N. Kumar, Akella Srikanth, Arunangshu Singha, B. Sam
{"title":"Comparison of LIFI and WIFI and study of smart meter-survey","authors":"N. Kumar, Akella Srikanth, Arunangshu Singha, B. Sam","doi":"10.1109/ICICES.2017.8070715","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070715","url":null,"abstract":"Li-Fi stands for Light-Fidelity. Li-Fi innovation, which was suggested by Harald Haas, a German physicist, gives conduction of information over brightening through distribution of information via a LED light which changes in force quicker when compared to the vision of human beings which could take after. Wi-Fi is extraordinary for overall remote scope inside structures, while Li-Fi has been perfect for high thickness remote information scope in limited range besides for calming wireless impedance concerns. Smart meters are electronic devices which are used for recording consumption of electrical energy on a regular basis at an interval of an hour or less. In this paper, we motivate the need to learn and understand about the various new technologies like LiFi and its advantages. Further, we will understand the comparison between LiFi and Wi-Fi and learn about the advantages of using LiFi over WiFi. In addition to that we will also learn about the working of smart meters and its communication of the recorded information on a daily basis to the utility for monitoring and billing purposes.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124878365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The etymology of big data on government processes","authors":"M. A. Chakravarthi, O. Srinivas","doi":"10.1109/ICICES.2017.8070712","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070712","url":null,"abstract":"“Big data” is a term that is widely used by large corporations today. With access to a vast infrastructure and a large collection of personal information that is not publicly available, the United States of America (US) is able to complete researches and projects that are out of the reach of most countries and corporations. This paper will examine three US companies that have successfully utilized big data. US government's uses of big data across a variety of fields are examined as well. An evaluation will be concluded towards the end to analyze the advantages and disadvantages of US government's uses of big data comparing to those US companies that successfully utilized big data.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"De duplication scalable secure file sharing on untrusted storage in big data","authors":"S. Keerthana, C. Monisha, S. Priyanka, S. Veena","doi":"10.1109/ICICES.2017.8070763","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070763","url":null,"abstract":"Data Deduplication provides lots of benefits to security and privacy issues which can arise as user's sensitive data at risk of within and out of doors attacks. Traditional secret writing that provides knowledge confidentiality is incompatible with knowledge deduplication. Ancient secret writing wants completely different users to encode their knowledge with their own keys. Thus, identical knowledge copies of completely different various users can result in different ciphertexts that makes Deduplication not possible. Convergent secret writing has been planned to enforce knowledge confidentiality whereas creating Deduplication possible. It encrypts/decrypts a knowledge copy with a confluent key, that is obtained by computing the cryptographical hash price of the content of the information copy. Once generation of key and encryption, the user can retain the keys and send ciphertext to cloud.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123897634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Template matching for detection & recognition of frontal view of human face through Matlab","authors":"Namrata Singh, A. K. Daniel, Pooja Chaturvedi","doi":"10.1109/ICICES.2017.8070792","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070792","url":null,"abstract":"Human face is an important object in an image database due to its unique features (eyes, mouth, nose etc.) in every human being. The detection & recognition of a face in an image using template matching is one of the profound research interest in the field of image processing. Various approaches have been proposed in the literature to extract the visual facial features based on texture, color, shape, sketch & pose variance etc. for face detection in color images. This paper describes an approach of face detection technique that includes major characteristics such as lightening compensation based on luminance (Y) & chrominance (Cr), Color segmentation, skin-tone statistics & eye-mouth region computation. A template matching algorithm using cross correlation method for locating & recognizing a face has been applied on various face candidates to match the template with right face candidate. Thus, the presented work is divided into three steps: Face detection, Computation of template matching & Face recognition. The performance of given approach has been evaluated on the basis of run time & accuracy. The simulation result shows that the defined model is efficient in terms of accuracy which is 81% and the false alarms are reduced.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117165701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensor based application for malware detection in android OS(Operating System) devices","authors":"B. Rajalakshmi, N. Anusha","doi":"10.1109/ICICES.2017.8070722","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070722","url":null,"abstract":"With the increase of Android OS mobile's usage day-to-day, mobiles are getting affected with malware applications. Many antimalware's are available in the market to detect and remove these malwares from the device. But these antimalware's fails to detect the once the malware changes its form. To overcome this, we proposed a technique using SVM (Support Vector Machine) tool, which increases the malware detection strength. Each time when a new application is installed in the mobile, the permission features and API (Application Programming Interface) calls related to the application are extracted and weights are assigned to them. The weights are assigned based on their malicious nature. If the total weight exceeds the predefined threshold then it will considered as malware and reports to the user. This method can also detect even if the malware changes its form.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115327211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficient task synchronisation in reservation-based real-time systems","authors":"R. Raj, S. Jaiswal, P. Chaudhari","doi":"10.1109/ICICES.2017.8070746","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070746","url":null,"abstract":"A wide variety of applications are making use of battery powered real-time systems in the present world. We address the need of an energy efficient design of real-time systems to reduce power consumption while ensuring the timing constraints. We propose a novel algorithm Energy Efficient Bandwidth Inheritance (EE-BWI) Protocol which is an extension of the well-known Bandwidth Inheritance (BWI) Protocol taking into account the energy factor. To the best of our knowledge, this is the first of its kind strategy, for scheduling real-time tasks in dynamic systems where tasks can interact through shared resources considering the energy factor including the interactions between hard real-time tasks and soft real-time tasks.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128153114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-health care data sharing into the cloud based on deduplication and file hierarchical encryption","authors":"R. Sharon, R. Manoj","doi":"10.1109/ICICES.2017.8070739","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070739","url":null,"abstract":"E-Healthcare system plays a major role in the society. It monitors the health condition and helps in giving appropriate medical treatments. This system aims at gathering and storing patient's details and sharing health related information. It also has high legitimate concerns about patient's privacy and information security. This system minimizes the infrastructural barriers for the developing nations. It also extends healthcare systems to the remote and isolated areas which has limited access to medical technologies, remote health services are provided through telecommunications. Quality of the service and security are added advantage to the system. They collect the real time personal information (PHI) and health problems from patients and transmit them to the healthcare provider for the authorized physicians to decide on the corresponding treatment. They send the PHI in terms of text and image to the cloud, and also the other personal queries related to their medical history. In cloud computing, collected PHI should match the physicians experience to judge the state of the patient and unfortunately, delegating both storage and computation to the untrusted entity would bring a series of security. This is where deduplication comes into play. It is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Attribute-based encryption (ABE) has been a preferred encryption technology to solve the challenging problem of security during data sharing in cloud computing. For every file a separate key will be provided, which is to be decrypted for using the file further.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114250646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated method for feature selection using fuzzy information measure","authors":"B. Azhagusundari","doi":"10.1109/ICICES.2017.8070711","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070711","url":null,"abstract":"The information is flooded with heterogeneous data sources and it generates over 2.5 quintillion bytes every day from communication devices, social media, consumer transactions, online behaviour and streaming services. To overcome this difficulty irrelevant and redundant data are to be removed using the technique called feature selection. The goal of the feature selection is to find the minimum set of attribute. The results are implemented by MATLAB and WEKA tool for feature selection and classification respectively. This research work is validated using different datasets namely Pima Diabetic, Breast Cancer, Ecoli, Iris, Sonar and Student which are available in UCI repository. Model performance is evaluated by using Precision, Recall and F-Measure performance metrics. The selected subset features are used to compare different feature ranking methods like Gain Ratio, Relief, Chi Square and OneR. The experimental inference reveals that the proposed algorithms are efficient in selecting minimum features for the feature subset and gives higher accuracy rate.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115538016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Sukanya, Kanchi V. Sindhu, G. Gowri, S. Nandhini
{"title":"Trustworthy access control for wireless body area networks","authors":"M. Sukanya, Kanchi V. Sindhu, G. Gowri, S. Nandhini","doi":"10.1109/ICICES.2017.8070744","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070744","url":null,"abstract":"Wireless body area networks (WBANs) are expected to play an important role in monitoring the health information and creating a smart, reliable, and ubiquitous healthcare system. Only authorized users can access the network since the collected data by the WBANs are used to diagnosed and treated. However, the lack of a clear in-depth defense line in such a new networking paradigm would make its potential users worry about the leakage of their private information, especially to those unauthenticated or even malicious adversaries. Here proposed a novel certificateless signcryption scheme, and then, design a cost-effective and reliable access control scheme for the WBANs using the novel signcryption. The proposed access control scheme achieves anonymity, confidentiality, authentication, integrity, and non-repudiation.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123070785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for finding optimal search results from web database using hybrid clustering algorithm","authors":"V. Sabitha, S. Srivatsa","doi":"10.1109/ICICES.2017.8070713","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070713","url":null,"abstract":"The Internet provides an excellent extent of useful information that is sometimes arranged for its users, that makes it difficult to extract relevant information from various sources. So that, this paper proposes a hybrid Artificial Bee Colony and Improved K-means bunch algorithmic program provides all types data of data repository and has been terribly successful in dispersive information to users. For the encoded information units to be machine method intelligent, that is crucial for several applications like deep internet information assortment and net comparison searching, they have to be extracted out and allot substantive labels. This paper deals with the automated annotation of Search result records from the multiple internet databases. Search result presents associate automatic annotation approach that initial aligns the info units on a result page into completely different teams specified the info within the same cluster have a similar linguistics. Then for every cluster annotate it from completely different aspects and mixture the various annotations to predict a final annotation label for it. Finally wrapper is mechanically generated by the automated tag matching weight technique.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123309983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}