{"title":"A review of security frameworks for Internet of Things","authors":"Vishwesh Nagamalla, Aruna Varanasi","doi":"10.1109/ICICES.2017.8070757","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070757","url":null,"abstract":"By 2020, it's estimated that the amount of connected devices is predicted to grow exponentially to fifty billion. internet of things has gained intensive attention, the deployment of sensors, actuators are increasing at a speedy pace round the world. there's tremendous scope for a lot of efficient living through a rise of smart services, however this coincides with a rise in security and privacy issues. there's a desire to perform a scientific review of information security governance frameworks within the internet of things (IoT) Objective: The aim of this paper to evaluate systematic review of information security management frameworks that are related to the internet of things (IoT). it'll additionally discuss totally different information security frameworks that IoT models and deployments across different verticals. These frameworks are classified in line with the realm of the framework, the security executives and senior management of any enterprise that plans to start out mistreatment good services must outline a transparent governance strategy regarding the safety of their assets, this method review can facilitate them to create an improved decision for their investment for secure IoT deployments. Method — a set of standard criteria has been established to investigate which security framework are the most effective work among these classified security structures in notably for net of Things (IoT). the primary step to judge security framework by victimisation commonplace criteria methodology is to identify resources, the safety framework for IoT is chosen to be assessed in line with CCS. The second step is to develop a group of Security Targets (ST). The ST is that the set of criteria to use for the target of analysis (TOE). The third step is data extraction; fourth step data synthesis; and final step is to write-up study as a report. Conclusion — after reviewing four information security risk frameworks, this study makes some suggestions associated with information security risk governance in internet of Things (IoT). The organizations that have determined to maneuver to smart devices ought to outline the advantages and risks and preparation processes to manage security risk. the knowledge security risk policies ought to befits an organization's IT policies and standards to guard the confidentiality, integrity and handiness of knowledge security. The study observes a number of the most processes that are required to manage security risks. Moreover, the paper additionally drew attention on some suggestions which will assist corporations that square measure related to the knowledge security framework in internet of things (IoT).","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127274534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fraud detection using outlier predictor in health insurance data","authors":"M. Anbarasi, S. Dhivya","doi":"10.1109/ICICES.2017.8070750","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070750","url":null,"abstract":"In day today life, health insurance data collection plays major role for employers. In several countries misbehavior in health insurance is a major problem. Health insurance data fraud is an intentional act of misleading, hiding or misrepresenting information that makes profit to a single or group of members. These kind of violation leads to major loss for health insurance providing organisation. Hence Detecting fraudulent and abusive cases in health insurance is one of the most challenging problems. The aim of the project is fraud detection in health insurance data. In order to increase the accuracy of the framework, several methods are utilized, such as the pairwise comparison method of analytic hierarchical processing (AHP). Its mainly focus on a concrete problem of probabilistic outlier detection. Overcoming the existing drawback of time consuming, proactive and retrospective analysis are integrated together, which significantly reduces the time requirements for the fact-finding process.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124159963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authenticated anonymous secure on demand routing protocol in VANET (Vehicular adhoc network)","authors":"K. Logeshwari, L. Lakshmanan","doi":"10.1109/ICICES.2017.8070730","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070730","url":null,"abstract":"Intelligent Transportation Systems (ITS) has gain a lot of popularity due to much technological advancement in Vehicular Ad hoc Networks (VANETs). VANET provides safety and entertainment services to vehicle users. Therefore, constrained safety is a prominent feature for VANETs. Since the vehicular nodes typically moves fast than the nodes movement in other network such as Mobile Ad hoc Networks (MANETs), it is of great importance to design an efficient routing protocol to provide safety and comfort services to the passengers on the roads. Recently efforts have been put to use the concepts of fuzzy logic to help in the decision making process in VANETs. Fuzzy logic deals with reasoning that is approximate rather than fixed and exact. The fuzzy logic inference system became important and useful when the values of the decision criteria are not only vague but uncertain in nature. In this work, based on analysis of greedy routing for packet forwarding, we have proposed a Fuzzy Logic based Greedy Routing (FLGR) protocol. FLGR is a multi-hop routing protocol which is used to select the best next-hop node in multi-hop VANETs using fuzzy logic concept. We have considered two characteristics of a vehicle as an input metrics to fuzzy decision making systems. Based on the optimum function of simulation results, the FLGR effectively select the best next-hop node for further packet transmission in the network.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131048048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Safety alert signalling measure in train transportation system and its automated behaviours using GPS","authors":"T. Sridhar","doi":"10.1109/ICICES.2017.8070742","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070742","url":null,"abstract":"The advancement of wireless communication and GPS systems paved the way for better monitoring in Railway Transportation systems. The GPS based monitoring of trains will help to track trains, better scheduling and avoids any mishaps. In the existing system, the scheduling of trains, traffic railway signalling is manual and less accurate in predicting train arrival destination time and no/or very less emergency alert broadcast sent to from and to station in case of any mishaps. Automated Train scheduling will be incorporated with the help of GPS system and if there are concurrent trains running in the same path, scheduling is automated to avoid deadlock scenario and train waiting issues and hence train travelling time can be reduced. Traffic Signalling is better handled with additional proactive measures by sending broadcast message to the nearest from or to stations with current latitude location details of train. The nearest station where train has been halted can be found by using the shortest distance using proposed Hybrid shortest distance algorithm using latitude conversion to weight and applying dijkstra to find the shortest distance. Accurate Train schedule timings are tabulated and expected train arrival at the destination will be precise enough as tabulations are dynamic. Hence necessary steps can be carried out for false traffic and immediate medical services can be provided for mishaps and reduces the number of accidents.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130648681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brain tumor classification using mixed method approach","authors":"S. Bangare, G. Pradeepini, S. Patil","doi":"10.1109/ICICES.2017.8070748","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070748","url":null,"abstract":"In this paper, we propose an effective mixed method approach for classification of brain tumor tissues. Here proposed system will be using Genetic Algorithm for feature Extraction and Support Vector machine for classification. These features are compared with stored features. Feature extraction is a method used to capture visual content of the image. The feature extraction is the method to signify raw image in its concentrated form to facilitate decision making such as pattern classification. The choice of features, which compose a big difficulty in classification techniques, is solved by using Genetic Algorithm. These features along with Support Vector Machine will be used to classify that tumor is normal and abnormal. If the tumor is get detected then by detecting the mean, mod, median of the tumor region we will classify this tumor tissues in gliomas, miningiomas, pitutatory, nerve sheath tumor etc. The performance of the algorithm is evaluated on a series of brain tumor images.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"a2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130735035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A semantic web services for medical analysis in health care domain","authors":"R. Sethuraman, G. Sneha, D. Bhargavi","doi":"10.1109/ICICES.2017.8070718","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070718","url":null,"abstract":"Network administration is conveyed in this social insurance extend. In the present venture, client indications have been regarded as and the specialists who can work on the predetermined manifestations or illnesses are distinguished. The recognized specialists alongside their areas have been discovered in a semantic manner also it is being offered reverse for the client. At this time, the manifestations prearranged by the client have been examined and contrasted and the prepared lay down where it is put away in a server. At first the information set is prepared totally. The lot of information present within the server information, specialists have been likewise permitted so as to record within its speciality. When client gives their side effects, the web related to semantic has been started and client question is investigated. On these given facts the conceivable outcomes of sicknesses, specialists who are identified with those specific infections have been chosen. The choice at this time happens amongst the different classes of specialists accessible. At this point the researchers utilize the learning through the machine calculation procedures. In the process of learning through machine, the researchers have to order i.e managed and unsupervised calculations. The distinction connecting the directed and unsupervised calculations has been such that it is being managed where one can recognize the preparation layout at which it is in unverified; we don't have the foggiest idea about the preparation layout. In an unmanaged setup, one can utilize numerous methods such as bunching, k-implies, desire augmentation, simulated neural systems procedures and so on. In every one of these systems, the researchers try to attempt to assess the capacity of vast number of sources of info that have been obscure. In our venture the researchers have wanted to execute unverified calculation. In this case, procedure the researchers want to utilize is grouping. Grouping since one can parcel those into bunches plus the information in every group would have the comparative kind of information. The semantic network with cosmology supported is a capable system. At this time All the specialists data, for example, his accessibility, operational in healing center, expense charges and doctor's facilities separation are put away RDF-Schema documents (Resource Development Frameworks). The researchers possess a range of operator framework in light of SWS organization handle. According to the present mould, the researchers have 2 operators to be specific SRA (Service Requester Agent) and SPA (Service Provider Agent). SRA effort is to perceive the illness as of the person who is taking treatment. SPA effort is to decide the most excellent connected specialist who get together the persons necessities. Due to the specialists who are deemed related show up, with utilizing assumption investigation one can obtain an excellent specialist in view of their surveys.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127995864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual reality: A brief survey","authors":"Namrata Singh, Sarvpal H. Singh","doi":"10.1109/ICICES.2017.8070720","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070720","url":null,"abstract":"Virtual Reality is based on the notion of immersion i.e. a new technological advancement in the field of human-machine interaction bringing it closer to real life. It is a technology for simulation of a real or virtual world in which one can immerse, touch, & sense the objects with the virtual presence in that 3-D world. This paper reviews the ideas & concepts behind the architectural representation, supporting software & hardware implementations, various categorized languages & modelling tools etc. This paper also studies current research objectives, comparison with other virtualized environments, development trends of VR, & modeling methods. Based on the analysis of structure & functioning of virtual reality environment, this paper presents various applications of virtual reality & different categories of issues related to it.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128066531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video stabilization using image alignment approach","authors":"Swetta Pereira, Vaqar Ansari","doi":"10.1109/ICICES.2017.8070772","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070772","url":null,"abstract":"Capturing or acquiring video data from advanced gadgets, like cell phone cameras, smart phones, camcorders, etc., is very recent and up growing trend. With the advancement of the video camera as the integrated part of these multimedia devices generates necessity for video stabilization. Digital video stabilization or video frame alignment techniques are used to improve quality of input video by removing the undesired camera motions jitters; undesirable jiggles etc. Many video stabilization techniques are developed till now but only fast and low computational complexity approaches can be applied on the embedded devices. The paper presents the review of fast block matching local motion vector estimation and alignment algorithm. Effectiveness of the algorithm is shown by quantitative evaluation. The proposed work will also help to boost the performance of various error concealment, error resilience and video quality improvement techniques in H.264/HEVC video codec.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125607383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shubham Magar, Varsha Saste, A. Lahane, Sangram Konde, Supriya Madne
{"title":"Smart home automation by GSM using android application","authors":"Shubham Magar, Varsha Saste, A. Lahane, Sangram Konde, Supriya Madne","doi":"10.1109/ICICES.2017.8070735","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070735","url":null,"abstract":"The Home automation plays an important role in modern lifestyle because of its access in using at different places with high quality which will intern save time by decreasing human work automatically. The home automation is electric devices stand alone and do not communicate; it is programmable, such as sensors remote controller and communication system. Home automation use for electronic control devices remotely and automatically. This technology is focused on control household appliances like light, fan, AC, etc. automatically. In uncomfortable condition, it is useful for old aged and handicapped person.we have proposed a home appliances control in automation using GSM. The overall design of smart Home Automation system with low cost and wireless system. So the ON/OFF process of home appliances can be done remotely.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127799955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of ZigBee and Bluetooth wireless technologies-survey","authors":"N. Kumar, C. Bhuvana, S. Anushya","doi":"10.1109/ICICES.2017.8070716","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070716","url":null,"abstract":"For wireless networking standards which aim for remote control and sensor application in radio environments and isolated locations can be achieved by ZigBee. The shorter range of connectivity can be achieved by Bluetooth and it is wireless. In this article we motivate the need to learn and understand about various new technologies like ZigBee and Bluetooth. Further, we get detailed knowledge about protocols and needs of ZigBee and Bluetooth. This article also discusses about different devices enhanced with ZigBee and Bluetooth. In addition we will understand the exact differences between ZigBee and Bluetooth and learn about how ZigBee is more favorable than Bluetooth.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134562562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}