2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)最新文献

筛选
英文 中文
An efficient scheme based on DLP and RSA for proxy Group signature 一种基于DLP和RSA的高效代理组签名方案
Bhavesh Nakum, U. Desai
{"title":"An efficient scheme based on DLP and RSA for proxy Group signature","authors":"Bhavesh Nakum, U. Desai","doi":"10.1109/ICAETR.2014.7012827","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012827","url":null,"abstract":"In the proxy signature scheme, the capability of anonymous proxy is request for protecting the proxy signer's privacy. In the Group signature, when the signer has been identified, the group authority needs not to redistribute any of the keys of this signer and the resulting signature does not reveal the identity of the signer. In This Scheme, Introduces a concept and model of proxy group signature and constructs a proxy group signature scheme based on Discrete Logarithm Problem and RSA. This scheme has the property of hiding the identity of the signer in the signature. The signer's identity can be open by a manager when the dispute or problem creates, so it is a new anonymous proxy signature scheme. The analysis of security shows that the scheme satisfies the security requirements or properties.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121713234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and implementation of real time image inspection system 实时图像检测系统的设计与实现
P. Tiwari
{"title":"Design and implementation of real time image inspection system","authors":"P. Tiwari","doi":"10.1109/ICAETR.2014.7012897","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012897","url":null,"abstract":"With the rapid development of the embedded system, semiconductor technology and Image processing, the embedded Image processing has found widespread acceptance in mobile applications like video streaming, smart cameras, target tracking, vehicle navigation, smart traffic light systems and Biometrics. The implementation of image processing algorithms is computationally intensive and resource exhaustive. The system engineer has a mandate to optimize these algorithms so as to meet real time deadlines on an embedded processor. The designed system implements different real time image processing algorithms such as LPF, HPF, Threshoding, Template Matching on WINDOWS-XP and verified on WINDOWS 7 using Microsoft Visual Studio IDE VC++, further algorithms are implemented on Linux real time operating system(RTOS). The system uses the code optimization method to improve execution time for Viola Jones face detection algorithm. The design and implementation of real time image inspection system is based on the BeagleBoard-xM, a low cost ARM processor. This approach reduces size, efficiency, cost, time and power consumption etc. for Industrial control system based on real time image inspection system.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132323307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of gold and silver stock price using ensemble models 用集合模型预测金银股票价格
P. Mahato, V. Attar
{"title":"Prediction of gold and silver stock price using ensemble models","authors":"P. Mahato, V. Attar","doi":"10.1109/ICAETR.2014.7012821","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012821","url":null,"abstract":"Gold price prediction is a complex problem due to its non-linearity and dynamic time series behavior, constrained with many factors like economic, financial etc. Due to its high degree of monetary rewards and understanding the hidden pattern behind stock prediction researchers have proposed many statistical and machine learning algorithms for stock prediction. In this paper we examine different ensemble models for determining the future momentum of the gold and silver stock price, whether it will increase or decrease for the following relative to current days stock price. Using stacking approach we got significant accuracy of 85 % for predicting gold stock and 79 % for silver stock using a hybrid bagging ensemble.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130947569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
“Feature level fusion of palm print and fingerprint modalities using Discrete Cosine Transform” 基于离散余弦变换的掌纹和指纹特征级融合
Aditya Gupta, Ekjok Walia, Mahesh Vaidya
{"title":"“Feature level fusion of palm print and fingerprint modalities using Discrete Cosine Transform”","authors":"Aditya Gupta, Ekjok Walia, Mahesh Vaidya","doi":"10.1109/ICAETR.2014.7012799","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012799","url":null,"abstract":"Biometric systems have become a major part of research due its application of identification. Paper proposes a multimodal biometric system using palm prints modality combined with fingerprint modality. The proposed methodology uses standard deviation of pre-defined block of DCT coefficient as feature vector. Recognition process is being done by performing distance measurement between feature vector of testing and training data set. Results show that the False Acceptance Rate (FAR) of feature level fusion is less than that of uni-modal systems, hence having multimodality is advantageous. Testing and training is done on database of 150 students of College of Engineering Pune.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132578662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel DNA sequence dictionary method for securing data in DNA using spiral approach and framework of DNA cryptography 一种利用螺旋方法和DNA密码学框架保护DNA数据的DNA序列字典新方法
Shipra Jain, Vishal Bhatnagar
{"title":"A novel DNA sequence dictionary method for securing data in DNA using spiral approach and framework of DNA cryptography","authors":"Shipra Jain, Vishal Bhatnagar","doi":"10.1109/ICAETR.2014.7012924","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012924","url":null,"abstract":"DNA cryptography is a new branch of information security. It encrypts the information in the form of DNA nucleotides (A, T, G and C). It makes use of the vast storage capacity of DNA and its biological properties like highly stable molecule, durability, cost effective and easily available. DNA cryptography is a combination of biological and computer science domain. The researcher of this field must have the knowledge of DNA, computer science and information security methods. This paper provides the framework for DNA cryptography and it also provides the summarized information of algorithms used for providing security to the data stored in DNA. In this paper, authors propose a new method for providing security to the data in the form of DNA sequence. The proposed method provides security at the two level using spiral transposition and DNA sequence dictionary table.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124155277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Enhanced security scheme against Jamming attack in Mobile Ad hoc Network 移动自组网中抗干扰攻击的增强安全方案
Priyanka Sharma, Anil Suryawanshi
{"title":"Enhanced security scheme against Jamming attack in Mobile Ad hoc Network","authors":"Priyanka Sharma, Anil Suryawanshi","doi":"10.1109/ICAETR.2014.7012891","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012891","url":null,"abstract":"Security is the one of the major concerns in Mobile Ad hoc Network (MANET). Due to its unique infrastructure, it creates a number of consequential challenges to the security design. There is a need to make a decent tradeoff between security and performance. In mobile ad hoc networks where the network topology animatedly changes traditional security methods cannot be applied efficiently. Different security schemes against attack improves the performance of network even in the presence of attacker and tries to disable misbehavior activity. In this paper we have proposed an enhanced security scheme against jamming attack with AOMDV routing protocol. The jamming attacker delivers huge amount of unauthorized packets in the network and as a result network gets congested. The proposed scheme identifies the jamming attacker and blocks its activities by identifying the infected or unauthorized packets in network. Multipath routing protocol AOMDV is used to improve the network performance but there is a condition that jamming phase occurs naturally and is not achieved by attacker intentionally. In presence of attacker security scheme always provides the secure path and through multipath routing the possibility of secure routing is enhanced. Simulation results and PDR (Packet Delivery Ratio) values of each node clearly shows better network performance in case of security scheme in presence of Jamming attack.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114973497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi antenna techniques for the enhancement of mobile wireless systems: Challenges and opportunities 增强移动无线系统的多天线技术:挑战与机遇
Rachna, J. Malhotra
{"title":"Multi antenna techniques for the enhancement of mobile wireless systems: Challenges and opportunities","authors":"Rachna, J. Malhotra","doi":"10.1109/ICAETR.2014.7012900","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012900","url":null,"abstract":"This paper surveys critical developments in the field of multi antenna based wireless communication systems. After demonstrating the multi antenna techniques, the performances of various standards of wireless communications using multiple antennas are discussed to study the gap between the theoretical and practical limits in the technology. The recent advances using multiuser MIMO (MU-MIMO) and VMIMO and the further challenges in these technologies are also highlighted in this paper.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125942030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Power quality analysis of shunt active power filter based on renewable energy source 基于可再生能源的并联有源电力滤波器电能质量分析
Anand Singh, P. Baredar
{"title":"Power quality analysis of shunt active power filter based on renewable energy source","authors":"Anand Singh, P. Baredar","doi":"10.1109/ICAETR.2014.7012836","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012836","url":null,"abstract":"Electrical power provides feeds different kind of linear and non-linear loads in commercial and manufacturing applications. The electronics loads produce harmonics and reactive power related problems in the electrical utility systems. The power quality disturbance just like harmonic and reactive power cause poor power factor and distort the source voltage at the consumer service end. In this work, we propose a solution to eliminate the current harmonics introduced by the nonlinear loads, used shunt active power filter supplied by a renewable energy source. The shunt active power filter shows a strong vitality in eliminating harmonics and reactive power, which has received extensive concern in power electronic filed. Most of the using shunt active power filters are based on voltage source inverter. The DC-link voltage of inverter must be kept stable in order that SAPF can compensate harmonics and reactive power effectively. In this paper we developed MATLAB® Simulink model of a typical power distribution system with a nonlinear load and shunt active power filter is carried out and the results are presented which imply a better dynamic performance of the proposed scheme to the conventional PI controller.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129323974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Analysis and classification of SQL injection vulnerabilities and attacks on web applications web应用中SQL注入漏洞和攻击的分析与分类
Chandershekhar Sharma, S. C. Jain
{"title":"Analysis and classification of SQL injection vulnerabilities and attacks on web applications","authors":"Chandershekhar Sharma, S. C. Jain","doi":"10.1109/ICAETR.2014.7012815","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012815","url":null,"abstract":"Web applications interact with the back-end database to retrieve data as and when requested by the user. Web applications (Like e-commerce, banking, shopping, trading, blogs etc.) are the backbone of today's online business industry. For activities like paying of bills & merchandize information must be kept safe with these web applications but unfortunately there is no guarantee of integrity and confidentially of information. The global exposure of these applications makes them prone to the attacks because of presence of vulnerabilities. These security vulnerabilities continue to infect the web applications through injection attacks. SQL injection attacks (SQLIA's) are one of the top most threat in database centric web application and SQL injections vulnerabilities(SQLIV's) are the most serious Vulnerability types.SQLIA allows the attacker to gain control over the database of an application resulting in financial fraud, Leak of confidential data, network hacking, deleting database, theft and many more to count. In this paper we have discussed the classification of SQL injection attacks and also analysis is done on basis of risk associated with each attack.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"34 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131738866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Gerschgorin theorem based stability analysis of chemical process 基于Gerschgorin定理的化学过程稳定性分析
Nikhil Pachauri, A. Rani
{"title":"Gerschgorin theorem based stability analysis of chemical process","authors":"Nikhil Pachauri, A. Rani","doi":"10.1109/ICAETR.2014.7012849","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012849","url":null,"abstract":"The stability analysis of a chemical process is an important aspect at the design stage. In the present work stability of a distillation process is evaluated based on the location of Gerschgorin bounds. The Gerschgorin theorem is used to evaluate the bounds of the system. Two variants of Gerschgorin theorem i.e. Gerschgorin theorem with Bisection method and Gerschgorin theorem with Lyapunov method are considered. It is observed that the applied methods are more efficient than the conventional methods.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123342607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信