2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)最新文献

筛选
英文 中文
Sentiment Analysis Approach Based on N-gram and KNN Classifier 基于N-gram和KNN分类器的情感分析方法
Sumandeep Kaur, Geeta Sikka, L. Awasthi
{"title":"Sentiment Analysis Approach Based on N-gram and KNN Classifier","authors":"Sumandeep Kaur, Geeta Sikka, L. Awasthi","doi":"10.1109/ICSCCC.2018.8703350","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703350","url":null,"abstract":"Sentiment analysis is the approach which is designed to analyze positive, negative and neutral aspects of any text unit. In the past years, many techniques were designed for the sentiment analysis of twitter data. Based on the previous study about sentiment analysis, a novel approach is presented in this research paper for the sentiment analysis of twitter data. The proposed approach is the combination of feature extraction and classification techniques. N-gram algorithm is applied for the feature extraction and KNN classifier is applied to classify input data into positive, negative and neutral classes. To validate the proposed system, performance is analyzed in terms of precision, recall and accuracy. The results of the experiment of proposed system show that it performs well as compared to the existing system which is based on SVM classifier.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129945569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Non-Saturated Heterogeneous Mobile Ad-hoc Network Throughput Analysis Considering Max Retry Limit and Max Contention Window Size 考虑最大重试限制和最大争用窗口大小的非饱和异构移动自组网吞吐量分析
Mukta, N. Gupta
{"title":"Non-Saturated Heterogeneous Mobile Ad-hoc Network Throughput Analysis Considering Max Retry Limit and Max Contention Window Size","authors":"Mukta, N. Gupta","doi":"10.1109/ICSCCC.2018.8703290","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703290","url":null,"abstract":"Performance analysis of IEEE 802.11 wireless ad-hoc networks had attracted lots of analytical researches since last decade. A lot of analytical models have been designed considering homogeneous conditions. In the current work, we developed a mathematical model for analyzing the system throughput based on Markov’s chain incorporating the limit on contention window size and packet drop after short retry limit get exhausted. The approach is designed for non-saturated heterogeneous conditions, however could be easily adapted for saturated networks by considering probability of at least one packet waiting for transmission at the start of counter decrement as 1. Simulations are carried out in network simulator and are compared with other existing analytical approaches. The experimental outcomes verify the contribution in terms of more accurate prediction of network behavior.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121413242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study of Data Deduplication Strategies 重复数据删除策略的比较研究
Nipun Chhabra, M. Bala
{"title":"A Comparative Study of Data Deduplication Strategies","authors":"Nipun Chhabra, M. Bala","doi":"10.1109/ICSCCC.2018.8703363","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703363","url":null,"abstract":"Data Deduplication is a new way of compressing data which is helpful in efficient use of storage space and proves to be a better technique to handle duplicate data. Deduplication allows unique data copy to be uploaded to the storage originally and successive copies are provided with connecting pointer to the authentic stored copy. In cloud computing, data privacy is a significant matter to be considered. This paper surveys the prevalent deduplication strategies and evaluates their methodologies. The survey thus conducted is organized in tabular form to bring out the crisp of progression in the deduplication and its types. We have observed during this survey that in deduplication, confidentiality of data is being compromised at many levels so, it paves a path for a more secure approach in data deduplication in cloud computing.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Second Order Statistics of SIR based Macro Diversity System for V2I Communications overComposite Fading Channels 基于SIR的V2I通信宏分集系统的二阶统计量
C. Stefanovic, S. Veljkovic, M. Stefanovic, S. Panic, S. Jovkovic
{"title":"Second Order Statistics of SIR based Macro Diversity System for V2I Communications overComposite Fading Channels","authors":"C. Stefanovic, S. Veljkovic, M. Stefanovic, S. Panic, S. Jovkovic","doi":"10.1109/ICSCCC.2018.8703293","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703293","url":null,"abstract":"The paper analyses second order statistics of macro selection combining (SC) diversity system for radio-frequency (RF) vehicle-to-infrastructure (V2I) communications over interference limited fading channels. In particular, the macro diversity (mac-div) reception is proposed in order to diminish the impact of the composite fading(multipath and shadowing). Novel, second order statistical infinite series expressions with fast convergence,such as level crossing rate, lcrand average duration of fades, afdareobtained, analyzed and graphically presented for different RFV2I sets of parameters.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126117055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Multiple Load Controllers for Industry Using Arm Cortex 使用Arm Cortex的工业多负载控制器
K. Kamble, Dipa N.Kokane, M. Ghute
{"title":"Multiple Load Controllers for Industry Using Arm Cortex","authors":"K. Kamble, Dipa N.Kokane, M. Ghute","doi":"10.1109/ICSCCC.2018.8703318","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703318","url":null,"abstract":"In the present power system for load management the end of user help to minimize peak demands on the utility infrastructure as well as better utilization of power plant capacity. In this project we used ARM CORTEX. The load demand at every instant first calculated and then compared with the permissible maximum load value, and when the instantaneous maximum demand value is inferior than the permission limit then the operation to be considered in equilibrium state, but when the of instantaneous value of maximum demand crosses the limits of controller, ARM CORTEX comes into the picture and control the load by the phenomena of load shedding based on the priority set by the user. Multiple Demand Controller is a device design to control and meet the need of power management in industry in a conscious manner although device are on standby mode consume power so in this case if corrective action is not taken the controller switches off non-essential loads in a logical sequence.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125973245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BNID: A Behavior-based Network Intrusion Detection at Network-Layer in Cloud Environment 基于行为的云环境下网络层入侵检测方法
K. Ghanshala, P. Mishra, R. Joshi, Sachin Sharma
{"title":"BNID: A Behavior-based Network Intrusion Detection at Network-Layer in Cloud Environment","authors":"K. Ghanshala, P. Mishra, R. Joshi, Sachin Sharma","doi":"10.1109/ICSCCC.2018.8703265","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703265","url":null,"abstract":"Security has become one of the crucial issues in today’s new technological environment such as cloud computing. In recent years, research work has been done to tackle various cloud security issues. This paper proposes a light weighted and adaptable intrusion detection approach named as Behavior-based Network Intrusion Detection (BNID) at network-layer in cloud.The behavior analysis of traffic is performed at Cloud Network Node (CNN) to detect the intrusions. A security framework is proposed for deployment of BNID in cloud. The need of placement of IDS in each and every tenant virtual machine (TVM) is eliminated. BNID uses statistical learning techniques with feature selection for traffic behavior analysis and does not require the extensive monitoring of memory writes. Information Technology Operations Center (ITOC) attack dataset is used to validate our approach. BNID achieves an accuracy of 98.88% with 1.57% false positives which seems to be promising.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126048993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Comparative Survey on Information Dissemination in Heterogeneous Vehicular Communication Networks 异构车载通信网络中信息传播的比较研究
Abhilasha Sharma, L. Awasthi
{"title":"A Comparative Survey on Information Dissemination in Heterogeneous Vehicular Communication Networks","authors":"Abhilasha Sharma, L. Awasthi","doi":"10.1109/ICSCCC.2018.8703294","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703294","url":null,"abstract":"The integration of affordable wireless communication devices to vehicles have been a key component to enhance road safety. The connected vehicles aim to provide intelligent communication amongst vehicles as well as vehicles and roadside units to enhance safety. A self-organizing network of connected vehicles is termed as Vehicular Ad-Hoc NETworks (VANETs). VANETs can significantly improve road safety by sharing critical information amongst vehicles. Information dissemination plays a critical role in vehicular communication for sharing time critical safety information. In this paper, we have provided a comparative analysis of information dissemination approaches for vehicular communication. Also, we have presented the issues related to the heterogeneous vehicular communication environment.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128255701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Encrypted Image based Reversible Data hiding using Invertible Image Conversion 基于加密图像的可逆数据隐藏使用可逆图像转换
Stanzin Namkha, Himansu Sekhar Pattanayak
{"title":"Encrypted Image based Reversible Data hiding using Invertible Image Conversion","authors":"Stanzin Namkha, Himansu Sekhar Pattanayak","doi":"10.1109/ICSCCC.2018.8703352","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703352","url":null,"abstract":"In recent years, with the growing recognition of cloud computing, data outsourcing has become a widely used service. Also, to preserve privacy and security of sensitive data, it is important to encrypt the data before outsourcing it to the cloud. Due to such requirements, reversible data hiding in encrypted image (RDH-EI) has received significant interest from the researchers. In this paper, a new technique for RDH- EI is suggested based on invertible image conversion unlike the conventional RDH-EI techniques. In this method, instead of generating and storing the encrypted image in unintelligible form (cipher formed image) which may easily attract the attention of intruders or hackers, it allows the user to convert the semantical content of original image into the semantical content of a freely selected target image of the same size. Image block mapping is performed between original and target images using mean absolute deviation and a compression technique is applied for reducing the information of image block position by grouping the blocks into two uneven proportion i.e. 0 or 1 based on the sorted mean absolute deviation value for both original and target image blocks respectively. Comparison with the existing techniques shows that the proposed method yields better results.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1050 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133588441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study of Various Wireless Network Monitoring Tools 各种无线网络监控工具的比较研究
Rajinder Singh, Satish Kumar
{"title":"A Comparative Study of Various Wireless Network Monitoring Tools","authors":"Rajinder Singh, Satish Kumar","doi":"10.1109/ICSCCC.2018.8703216","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703216","url":null,"abstract":"Nowadays wireless networks are growing very rapidly. Similarly, number of users which are using wireless network are also growing daily. With the development and popularity of the wireless network, it is important for the network administrators to keep the network efficient and smooth. It is very important to monitor the network traffic. Packet sniffer tools help in network monitoring and troubleshooting the network problems. At present a number of packet sniffer tools are available in the market. In this paper a number of wireless network monitoring tools are discussed. It focuses on basics of various wireless sniffer tools and their working under different operating environment. This paper also focuses on the capability of these tools to troubleshoot wireless network problems.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131316406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Predictive Analysis and Forecasting of S&P CNX NIFTY50 using Stochastic Models 基于随机模型的S&P CNX NIFTY50预测分析与预测
Himanshu Thapar, K. Shashvat
{"title":"Predictive Analysis and Forecasting of S&P CNX NIFTY50 using Stochastic Models","authors":"Himanshu Thapar, K. Shashvat","doi":"10.1109/ICSCCC.2018.8703331","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703331","url":null,"abstract":"Stock price prediction plays an important role in finance and economics which has encouraged the interest of researchers over the years to develop better predictive models. While looking at the share market structure which involves lots of risk, time series forecasting is an effective area of research. It provides with simple and faster computations for enormous amount of data. This manuscript focuses on forecasting future values for S & P CNX NIFTY 50 using its history indices (January 2008-December 2016). The statistical methods are used to forecast future values in advance. The findings after applying several models on the data and comparing the error values, the mean error of Exponential Smoothing Model (EST) is found to be having the least error values and have a better prediction rate.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133243437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信