{"title":"Comparative Analysis of Multi-label Classification Algorithms","authors":"Seema Sharma, D. Mehrotra","doi":"10.1109/ICSCCC.2018.8703285","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703285","url":null,"abstract":"Multi-label classification has generated enthusiasm in many fields over the last few years. It allows the classifications of dataset where each instance can be associated with one or more label. It has successfully ended up being superiorstrategy as compared to Single labelclassification. In this paper, we provide an overview of multi-label classification approaches. We also discussed the various tools thatutilizes MLC approaches. Lastly, we have presented an experimental study to compare different algorithms of multi-label classification. After applying and studying the accuracies of various multilabel classification techniques, we have found that performance of Random Forest is better than the rest of the other compared multilabelclassification algorithms with 96% accuracy.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124794227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"To Alleviate The Flooding Attack and Intensify Efficiency in MANET","authors":"Mintu, Gursharan Singh, Pooja Gupta","doi":"10.1109/ICSCCC.2018.8703283","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703283","url":null,"abstract":"The portable Ad-hoc network is simply the decentralized and arranging kind of system in which versatile hubs join or leave the system whenever. Because of decentralized nature of the network security, routing and quality of service are the three noteworthy issues. To establish the path from source to destination reactive routing protocol can be implemented. The AODV is the reactive routing protocol in which source hub flood route request packets in the network. The hubs which are adjoining goal will react back to the route replay packets. The way which has minimum hop count and maximum sequence number will be choosen as the best way from source to goal. The versatile hubs can join or leave the system and at some point, malevolent hubs enter the system, which is dependable to trigger different active and passive attacks. The flooding assault is the active kind of assault in which malevolent hubs send raw packets on the channel. Because of this, channel gets over-burden and packet-loss may happen inside the system. This prompts lessening in network throughput and increment network packet-loss. In this research, the technique of advanced monitor mode will be proposed which detects and isolates malicious nodes from the network which are responsible to trigger flooding attack.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114428166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICSCCC 2018 Committee and Message","authors":"","doi":"10.1109/icsccc.2018.8703367","DOIUrl":"https://doi.org/10.1109/icsccc.2018.8703367","url":null,"abstract":"","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129502865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android Controlled Wheelchair","authors":"Beverlly Borges, A. Chandra, Rakhi Kalantri, Shubham Gupta, Gavin Dsilva, Shagufta Rajguru","doi":"10.1109/ICSCCC.2018.8703345","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703345","url":null,"abstract":"A wide spread in the count of people’s temporary or permanent disabilities led to an increase in the demand for wheelchairs. Wheelchairs are used by the people who cannot walk due to physical illness, injury or other disability. Now-a-days development promises a wide scope in developing smart wheelchair. Wheelchair now comes in diverse selection of styles which makes it exceedingly difficult for a person to select one that properly fits their lifestyle. Our project is to implement a home navigation system, which comprises of a wheelchair which will be monitored using an android phone. Android phones being easily accessible to every household, our project will focus to operate the wheelchair that works on the inputs such as voice, touch and gesture via an android phone and navigates according to the commands provided. It is common that the elders and physically challenged people find it hard to move the wheelchair without external aid. By making use of HNS, elderly and the physically challenged can move to different location in a house just by pronouncing the direction name or by making the movement on the android phones or just by selecting the move direction they will be provided with. This will be a boon for many disabled people to operate the wheelchair on their own.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131217416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical Layer Security Approaches in 5G Wireless Communication Networks","authors":"Pooja Singh, Praveen Pawar, A. Trivedi","doi":"10.1109/ICSCCC.2018.8703344","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703344","url":null,"abstract":"Rapid growth in the fifth generation (5G) wireless network applications demands new requirements on the data storage, computation, and networking. Thus, it will introduce new threats to the integrity, availability, and confidentiality. 5G is advantageous concerning high data rate, low latency, energy and spectrum efficient, higher capacity, and reliable connectivity. Currently, safeguarding information in the 5G wireless networks is the pivotal issue for research. In this paper, the importance of Physical Layer Security (PLS) for secure transmission of information in wireless networks are discussed. Some popular 5G technologies are studied in the context of security during transmission. With all this, significant issues and challenges are identified in the implementation of new technologies into reality. These technologies are mobile-health (m-health), cognitive radio networks (CRNs), constructive interference, massive multiple input multiple output (massive MIMO), non-orthogonal multiple access (NOMA) and simultaneous wireless information and power transfer (SWIPT). Future challenges and direction for the further study of such technologies are also given. Moreover, one numerical result is presented for the spectral efficiency in MIMO communication system.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129145338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Recovery in Moveable Wireless Sensor Networks","authors":"Pankaj Kumar, Lokesh Chouhan","doi":"10.1109/ICSCCC.2018.8703214","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703214","url":null,"abstract":"In wireless sensor network (WSN) nodes relay data, which maintains consistency in the sensor network. If cut vertex nodes failed it leads to partitioning in network, which disrupts the communication. It requires an autonomous technique that finds the fail node and provides recovery to them. In this paper the proposed approach provides recovery from network partitioning in distribute WSN. The proposed approach increases the lifetime of network.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132689745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Algorithm for Computing Efficiently in Cloud Based Data Centers","authors":"I. Shah","doi":"10.1109/ICSCCC.2018.8703299","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703299","url":null,"abstract":"Cloud computing has shifted the paradigm when it comes to handling our data. We are no more restricted to our standalone systems and can now access our data on the go. All the big companies like Google, Amazon et al have shifted their business on the cloud and are now offering their customers a new lease of life. However, with this ease come several challenges which have drawn the attention of people be it cryptographers, scientists or from business fraternity round the globe. Two main issues that one can relate to cloud computing is security and energy consumption. The aim of this paper is to address the energy concern in cloud data center. It would not be an aberration to say that cloud computing is at odds with the interests of the company when it comes to the financial aspect. If we go by stats, nearly 5% of the world’s total energy is being consumed by these data centers as their energy requirements are huge owing to services like PaaS, Iaas, SaaS.In this paper, an algorithm is proposed for minimizing the energy consumption of a typical data center catering to the need of cloud users. By modeling the incoming workload of a data center based on this approach, it can be proved that considerable savings in energy can be achieved","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133746425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simarjot Kaur Randhawa, R. K. Sunkaria, Anterpreet Kaur Bedi
{"title":"Prediction of Liver Cirrhosis Using Weighted Fisher Discriminant Ratio Algorithm","authors":"Simarjot Kaur Randhawa, R. K. Sunkaria, Anterpreet Kaur Bedi","doi":"10.1109/ICSCCC.2018.8703204","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703204","url":null,"abstract":"Liver diseases are one of the significant public health issues in present scenario. Liver cirrhosis is one of the leading causes of deaths due to liver related diseases. In this work, classification of normal and cirrhotic liver is done using texture analysis. Various texture features are extracted for classification. Out of all the extracted features, seven best features are identified using fisher discriminant ratio. Further, weighted fisher discriminant ratio algorithm is designed using the selected features, such that maximum accuracy and sensitivity is achieved.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison on Generative Adversarial Networks –A Study","authors":"Akanksha Sharma, N. Jindal, A. Thakur","doi":"10.1109/ICSCCC.2018.8703267","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703267","url":null,"abstract":"Various new deep learning models have been invented, among which generative adversarial networks have gained exceptional prominence in last four years due to its property of image synthesis. GANs have been utilized in diverse fields ranging from conventional areas like image processing, biomedical signal processing, remote sensing, video generation to even off beat areas like sound and music generation. In this paper, we provide an overview of GANs along with its comparison with other networks, as well as different versions of Generative Adversarial Networks.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124189781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural based Energy-Efficient Stable Clustering for Multilevel Heterogeneous WSNs","authors":"Akshay Verma, Rajkrishna Mondal, Prateek Gupta, Arvind Kumar","doi":"10.1109/ICSCCC.2018.8703353","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703353","url":null,"abstract":"This paper presents a Neural based Energy-Efficient Stable Clustering (NESC) for Multilevel Heterogeneous wireless sensor networks (MHWSNs). In NESC protocol, the sensor nodes are selected as cluster heads (CHs) by employing the multi-layer back propagation model of neural network. The training of neurons is done on the basis of normalized energy and distance factors which helps in the selection of proper CHs which increases the network lifetime, throughput and reliability. Simulation results justified that NESC protocol achieves better network performance in terms of network lifetime, energy consumption, and throughput than existing routing protocols (i.e., LEACH, SEP, DEEC, and EDCS) for MHWSNs.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127767363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}