{"title":"A Review on Attribute Based Encryption","authors":"Nikhil Chaudhari, Mohit Saini, Ashwin Kumar, Govindarajan Bhuvana Priya","doi":"10.1109/CICN.2016.81","DOIUrl":"https://doi.org/10.1109/CICN.2016.81","url":null,"abstract":"For the important reason of privacy, several cloud storage encryption schemas have been projected to secure the info from those that don't have access. All such schemes assume that cloud storage providers are secure and cannot be hacked. But in practice, some authorities could compel cloud storage suppliers to form public user secrets and confidential information. This paper presents an Attribute-Based access to the media within the cloud wherever it uses cipher-text policy Attribute-Based encryption (CP-ABE) technique to make associate access management assign a key to every user attribute and encrypts the info supported the appropriately distributed keys to a cloud is often encrypted corresponding system.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121106855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Communication Scheduling Algorithm for Distribution Network Based on Analysis of Business Characteristics","authors":"Kehe Wu, Guangxu Liu","doi":"10.1109/CICN.2016.10","DOIUrl":"https://doi.org/10.1109/CICN.2016.10","url":null,"abstract":"Based on the analysis of the data characteristics of typical business in distribution network, the data transmitted in the distribution communication network are classified. After studied the network scheduling algorithm based on the concept of \"window\", an improved dynamically time window sharing scheduling algorithm is proposed for distribution communication network. According to the differences of data types, the algorithm allocates time window and gives the corresponding constraint conditions, reduces the time delay of the data transmitted in the network effectively, and the feasibility of the algorithm is verified through simulation experiment. This algorithm has a certain reference significance for the study of the data characteristics and bandwidth allocation in distribution connection network.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127297841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Partially Coherent Beam Wireless Optical Communication System in a Turbulent Atmosphere Channel","authors":"Jun Wu, Lu Song","doi":"10.1109/CICN.2016.31","DOIUrl":"https://doi.org/10.1109/CICN.2016.31","url":null,"abstract":"As communication carrier in Gamma-Gamma atmospheric turbulence, the average bit error rate, outage probability and average channel capacity of the wireless optical communication system with partially coherent beam are analyzed in this paper. The performance parameters of optical communication system in the atmospheric channel are analyzed by the analytic expression of the coherent parameters of partially coherent beams. Numerical simulation shows that the atmospheric communication is carried out by partially coherent light under the same conditions of atmospheric turbulence and transmission distance. With the decrease of the spatial coherence length of partially coherent light, the bit error rate (BER) and outage probability of the system are gradually reduced, at the same time, the average channel capacity of the system increases with the decrease of the coherence length of the beam.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114517868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Register Alignment of Data Processing in Mesochronous Scheme","authors":"K. Sukanya, G. Laxminarayana","doi":"10.1109/CICN.2016.122","DOIUrl":"https://doi.org/10.1109/CICN.2016.122","url":null,"abstract":"This paper present an optimal register alignment for minimization of clock switching scheme in Mesochronous operation. In Mesochronous operation, data are processed in one or more processing clocks based on executing instructions. In this scheme, a delayed clock pulse is allotted for each instruction in the processing unit. Due to different clock frequencies for different instructions, the overhead of clock allocation is large. The conventional models derive the clock delay per cycle, building a large overhead in Mesochronous operation. This overhead is reduced, by a register alignment logic, where the redundancy of instructions are realigned in a clock Look Up Table (LUT), and an instruction index alignment is proposed to minimize the switching overhead of clock allocation for Mesochronous operation. The simulation results obtained illustrates the efficiency in clock saving in comparison to conventional clock allocation logic.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124764253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malicious Node Detection on Vehicular Ad-Hoc Network Using Dempster Shafer Theory for Denial of Services Attack","authors":"Neha Kushwah, Abhilash Sonker","doi":"10.1109/CICN.2016.91","DOIUrl":"https://doi.org/10.1109/CICN.2016.91","url":null,"abstract":"VANET is the network which monitoring the traffic on the road and share the information with neighbors. Movable nodes (vehicle) and fixed node (RSU) are used in VANET. This network is about the safety purpose of driver and sharing confidential information about traffic and accident. On network some vehicles do not share information, send fake requests and try to break network security. Lots of techniques are present here, to overcome by these attacks. Overcome by these issues we give artificial neural network based technique in which we used self-organized map. For trained our network, we use trace file, and these trace file work as input to self-organized map so that we provide supervised learning to our network. In this paper those malicious vehicles have been identified. We used SOM classifier for the detection of misbehavior node. In this classification the group of malicious nodes being created and for the improvement the use of Dempster-Shafer theory for finding attacker node is applied.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123961482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficiency Model of Parallel Transmission in Heterogeneous Networks","authors":"Zhenyu Wang, Yang Tao, F. Zhao, Jiacheng Li","doi":"10.1109/CICN.2016.20","DOIUrl":"https://doi.org/10.1109/CICN.2016.20","url":null,"abstract":"For the problem that the throughput is improved in the scene of the MUE (Multi-mode Users Equipment) Parallel transmitting high speed downlink service, but also brings a substantial increase in energy consumption. This paper proposes a multi network parallel transmission model, which through the analysis of the current research on multi network parallel transmission of energy saving ideas, defines two core contents of the energy efficiency model for parallel transmission of heterogeneous networks: optimal transmission rate allocation and network ranking and access decision rules. The specific idea is to make the ranking of all access network based on network resources in heterogeneous network. And according to the MUE service transmission requirements to decide which network needs to be selected for parallel transmission. Then getting the optimal allocation transmission rate of each bearing network, and the selected network provides downstream services for MUE according to the allocated rate to reduce energy consumption. Finally, the effectiveness of the improved model is verified by Matlab simulation analysis.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121207679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Generalized Predictive Control Based on Just-in-Time Learning in Latent Space","authors":"Zhang Rangwen, Tian Xue-min, Wang Ping","doi":"10.1109/CICN.2016.97","DOIUrl":"https://doi.org/10.1109/CICN.2016.97","url":null,"abstract":"An adaptive generalized predictive control approach based on just-in-time learning(JITL) in latent space is proposed to deal with the problems associating with multivariate, nonlinearity and time-varying characteristics in industrial process systems. To begin with, the latent variable space is constructed by the partial least squares algorithm, thus the complicated multivariable control problem can be decomposed into univariate ones, subsequently the local model of each SISO subsystem can be established online by JITL at every sampling instant in latent space, where the generalized predictive control is implemented to these subsystems. To improve the real-time performance of modeling, the similarity measure will be utilized to determine whether or not to update the current local model at each sampling instant. The proposed approach not only can obtain the satisfactory control results for nonlinear and multivariate system, but also can solve the unstable problem caused by model mismatch. The proposed adaptive predictive control approach is applied to a pH neutralization process. Simulation studies are presented to verify the advantage of the proposed approach.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114876602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low Latency Based Efficient Aggregation Scheduling in Multihop Wireless Sensor Network","authors":"Bhavna Bundel, V. Menaria","doi":"10.1109/CICN.2016.30","DOIUrl":"https://doi.org/10.1109/CICN.2016.30","url":null,"abstract":"In the Wireless sensor network small size based and low power sensor nodes spreads over a complete geographical area which is connected to each other for performing or control the applications. Every application requires a control center which collects the aggregates data from all sensor nodes. Data aggregation is used for compress data and also for power saving which gives time efficient method for collect the data. Wireless interface is also the main reason for delay in wireless sensor network. In this paper, we present two delay efficient algorithms, CIAS(Compressive Improved Aggregation Scheduling Algorithm), CDAS(Compressive Distributed Aggregation Scheduling Algorithm). CIAS and CDAS will be able to reduce the delay for wireless sensor network which is introducing by wireless interface. CIAS and CDAS algorithms provide collision-free links for data aggregation. In the results, we prove that latency or delay for the proposed algorithms(CIAS / CDAS) is low as compare to DAS, IAS.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124099823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Fusion Methods and Comparisons Based on Various Metrics","authors":"V. Shandilya, S. Ladhake","doi":"10.1109/CICN.2016.63","DOIUrl":"https://doi.org/10.1109/CICN.2016.63","url":null,"abstract":"With the increase in the development of sensing technology and sensing devices, more and more data are getting available to the user hence increasing the human workload to greater extent. It becomes difficult for human operator to simultaneously operate, analyze and interpret information from multiple images. It leads to the need of image fusion techniques. In this research paper, we have considered multi-focal images as source input images and three methods of fusion, Weighted Average, PCA, and the hybrid proposed method. The methods are evaluated using various evaluation metrics. Study shows us that proposed fusion method gives better result compare to other methods studied. A good fusion is the one which produces output fusion result with maximum spectral detail. Spatial resolution is equally important in the output fused result than available with any single source image.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132491625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Unknown Input Full Order Observer Design Using g-Inverse and Comparison with O'Reilly Observer","authors":"S. Mitra, S. Dutta, Amit Agarwal","doi":"10.1109/CICN.2016.128","DOIUrl":"https://doi.org/10.1109/CICN.2016.128","url":null,"abstract":"In this paper simpler and step by step procedure for the construction of unknown input full order observer is developed based on the concept of generalized matrix inverse. This unknown input observer is simpler in structure, computationally less complex and does not presuppose the observer structure. Condition of existence is derived. The simulation results are included. Moreover, in this paper a detailed comparative analysis between full order unknown input O'Reilly observer and the method developed in this paper is carried out based on structure and performance.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130111019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}