2018 International Conference on Computer Communication and Informatics (ICCCI)最新文献

筛选
英文 中文
Intrusion Detection and Prevention Based on State Context and Hierarchical Trust in Wireless Sensor Networks 基于状态上下文和分层信任的无线传感器网络入侵检测与防御
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441415
R. Maidhili, G. Karthik
{"title":"Intrusion Detection and Prevention Based on State Context and Hierarchical Trust in Wireless Sensor Networks","authors":"R. Maidhili, G. Karthik","doi":"10.1109/ICCCI.2018.8441415","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441415","url":null,"abstract":"This Wireless sensor networks (WSN) comprises of sensor nodes, deployed in a way to gather the information of environmental conditions from the surroundings. The dispersed quality, forwarding nature and their open source communication medium makes the wireless sensor networks deeply vulnerable which paves a way to various security attacks. Intrusion Detection System (IDS) can be an exemplary interpretation to encounter security attacks at various levels if the network. In WSNs a vulnerability is possible in selecting cluster head among the sensor nodes. Once the compromised sensor node is selected as cluster head which will lead to false communication with Base Station. IDS can neither prevent it nor respond to it, but only can detect it. IDS informs the controller to take necessary action by raising alarms if any attack is detected which is good but also leads to resource wastage and time consumption in the detection process. Prevention should be done at the launching state of the attack in order to scale down the resource wastage and time consumption. Initially the attacker launches the attack to get into the selection of cluster heads (CH) by broadcasting the control messages with fake information such as high energy and neighbor count. The false control messages are effectively detected and the attack is prevented which leads to a massive reduction of overall resource overhead while improving network performance. The experimental simulation work outputs, to detect the attacks at the base level and improves the network performance, to prevent the attack in order to reduce the resource overhead and to perform attack resident routing and data aggregation in WSN","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116971253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of Novel Load Balancing Technique in Cloud Computing Environmen 新型负载均衡技术在云计算环境中的实现
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441212
N. Joshi, K. Kotecha, D. Choksi, Sharnil Pandya
{"title":"Implementation of Novel Load Balancing Technique in Cloud Computing Environmen","authors":"N. Joshi, K. Kotecha, D. Choksi, Sharnil Pandya","doi":"10.1109/ICCCI.2018.8441212","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441212","url":null,"abstract":"Spectacular benefits of virtualization and cloud computing technologies have stimulated the Information and Communication Technology sector towards adopting cloud computing. Various ICT-enabled service providers also have either adopted cloud computing or started migrating services to cloud infrastructure. However, the increasing demand for cloud based infrastructure has resulted into severe problem of resource management and load balancing for cloud service providers and consumers. Researchers have suggested various load balancing techniques for efficient resource utilization in cloud. A novel load balancing technique representing relocation of workload from overloaded VM to lightly loaded VM in cloud computing environment is presented in this paper. An attempt is made to help the cloud stake holders to overcome the imbalanced resource utilization problem is presented in this paper. The approach presented here is also useful during disaster management for safeguarding end-user applications and thereby assisting upholding cloud services.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117022518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Management of power flow for DC Microgrid with Solar and Wind Energy Sources 太阳能和风能直流微电网潮流管理
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441324
K. Gowtham, C.V Sivaramadurai, P. Hariprasath, B. Indurani
{"title":"A Management of power flow for DC Microgrid with Solar and Wind Energy Sources","authors":"K. Gowtham, C.V Sivaramadurai, P. Hariprasath, B. Indurani","doi":"10.1109/ICCCI.2018.8441324","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441324","url":null,"abstract":"Today there is a rapid proliferation of DC loads into the market and DC micro grid with renewable energy sources is emerging as a possible solution to meet growing energy demand. As different energy sources like solar, wind, fuel cell, and diesel generators can be integrated into the DC grid, Management of power flow among the sources is essential. In this paper, a control strategy for Management of power flow in DC micro grid with solar and wind energy sources is presented. As the regulation of voltage profile is important in a standalone system, a dedicated converter is to be employed for maintaining the DC link voltage. DC link voltage is regulated by the battery circuit while maximum power is extracted from Solar and Wind to feed the loads connected at the DC bus. A powerflow algorithm is developed to control among three sources in the DC Microgrid. The algorithm is tested for various load conditions and for fluctuations in solar and wind power in MATLAB/SIMULINK environment.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129159818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
FM Radio Antenna with Mobile Dish Antenna for Internet communication in Telemedicine 用于远程医疗网络通信的调频天线与移动碟形天线
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441314
S. Saravanan, P. Sudhakar
{"title":"FM Radio Antenna with Mobile Dish Antenna for Internet communication in Telemedicine","authors":"S. Saravanan, P. Sudhakar","doi":"10.1109/ICCCI.2018.8441314","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441314","url":null,"abstract":"Telemedicine is a Health care service of ICT for Emergency treatment using internet communication between patients to specialist doctors. The internet communication is important transmission of large size medical data, videoconferencing between patients of doctors to specialist doctors. Some rural area has less mobile signal strength, so the down load and upload internet speed has low speed. In the Telemedicine service need to transmit large size of medical data and need internet speed up to 3 Mbps to 10 Mbps. The design of advanced mobile dish antenna with FM radio Antenna for increase the internet speed. This paper explains how to design mobile dish antenna with FM radio Antenna in Telemedicine service.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114392960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of Centre Antenna Element on Array Factor Properties of the Deterministic Triangular Fractal Array Antenna 中心天线单元对确定性三角形分形阵列天线阵列因子特性的影响
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441318
V. A. S. Ponnapalli, V. Y. J. Pappu
{"title":"Effect of Centre Antenna Element on Array Factor Properties of the Deterministic Triangular Fractal Array Antenna","authors":"V. A. S. Ponnapalli, V. Y. J. Pappu","doi":"10.1109/ICCCI.2018.8441318","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441318","url":null,"abstract":"This research article explores the effect of centre antenna element on the array factor properties of the deterministic triangular fractal array antenna of expansion factor two. This sub-array based fractal array antenna is designed based on the concentric elliptical sub array geometric generator methodology. An alteration of the fractal array geometry is considered in which one of the antenna element is placed at the centre of the each sub-array of the deterministic triangular fractal array. Owing to the centre antenna element side lobe ratios are diminished from −25dB to −52dB and −30dB to −41dB in the triangular fractal array of second and third iterations simultaneously, with little variation in the side lobe level angle and beam width.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114578896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image Encryption: A Random Selection Approach 图像加密:一种随机选择方法
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441267
Sundararaman Rajagopalan, L. Chandrasekaran, Amirtharajan Rengarajan, Sivaraman Rethinam, S. Arumugham, Mohan Kandhaiya
{"title":"Image Encryption: A Random Selection Approach","authors":"Sundararaman Rajagopalan, L. Chandrasekaran, Amirtharajan Rengarajan, Sivaraman Rethinam, S. Arumugham, Mohan Kandhaiya","doi":"10.1109/ICCCI.2018.8441267","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441267","url":null,"abstract":"Digital data is a fundamental source of multimedia platform where image communication is a substantial part of it. Through image communication, information is transmitted and received on network in various fields like armed forces, military, healthcare, entertainment, and many more. To protect information, security architectures are necessary. This work proposes an enhanced method of gray scale image encryption where chaotic selection of encryption algorithm takes the priority. Confusion and diffusion is performed with four pseudo random sequence generators namely Chaotic logistic map, chaotic tent map, Linear Feedback Shift Register (LFSR) and combined chaotic map. Confusion phase is a constant operation in which logistic map generated random sequences are used to scramble the image. In diffusion phase, chaotic selection of random sequence generator is accomplished by a sum of four digits random number generated using logistic map. Then diffusion is performed by XORing the scrambled image with generated random sequences produced from respective generator. This image encryption scheme is designed using python 2.7 and validated by performing entropy, correlation, histogram, differential, encryption quality and NIST test analyses.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117324316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIFLC based control implementation of DSTATCOM 基于SIFLC的DSTATCOM控制实现
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441466
D. Suresh, K. Venkateswarlu, S. Singh
{"title":"SIFLC based control implementation of DSTATCOM","authors":"D. Suresh, K. Venkateswarlu, S. Singh","doi":"10.1109/ICCCI.2018.8441466","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441466","url":null,"abstract":"In this paper, five level distributed static compensator (DSTATCOM) is demonstrated to reduce harmonics efficiently. The topology of the DSTATCOM consists of the cascaded H-hridge multilevel inverter (CHBMLI), de link and interfacing inductor. The dc link voltage regulated with single input fuzzy logic controller. The concept of the SIFLC is derived from conventional FLC with signed distance. This simplification allows SIFLC control surface to approximated piece wise linear surface (PWL). The derived PWL surface is used for individual de capacitor voltage regulation. The instantaneous reactive power theory is used for reference current generation. The SIFLC for CHBMLI based DSTATCOM individual dc voltage regulation is proposed. The CHBMLI based DSTATCOM with SIFLC efficiently compensates the reactive current of the nonlinear load. The performance characteristics of the CHBMLI based DSTATCOM using SIFLC is compared with conventional fuzzy logic controller. The simulated response of DSTATCOM with the SIFLC shows effective compensation performance for a dynamic change in the load than the Conventional fuzzy logic controller.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132455704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Machine Learning Approach to the Detection and Analysis of Android Malicious Apps Android恶意应用检测与分析的机器学习方法
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441472
K. Shibija, Raymond Joseph
{"title":"A Machine Learning Approach to the Detection and Analysis of Android Malicious Apps","authors":"K. Shibija, Raymond Joseph","doi":"10.1109/ICCCI.2018.8441472","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441472","url":null,"abstract":"Today, the use of mobile phone is growing in all the areas and unfortunately, it made the mobile phones a continuous target of cyber attackers. The main source of these kinds of attack is the malicious applications which a user will be downloading from trusted mediums such as Playstore, App store and all. Considering the millions of applications, the play store is having, it is impossible to identify which one is malicious and which one is not for a user. Even after the installation, the user will not be able to understand the activities the application will be performing in the mobile device. A lot of problems are arising nowadays because of this and a lot of confidential information is getting leaked from the mobile device. So, it is important to have a platform where it should be able to distinguish a malicious app from the set of benign app. This system is a mobile android application which will be working based on machine learning. The application will perform both static and dynamic analysis to identify the malicious activities of an application. The static analysis is mainly focused on the manifest.xml file of an Android application and the dynamic analysis will be based on the actions it will be triggering while running on a mobile device. The system is capable of combining both static and dynamic analysis results. The main aim of this project is to develop an efficient and effective android mobile application with a high success rate of distinguishing malicious from benign applications.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132604195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RESTful Motion Detection and Notification using IoT 使用物联网的RESTful运动检测和通知
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441423
R. Kodali, Venkata Sundeep Kumar Gorantla
{"title":"RESTful Motion Detection and Notification using IoT","authors":"R. Kodali, Venkata Sundeep Kumar Gorantla","doi":"10.1109/ICCCI.2018.8441423","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441423","url":null,"abstract":"Individuals show immense interest in making the things around them smart by implementing new technologies. This paper mainly focuses on detection of motion in a particular area and if it is detected a notification will be sent to the person. In current implementation the PIR sensor is integrated to low-cost and Wi-Fi enabled NodeMCU Microcontroller in order to detect the motion. The NodeMCU posts the information to Thinger.io cloud which uses RESTful Programming Interface for easy integration of components. Pyroelectric Infrared (PIR) sensors are simple and most powerful people presence triggers. We also integrated IFTTT channel maker, a Web based service to thinger.io in order to get notifications when motion is detected. Here the PIR Sensor sends a signal to ESP 8266 if a motion is detected and now this information is uploaded on the thinger.io cloud and it is notified in IFTTT which is the HTTP Endpoint configuration to thinger.io cloud.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132608648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Multi-Class Emotion Detection and Annotation in Malayalam Novels 马拉雅拉姆语小说中的多级情感探测与标注
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441492
R. Jayakrishnan, G. N. Gopal, M. S. Santhikrishna
{"title":"Multi-Class Emotion Detection and Annotation in Malayalam Novels","authors":"R. Jayakrishnan, G. N. Gopal, M. S. Santhikrishna","doi":"10.1109/ICCCI.2018.8441492","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441492","url":null,"abstract":"Sentiment analysis or opinion mining has been used widely in various applications like market analysis. Usually during sentiment detection the polarity of the sentiment either positive or negative is detected. Basically there are multiple classes of emotions and so emotion detection is different from sentiment analysis. Reading a novel for a visually impaired person with the help of a text to speech synthesizer is still a challenging task, since it was not possible to modulate the sound with respect to the emotion in the text or dialogue. Text to speech softwares can synthesize the speech signal to embrace the emotions if the emotion of that particular text was already annotated. Multi-Class emotion detection aims analyse different emotions hidden in the text data. Multi-class emotion classification in Indian languages was not experimented before. In this paper, an SVM classifier is used for sentence level multi-class emotion detection in Malayalam. The proposed approach uses different syntactic features such as n-gram, POS related, negation related, level related features etc, for better classification. The classifier classifies the Malayalam sentences into different emotion classes like happy, sad, anger, fear or normal etc. with level information such as high, low etc. It also states whether the sentence is dialogue, question or not for better hearing experience from a speech synthesiser while reading the novel.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122204156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信