2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)最新文献

筛选
英文 中文
A comparison of road network extraction from High Resolution Images 基于高分辨率图像的道路网提取方法比较
P. K. Soni, N. Rajpal, R. Mehta
{"title":"A comparison of road network extraction from High Resolution Images","authors":"P. K. Soni, N. Rajpal, R. Mehta","doi":"10.1109/ICSCCC.2018.8703276","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703276","url":null,"abstract":"Study related to high resolution remote sensing (RS) images has been applicable to many areas that are beneficial to us for information related to territory, public, weather and agriculture, the main aim of RS applications is extract appropriate information that will help us to draw meaningful conclusions. Road network extraction is an important and challenging research field, road networks are essential for humans as they provide transportation and other support systems. Distinct factors like sensor, weather, resolution and light etc., can affect the road features from a RS image which imposes the problems in road network extraction. This paper presents a comprehensive analysis of various aspects of road network extraction from RS images like road features, problems in road network extraction and finally different road network methods are classified on the basis of local and global features, automation and algorithm used. Different road extraction techniques are compared on the basis of features used in extraction, number and type of data (aerial, hyper-spectral, remote sensing, urban and semi-urban) used, performance on the basis of different qualitative parameters and the advantage and disadvantages of different methods are discussed. The comparative analysis of road extraction methods is presented emphatically and it is observable that in order to obtain precise road network from RS images only one type of feature is not sufficient. Hence, multiple road features should be combined together but it depends on type of application and data. Road network extraction from RS image is still remains a challenging and important research field.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134086254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of Potholes and Speed Breaker on Road 路面坑洼和减速机的检测
Gurpreet Singh, Rajeev Kumar, Poonam Kashtriya
{"title":"Detection of Potholes and Speed Breaker on Road","authors":"Gurpreet Singh, Rajeev Kumar, Poonam Kashtriya","doi":"10.1109/ICSCCC.2018.8703298","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703298","url":null,"abstract":"We proposed a pothole detection system to monitor road pavement. In this paper, we are focusing on earlier potholes detection systems that have been developed and introduces a worthwhile solution to recognize humps, potholes and speed breakers on road surface and give up-to-date signals to drivers to avoid vehicle damages or accidents, by giving him earlier warnings. To identify of humps, speed breaker and potholes, ultrasonic sensors are used and also to estimate their height and depth, respectively. In our proposed system, we are using global positioning system receiver (GPS receiver) for identification of geographical location coordinates of the detected potholes and speed breaker. The data which are sensed by the ultrasonic sensors includes geographical location, the height of speed breakers and depth of potholes, which is saved in the local and cloud database. This paper also considers updating the database on the regular basis so that potholes can be repaired regularly by concerned authorities.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131831013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Sentiment Analysis using tidytext package in R 使用R中的tidytext包进行情感分析
Priyavrat, N. Sharma
{"title":"Sentiment Analysis using tidytext package in R","authors":"Priyavrat, N. Sharma","doi":"10.1109/ICSCCC.2018.8703296","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703296","url":null,"abstract":"Sentiment analysis is all about finding polarity (positivity and negativity) of a given text which can be a single word, a single sentence, a single document and maybe a whole book, novel or magazine. In this paper, sentiment analysis of the harry potter series is done using “tidytext” package in R. The “tidytext” package includes three lexicons and this paper discusses sentiment analysis results encountered by them on same data. This study has analyzed results of all three lexicons for the harry potter series and found that overall sentiments of the harry potter series are negative on the basis of positive and negative words present in the series.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131095578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Critical Survey of Virtual Machine Migration Techniques in Cloud Computing 云计算中虚拟机迁移技术综述
Bhagyalakshmi, Deepti Malhotra
{"title":"A Critical Survey of Virtual Machine Migration Techniques in Cloud Computing","authors":"Bhagyalakshmi, Deepti Malhotra","doi":"10.1109/ICSCCC.2018.8703322","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703322","url":null,"abstract":"In Cloud Data Centers (CDC), virtualization is achieved by parallel processing of multiple virtual machines (VM) on a single cloud server, which has led to an exponential increase in the number of cloud users. With the help of live Virtual Machine Migrations (VMM), this ascending demand for resources like storage, communication and computing can be handled effectively. Different resource management strategies have been deployed to optimize the efficiency of cloud data centers through the migration of a single or multiple VMs. The establishment of numerous CDCs is a result of the aroused interest of users in cloud computing. This paper reviews state-of-the-art of virtual machine migration schemes while investigating the critical aspects of virtual machine migration schemes through a comprehensive analysis of the existing schemes. The objectives of existing VM migration schemes are highlighted through a set of parameters derived from the literature. Finally, some of the open research issues in the VM migration domain are highlighted","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127246560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Dynamic Hybrid Timeout Method to Secure Flow Tables Against DDoS Attacks in SDN 基于动态混合超时的SDN流表抗DDoS攻击保护方法
Balram Sooden, Mohammad Reza Abbasi
{"title":"A Dynamic Hybrid Timeout Method to Secure Flow Tables Against DDoS Attacks in SDN","authors":"Balram Sooden, Mohammad Reza Abbasi","doi":"10.1109/ICSCCC.2018.8703307","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703307","url":null,"abstract":"Distributed Denial of Service attacks are one of the major threats to network-based services today. Software Defined Networks (SDN) has the potential to evolve into a much more secure network paradigm than a traditional network as the whole network is controlled by a central controller having a complete view of the network. Being a considerably new concept, there are certain research problems related to SDN which are still needed to be addressed. Our work focuses on the collection of flow statistics to record the complete current and historical dynamics of the network by the controller to enable it to detect and prevent anomalous behavior in the network. Another research problem addressed in this paper is based on the Ternary Content Addressable Memory (TCAM) limitation of SDN based switches, which can be exploited with malicious hosts generating discrete network flows. To address this problem we propose the Dynamic Hybrid Timeout Method. It uses a blend of idle and hard timeout methods in addition to the Peer Support Strategy to enhance the durability of TCAM memory during flow table overloading DDoS attacks. The simulation results show that the Dynamic Hybrid Timeout Method enhances the performance of the Peer Support Strategy and adds durability in flow table memory utilization.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Survey on Internet of Things – Architecture, Applications, and Future Trends 物联网调查——架构、应用和未来趋势
Karandeep Kaur
{"title":"A Survey on Internet of Things – Architecture, Applications, and Future Trends","authors":"Karandeep Kaur","doi":"10.1109/ICSCCC.2018.8703341","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703341","url":null,"abstract":"Internet of things can be defined as things which are belonging to the internet. IOT is actually merging of internet with RFID’s, various sensors (like ambient, wearable) and smart objects (things) around us. Day by day billions of devices are expected to join the internet and acquire the state of `being connected’, which will process the data collected from different sensors and hence transmit the information collected so as to make meaningful decisions from them. In the upcoming years, IOT is expected to become main hub between technologies. IoT is the now a days has become a blessing but still is lacking due to many challenges. This paper presents an introduction on internet of things and discusses on the architecture, various application areas of it.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131008910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Security Vulnerabilities in Handover Authentication Mechanism of 5G Network 5G网络切换认证机制中的安全漏洞
Shubham Gupta, Balu L. Parne, N. Chaudhari
{"title":"Security Vulnerabilities in Handover Authentication Mechanism of 5G Network","authors":"Shubham Gupta, Balu L. Parne, N. Chaudhari","doi":"10.1109/ICSCCC.2018.8703355","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703355","url":null,"abstract":"The main objective of the Third Generation Partnership Project (3GPP) is to fulfill the increasing security demands of IoT-based applications with the evolution of Fifth Generation (5G) mobile telecommunication technology. In June 2018, the 3GPP has published the study report of the handover architecture and security functions of in 5G communication network. In this paper, we discuss the 5G handover key mechanism with its key hierarchy. In addition, the inter-gNB handover authentication mechanism in 5G communication network is analyzed and identify the security vulnerabilities such as false base-station attack, de-synchronization attack, key compromise, etc. In addition, the handover mechanism suffers from authentication complexity due to high signaling overhead. To overcome these problems, we recommend some countermeasures as pre-authentication of communication entities, delegation of authentication and predistribution of secret keys. This is first work in the 5G handover security analysis. We anticipate that the above security issues and key resilience problem can be avoided from the proposed solutions.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121296055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Movie Success Prediction using Machine Learning Algorithms and their Comparison 电影成功预测使用机器学习算法及其比较
Rijul Dhir, A. Raj
{"title":"Movie Success Prediction using Machine Learning Algorithms and their Comparison","authors":"Rijul Dhir, A. Raj","doi":"10.1109/ICSCCC.2018.8703320","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703320","url":null,"abstract":"The number of movies produced in the world is growing at an exponential rate and success rate of movie is of utmost importance since billions of dollars are invested in the making of each of these movies. In such a scenario, prior knowledge about the success or failure of a particular movie and what factor affect the movie success will benefit the production houses since these predictions will give them a fair idea of how to go about with the advertising and campaigning, which itself is an expensive affair altogether. So, the prediction of the success of a movie is very essential to the film industry. In this proposed research, we give our detailed analysis of the Internet Movie Database (IMDb) and predict the IMDb score. This database contains categorical and numerical information such as IMDb score, director, gross, budget and so on and so forth. This research proposes a way to predict how successful a movie will be prior to its arrival at the box office instead of listening to critics and others on whether a movie will be successful or not. The proposed research provides a quite efficient approach to predict IMDb score on IMDb Movie Dataset. We will try to unveil the important factors influencing the score of IMDb Movie Data. We have used different algorithms in the research work for analysis but among all Random forest gave the best prediction accuracy which is better in comparison to the previous studies. In the exploratory analysis we found that number of voted users, number of critics for reviews, number of Facebook likes, duration of the movie and gross collection of movie affect the IMDb score strongly. Drama and Biopic movies are best in genres.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126593544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Deep Neural Network for Transformation Zone Classification 变换区域分类的深度神经网络
Mamta Arora, Sanjeev Dhawan, Kulvinder Singh
{"title":"Deep Neural Network for Transformation Zone Classification","authors":"Mamta Arora, Sanjeev Dhawan, Kulvinder Singh","doi":"10.1109/ICSCCC.2018.8703327","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703327","url":null,"abstract":"The type of the treatment that a patient undergoes depends on the type of transformation zone of the cervix of patient. It is difficult to identify the thin line difference between the various types of transformation zones using naked eyes. The application of deep learning can help medical practitioners for identifying the type with confidence. The survival rate of cancer patient will be higher if the affected cervix is diagnosed early in pre-cancerous stage. In this paper we present our work in developing a ConvNet (Convolutional Neural Network) to classify the transformation zones using cervix images provided by Kaggle. Our proposed model uses fine tuned transfer learning approach. We suspect more image augmentation methods can help to improve the overall performance of the model.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"741 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122956930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Literature Survey on various Image Encryption & Steganography Techniques 各种图像加密与隐写技术的文献综述
Madhu Dahiya, Raman Kumar
{"title":"A Literature Survey on various Image Encryption & Steganography Techniques","authors":"Madhu Dahiya, Raman Kumar","doi":"10.1109/ICSCCC.2018.8703368","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703368","url":null,"abstract":"In the current world when entire web contains most of multimedia data then protection of that data is our major concern. Different techniques are discovered and developed from time to time to encrypt and decrypt the images for making them more secure. Most of the encryption technique uses secret key to prevent the data from an unauthorized access. In this paper, we study different research papers on various encryption and steganography techniques. Encryption and steganography techniques provides security of images from intruder.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117089827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信