2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)最新文献

筛选
英文 中文
Generation of Pseudo Random Sequences based on Chaotic Cubic Map and Cyclic Elliptic Curves over GF (28) for Cryptographic Applications 基于GF(28)上混沌三次映射和循环椭圆曲线的伪随机序列的生成
S. Sheela, S. Sathyanarayana
{"title":"Generation of Pseudo Random Sequences based on Chaotic Cubic Map and Cyclic Elliptic Curves over GF (28) for Cryptographic Applications","authors":"S. Sheela, S. Sathyanarayana","doi":"10.1109/MPCIT51588.2020.9350495","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350495","url":null,"abstract":"Cyclic elliptic curves (CEC) and chaotic sequences are used for cryptographic application from many decades. In this paper, authors propose a hybrid model to generate pseudo random key sequences for symmetric ciphers. Hybrid model is developed using CEC points over GF (28) and a one-dimensional cubic map. In the proposed system first, binary chaotic sequence and CEC points are given to AES SBOX to get two random sequences separately. Byte wise parity is computed for both the sequences. Based on the parity the sequences are either left or right circular shifted by a byte and two sequences are combined using the XOR operation to get the random binary sequence. The randomness of the generated sequences is analysed using various randomness test suites like NIST SP 800-22 Rev.1a and Correlation. It has been observed that all the sequences pass the randomness tests. These sequences are used to encrypt an image using additive stream cipher algorithm. The security analysis of the cipher image is conducted. The results obtained for the proposed system indicates that it is secure against cryptographic attacks.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116759128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key Management Using Elliptic Curve Diffie Hellman Curve 25519 利用椭圆曲线Diffie Hellman曲线进行密钥管理
R. Naik, S. Sathyanarayana, T. Sowmya
{"title":"Key Management Using Elliptic Curve Diffie Hellman Curve 25519","authors":"R. Naik, S. Sathyanarayana, T. Sowmya","doi":"10.1109/MPCIT51588.2020.9350454","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350454","url":null,"abstract":"Key management shows an important role in the information transmissions. This paper analyzes the more improved and cost-effective key management scheme with respect to transmission overhead, computation cost. A key management policy is effectually employed for the purpose of generating a distinctive convention key for ample members to promise the security of their prospect communications, and this agreement can be allied in cloud computing for the purpose of assisting protected and skilled data distribution. The Key exchange protocols provides the two or more members to decide on a shared secret key and later be able to used for encrypting a long message. The complexity of Discrete Logarithm Problem (DLP) as basic problem considered in Diffie-Hellman Key Exchange Protocol. The Elliptic curve Diffie-Helman (ECDH) is considered as an expansion to the standard Diffie-Hellman. The ECDH function is ideal for a wide range of cryptographic functions. Key management based on ECDH provides much security on key meanwhile having more amount of storage cost and execution time involving in this. The ECDH Curve 25519 makes much faster in execution and lesser storage cost due its structure which uses much higher prime group of the order 2252.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128300546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analyzing Big Data Originated from Data Communication Networks using K-Means Algorithm to Understand the Nature of Incoming Malicious Connections 利用K-Means算法分析数据通信网络产生的大数据,了解传入恶意连接的性质
L. B. Shyamasundar, V. A. Kumar, Jhansi Rani Prathuri
{"title":"Analyzing Big Data Originated from Data Communication Networks using K-Means Algorithm to Understand the Nature of Incoming Malicious Connections","authors":"L. B. Shyamasundar, V. A. Kumar, Jhansi Rani Prathuri","doi":"10.1109/MPCIT51588.2020.9350510","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350510","url":null,"abstract":"An environment is developed with a distributed Apache SPARK, deployed on Hadoop cluster for timely inference and classification of security incidents. Analysis of 85GB of network-packet dataset collected over four months is done (provided by CSIR-4PI, Govt. of India). K-means machine learning algorithm is used to analyze the network traffic based on various fields. By building and evaluating models, optimum number of clusters was determined. Clustering results are evaluated by calculating the clustering score using Within-Set Sum-of-Squared-Errors(WSSSE), entropy, Silhotte, Davies-Bouldin-Index and Dunn-Index. Several plots are visualized to understand the clustering analysis results and understand the nature of incoming malicious connections.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128167337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of Maximum Efficiency Point Tracking in Wireless Power Transfer Systems using Pulse Density Modulation 脉冲密度调制无线电力传输系统中最大效率点跟踪的仿真
Urmila Mathure, R. Ramkrishna
{"title":"Simulation of Maximum Efficiency Point Tracking in Wireless Power Transfer Systems using Pulse Density Modulation","authors":"Urmila Mathure, R. Ramkrishna","doi":"10.1109/MPCIT51588.2020.9350475","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350475","url":null,"abstract":"This paper presents a method of control known as maximum efficiency point tracking (MEPT). This method of control is used for wireless power transfer (WPT) systems to provide maximum value of efficiency against load variations and coupling with achieving power demands of the system. In traditional MEPT systems, on both transmitting and receiving sides dc/dc converters are used in order to achieve maximum efficiency and for the regulation of output voltage. But this arrangement increases the complexity of network with increasing power loss. Some implementations lead to new problems like hard switching, large dc voltage ripples and low average efficiency. An implementation of MEPT based on pulse density modulation is explained in this paper which removes all the drawbacks in existing implementation. A PDM circuit is used in both transmitting and receiving side to achieve maximum efficiency. A simulation circuit is built in matlab in this paper to get maximum efficiency. By varying load resistances and pulse densities in the matlab Simulink circuit an efficiency and output voltage is checked By comparing the results of existing MEPT implementation with this simulation circuit of WPT using PDM it achieved efficiency upto 83% for various load resistances and pulse densities.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124586534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Microscopic Blood Smear RBC Classification using PCA and SVM based Machine Learning 基于PCA和SVM的显微血液涂片红细胞分类
Prashanth Kannadaguli
{"title":"Microscopic Blood Smear RBC Classification using PCA and SVM based Machine Learning","authors":"Prashanth Kannadaguli","doi":"10.1109/MPCIT51588.2020.9350389","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350389","url":null,"abstract":"The therapeutic analysis f microscopic blood smear begins with recognizing blood cells f various categories as well as estimating cell count in blood sample. The distinctive blood cell grading and counting furnish priceless knowledge to the pathologist about sundry infections. This exercise can be easily concluded if the shapes f blood cells are pinpointed first and using the shapes, we classify the blood cells. In this research work we build and test an automatic microscopic blood smear red blood cell (RBC) classification by using Principal Component Analysis (PCA) and Support Vector Machine (SVM) based machine learning. We train and test the statistical data models based n probabilistic pattern recognition to classify the blood smear RBC into Normal Cells, Echinocytes, Elliptocytes and Sickle cells. The H-minimum Transform (HmT) and Watershed Transform (WT) are used in pre-processing f images to increase the accuracy if segmentation shape extraction f the blood cells. Then the Bag f Features (BoF) created considering the 500 strongest features f each type f blood cell after K-Means clustering. Training takes place through Image Category Classifier (ICC) whose performance measured by using Mean Average Precision (mAP) justifies that SVM based classifiers provide audacious results.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124008964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart Parking System (S-Park) – A Novel Application to Provide Real-Time Parking Solution 智能停车系统(S-Park)——一种提供实时停车解决方案的新应用
Abhijeet Anand, Abhinav Kumar, A. Rao, Anupam Ankesh, Ankur Raj
{"title":"Smart Parking System (S-Park) – A Novel Application to Provide Real-Time Parking Solution","authors":"Abhijeet Anand, Abhinav Kumar, A. Rao, Anupam Ankesh, Ankur Raj","doi":"10.1109/MPCIT51588.2020.9350429","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350429","url":null,"abstract":"Due to daily acceleration in the quantity of vehicles out and about, traffic issues will undoubtedly exist. The current transportation framework and vehicle parking space are unable to meet with the quantity of vehicles. Looking for a parking space in central city zones, particularly during top hours, is very strenuous for drivers. To avoid such a situation the project, Smart Parking System (S-Park) is envisioned. In this project, a real time system is developed and implemented, that allows the drivers to successfully locate and restrain the unoccupied parking areas remotely through website and Android App. The system developed, also allows the driver to navigate to their respective parking spot using Google maps. The driver needs to first register himself to avail the facility. The details of driver and vehicle are stored in database. This helps in tracking the in-out time and other details of every individual driver. S-Park provides hassle free operations in and around parking location. It also helps in attenuating the traffic congestion at a very rich scale.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114001882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Fuzzy Logic Based Controller for Measuring the Effectiveness of Training for Placement 一种新的基于模糊逻辑的定位训练有效性测量控制器
S. S. Navalgund
{"title":"A Novel Fuzzy Logic Based Controller for Measuring the Effectiveness of Training for Placement","authors":"S. S. Navalgund","doi":"10.1109/MPCIT51588.2020.9350470","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350470","url":null,"abstract":"It is a well-known fact that the placements are crucial in the professional life of a graduating student. The need for high quality output from the academia necessitates the students to be equipped with the requisite skill set to be industry-ready. This paper briefs about the training sessions done at SDMCET-Dharwad, for aiding the students in campus placement drives. Also, this paper deliberates a unique approach based on fuzzy logic for measuring the effectiveness of training sessions in terms of various dimensions namely program pacing, quality of content covered and interaction with students. The fuzzy controller is built using Mamdani and Sugeno style of inference engines. The design and simulations have been done using MATLAB and Simulink softwares.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130329995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MPCIT 2020 Table of Contents MPCIT 2020目录
{"title":"MPCIT 2020 Table of Contents","authors":"","doi":"10.1109/mpcit51588.2020.9350424","DOIUrl":"https://doi.org/10.1109/mpcit51588.2020.9350424","url":null,"abstract":"","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125207921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Safety and Security Solution for Women using kNN Algorithm and IoT 使用kNN算法和物联网的女性智能安全和安保解决方案
B. Yaswanth, R. Darshan, H. Pavan, D. Srinivasa, B. T. V. Murthy
{"title":"Smart Safety and Security Solution for Women using kNN Algorithm and IoT","authors":"B. Yaswanth, R. Darshan, H. Pavan, D. Srinivasa, B. T. V. Murthy","doi":"10.1109/MPCIT51588.2020.9350431","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350431","url":null,"abstract":"In the global scenario, women’s safety is a crucial problem. The security of women has become a greater challenge to many families in their daily life, hence a system is developed using rapidly growing technologies to address this problem. This paper mainly focuses on an IoT based self-security system that is comfortable, easy to use and wearable, and helps to share the user location when they feel panic and also help to find the nearest safe place. The designed system is user friendly and it can be accessed only by a specific person. The system is controlled through raspberry pi, and it has two different modes namely normal mode and security mode. In normal mode, user can register their fingerprint, and in security mode, the fingerprint sensor acts as a panic button, and when a fingerprint is detected system shares the location and captures the photo of the culprit and stores it in the cloud. The machine learning algorithm gets the user location as input and predicts the nearest safe place location.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126467379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scientific Discovery and Rigor with ML 科学发现和ML的严谨性
Abdul-Gafoor Mohamed, P. Mahanta
{"title":"Scientific Discovery and Rigor with ML","authors":"Abdul-Gafoor Mohamed, P. Mahanta","doi":"10.1109/MPCIT51588.2020.9350455","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350455","url":null,"abstract":"The evolution of Data Management Scenarios augmented by scientific discovery and rigor is apparent in the industry, judging by the sheer focus on it by analysts and others over the past couple of years. Machine Learning helps immensely playing its part in simplifying enterprise data landscapes, contributing to many aspects of Data Management. We see value in focusing on the Data Discovery and Data Quality aspects in this context, as enterprises these days have complex landscapes, with the average enterprise using more than 5 Cloud storages in addition to their on-prem data sources.A greater affinity for enterprise grade Machine Learning has created a significant pull for system design. This leads platforms towards capabilities like standard APIs for scaled-database queries and integration scenarios. This paper explores the integration of Machine Learning tools and customized libraries with any Cloud Platform for enhancing the stakeholders’ experience with Analytics. As far as concepts are concerned, we propose a hypothesis for scaling an existent platform to a community-based approach, which helps enable sharing of experimental iterations, ideally translating into industry specific solutions that should stay extremely reusable. The intent is to offer a data model flexible enough to handle diverse data scenarios, evaluating confidence scores for each of these. It should enable reproducible shared experiments with consistent evaluated scores, thereby easing the integration process through automated guidance. This paper will touch upon the good practices and architectural recommendations that need to be considered for general Machine Learning applications.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116100424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信