity. Li-Fi innovation, which was suggested by Harald Haas, a German physicist, gives conduction of information over brightening through distribution of information via a LED light which changes in force quicker when compared to the vision of human beings which could take after. Wi-Fi is extraordinary for overall remote scope inside structures, while Li-Fi has been perfect for high thickness remote information scope in limited range besides for calming wireless impedance concerns. Smart meters are electronic devices which are used for recording consumption of electrical energy on a regular basis at an interval of an hour or less. In this paper, we motivate the need to learn and understand about the various new technologies like LiFi and its advantages. Further, we will understand the comparison between LiFi and Wi-Fi and learn about the advantages of using LiFi over WiFi. In addition to that we will also learn about the working of smart meters and its communication of the recorded information on a daily basis to the utility for monitoring and billing purposes.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124878365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The etymology of big data on government processes 政府流程大数据的词源
M. A. Chakravarthi, O. Srinivas
{"title":"The etymology of big data on government processes","authors":"M. A. Chakravarthi, O. Srinivas","doi":"10.1109/ICICES.2017.8070712","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070712","url":null,"abstract":"“Big data” is a term that is widely used by large corporations today. With access to a vast infrastructure and a large collection of personal information that is not publicly available, the United States of America (US) is able to complete researches and projects that are out of the reach of most countries and corporations. This paper will examine three US companies that have successfully utilized big data. US government's uses of big data across a variety of fields are examined as well. An evaluation will be concluded towards the end to analyze the advantages and disadvantages of US government's uses of big data comparing to those US companies that successfully utilized big data.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
De duplication scalable secure file sharing on untrusted storage in big data 大数据中不可信存储上的重复可扩展安全文件共享
S. Keerthana, C. Monisha, S. Priyanka, S. Veena
{"title":"De duplication scalable secure file sharing on untrusted storage in big data","authors":"S. Keerthana, C. Monisha, S. Priyanka, S. Veena","doi":"10.1109/ICICES.2017.8070763","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070763","url":null,"abstract":"Data Deduplication provides lots of benefits to security and privacy issues which can arise as user's sensitive data at risk of within and out of doors attacks. Traditional secret writing that provides knowledge confidentiality is incompatible with knowledge deduplication. Ancient secret writing wants completely different users to encode their knowledge with their own keys. Thus, identical knowledge copies of completely different various users can result in different ciphertexts that makes Deduplication not possible. Convergent secret writing has been planned to enforce knowledge confidentiality whereas creating Deduplication possible. It encrypts/decrypts a knowledge copy with a confluent key, that is obtained by computing the cryptographical hash price of the content of the information copy. Once generation of key and encryption, the user can retain the keys and send ciphertext to cloud.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123897634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Template matching for detection & recognition of frontal view of human face through Matlab 基于Matlab的人脸正面视图检测与识别模板匹配
Namrata Singh, A. K. Daniel, Pooja Chaturvedi
{"title":"Template matching for detection & recognition of frontal view of human face through Matlab","authors":"Namrata Singh, A. K. Daniel, Pooja Chaturvedi","doi":"10.1109/ICICES.2017.8070792","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070792","url":null,"abstract":"Human face is an important object in an image database due to its unique features (eyes, mouth, nose etc.) in every human being. The detection & recognition of a face in an image using template matching is one of the profound research interest in the field of image processing. Various approaches have been proposed in the literature to extract the visual facial features based on texture, color, shape, sketch & pose variance etc. for face detection in color images. This paper describes an approach of face detection technique that includes major characteristics such as lightening compensation based on luminance (Y) & chrominance (Cr), Color segmentation, skin-tone statistics & eye-mouth region computation. A template matching algorithm using cross correlation method for locating & recognizing a face has been applied on various face candidates to match the template with right face candidate. Thus, the presented work is divided into three steps: Face detection, Computation of template matching & Face recognition. The performance of given approach has been evaluated on the basis of run time & accuracy. The simulation result shows that the defined model is efficient in terms of accuracy which is 81% and the false alarms are reduced.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117165701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Sensor based application for malware detection in android OS(Operating System) devices 基于传感器的android OS(操作系统)设备恶意软件检测应用
B. Rajalakshmi, N. Anusha
{"title":"Sensor based application for malware detection in android OS(Operating System) devices","authors":"B. Rajalakshmi, N. Anusha","doi":"10.1109/ICICES.2017.8070722","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070722","url":null,"abstract":"With the increase of Android OS mobile's usage day-to-day, mobiles are getting affected with malware applications. Many antimalware's are available in the market to detect and remove these malwares from the device. But these antimalware's fails to detect the once the malware changes its form. To overcome this, we proposed a technique using SVM (Support Vector Machine) tool, which increases the malware detection strength. Each time when a new application is installed in the mobile, the permission features and API (Application Programming Interface) calls related to the application are extracted and weights are assigned to them. The weights are assigned based on their malicious nature. If the total weight exceeds the predefined threshold then it will considered as malware and reports to the user. This method can also detect even if the malware changes its form.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115327211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy efficient task synchronisation in reservation-based real-time systems 基于预约的实时系统中的节能任务同步
R. Raj, S. Jaiswal, P. Chaudhari
{"title":"Energy efficient task synchronisation in reservation-based real-time systems","authors":"R. Raj, S. Jaiswal, P. Chaudhari","doi":"10.1109/ICICES.2017.8070746","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070746","url":null,"abstract":"A wide variety of applications are making use of battery powered real-time systems in the present world. We address the need of an energy efficient design of real-time systems to reduce power consumption while ensuring the timing constraints. We propose a novel algorithm Energy Efficient Bandwidth Inheritance (EE-BWI) Protocol which is an extension of the well-known Bandwidth Inheritance (BWI) Protocol taking into account the energy factor. To the best of our knowledge, this is the first of its kind strategy, for scheduling real-time tasks in dynamic systems where tasks can interact through shared resources considering the energy factor including the interactions between hard real-time tasks and soft real-time tasks.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128153114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-health care data sharing into the cloud based on deduplication and file hierarchical encryption 基于重复数据删除和文件分层加密的电子医疗保健数据共享到云端
R. Sharon, R. Manoj
{"title":"E-health care data sharing into the cloud based on deduplication and file hierarchical encryption","authors":"R. Sharon, R. Manoj","doi":"10.1109/ICICES.2017.8070739","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070739","url":null,"abstract":"E-Healthcare system plays a major role in the society. It monitors the health condition and helps in giving appropriate medical treatments. This system aims at gathering and storing patient's details and sharing health related information. It also has high legitimate concerns about patient's privacy and information security. This system minimizes the infrastructural barriers for the developing nations. It also extends healthcare systems to the remote and isolated areas which has limited access to medical technologies, remote health services are provided through telecommunications. Quality of the service and security are added advantage to the system. They collect the real time personal information (PHI) and health problems from patients and transmit them to the healthcare provider for the authorized physicians to decide on the corresponding treatment. They send the PHI in terms of text and image to the cloud, and also the other personal queries related to their medical history. In cloud computing, collected PHI should match the physicians experience to judge the state of the patient and unfortunately, delegating both storage and computation to the untrusted entity would bring a series of security. This is where deduplication comes into play. It is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Attribute-based encryption (ABE) has been a preferred encryption technology to solve the challenging problem of security during data sharing in cloud computing. For every file a separate key will be provided, which is to be decrypted for using the file further.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114250646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An integrated method for feature selection using fuzzy information measure 基于模糊信息测度的综合特征选择方法
B. Azhagusundari
{"title":"An integrated method for feature selection using fuzzy information measure","authors":"B. Azhagusundari","doi":"10.1109/ICICES.2017.8070711","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070711","url":null,"abstract":"The information is flooded with heterogeneous data sources and it generates over 2.5 quintillion bytes every day from communication devices, social media, consumer transactions, online behaviour and streaming services. To overcome this difficulty irrelevant and redundant data are to be removed using the technique called feature selection. The goal of the feature selection is to find the minimum set of attribute. The results are implemented by MATLAB and WEKA tool for feature selection and classification respectively. This research work is validated using different datasets namely Pima Diabetic, Breast Cancer, Ecoli, Iris, Sonar and Student which are available in UCI repository. Model performance is evaluated by using Precision, Recall and F-Measure performance metrics. The selected subset features are used to compare different feature ranking methods like Gain Ratio, Relief, Chi Square and OneR. The experimental inference reveals that the proposed algorithms are efficient in selecting minimum features for the feature subset and gives higher accuracy rate.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115538016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trustworthy access control for wireless body area networks 无线体域网络的可信访问控制
M. Sukanya, Kanchi V. Sindhu, G. Gowri, S. Nandhini
{"title":"Trustworthy access control for wireless body area networks","authors":"M. Sukanya, Kanchi V. Sindhu, G. Gowri, S. Nandhini","doi":"10.1109/ICICES.2017.8070744","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070744","url":null,"abstract":"Wireless body area networks (WBANs) are expected to play an important role in monitoring the health information and creating a smart, reliable, and ubiquitous healthcare system. Only authorized users can access the network since the collected data by the WBANs are used to diagnosed and treated. However, the lack of a clear in-depth defense line in such a new networking paradigm would make its potential users worry about the leakage of their private information, especially to those unauthenticated or even malicious adversaries. Here proposed a novel certificateless signcryption scheme, and then, design a cost-effective and reliable access control scheme for the WBANs using the novel signcryption. The proposed access control scheme achieves anonymity, confidentiality, authentication, integrity, and non-repudiation.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123070785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A novel approach for finding optimal search results from web database using hybrid clustering algorithm 一种利用混合聚类算法从web数据库中寻找最优搜索结果的方法
V. Sabitha, S. Srivatsa
{"title":"A novel approach for finding optimal search results from web database using hybrid clustering algorithm","authors":"V. Sabitha, S. Srivatsa","doi":"10.1109/ICICES.2017.8070713","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070713","url":null,"abstract":"The Internet provides an excellent extent of useful information that is sometimes arranged for its users, that makes it difficult to extract relevant information from various sources. So that, this paper proposes a hybrid Artificial Bee Colony and Improved K-means bunch algorithmic program provides all types data of data repository and has been terribly successful in dispersive information to users. For the encoded information units to be machine method intelligent, that is crucial for several applications like deep internet information assortment and net comparison searching, they have to be extracted out and allot substantive labels. This paper deals with the automated annotation of Search result records from the multiple internet databases. Search result presents associate automatic annotation approach that initial aligns the info units on a result page into completely different teams specified the info within the same cluster have a similar linguistics. Then for every cluster annotate it from completely different aspects and mixture the various annotations to predict a final annotation label for it. Finally wrapper is mechanically generated by the automated tag matching weight technique.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123309983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信