{"title":"Enabled security based on elliptic curve cryptography with optimal resource allocation schema in cloud computing environment","authors":"N. Nagalakshmi, S. Rajalakshmi","doi":"10.1109/NCCCIS.2015.7295903","DOIUrl":"https://doi.org/10.1109/NCCCIS.2015.7295903","url":null,"abstract":"Cloud computing is a new style of computing in which dynamically scalable and often virtualized resources are provided as service over internet. Resource procurement of cloud resources is an interesting and yet unexplored area in cloud computing, to automates the selection of resources for cloud vendor becomes a challenging issue in recent years. This problem is solve by using three novel mechanism for cloud vendor with resource procurement: cloud-dominant strategy incentive compatible (C-DSIC), cloud-Bayesian incentive compatible (C-BIC), and cloud optimal (C-OPT). In C-OPT modules, where the resource allocation is performed based host winner value, the major issue of the work is that authentication is performed for each cloud user. To solve security issue problem in the cloud resource procurement approach, in this work introduce a novel expectation maximization (EM) algorithm for cloud optimal modules resources. The proposed EM methods are used for finding maximum likelihood depends on unobserved latent cloud resource variables for virtual cost and quality of service constraints. To authenticate the cloud user data, cryptography method is introduced in this proposed work. The proposed cryptographic method follows the procedure of Elliptic curve cryptography for authenticating users and cloud vendors. Key values between the cloud user and cloud vendors are exchanged. Each and every key is verified by both cloud user and cloud vendor. If the key value anyone becomes wrong the resource Procurement is not allocated to cloud user, since these users becomes unauthenticated user, there are not allowed to performed resource Procurement process. A cloud broker with such a procurement module enables users to automate the choice of a cloud vendor. Our experiments indicate that the resource procurement cost decrease by calculation of the expectation maximization algorithm and more security than the existing COPT methods by using the elliptic curve cryptography with increase in number of cloud vendors irrespective of the mechanisms.","PeriodicalId":201980,"journal":{"name":"2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114415005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sujitha, M. L. Priya, J. Premaladha, K. S. Ravichandran
{"title":"A combined segmentation approach for melanoma skin cancer diagnosis","authors":"S. Sujitha, M. L. Priya, J. Premaladha, K. S. Ravichandran","doi":"10.1109/NCCCIS.2015.7295900","DOIUrl":"https://doi.org/10.1109/NCCCIS.2015.7295900","url":null,"abstract":"This paper illustrates the methodology for melanoma diagnosis, a deadly skin cancer using computer aided image processing techniques. Here, the combination of Median filtering and Karhunen-Loeve transform are used in preprocessing part and also a combination of Active contours and Watershed Transformation algorithms are used in Segmentation process. When this combined method is applied on skin lesion images, the problems like over smoothing and over segmentation were solved.","PeriodicalId":201980,"journal":{"name":"2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123312045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ganesan P, K. Palanivel, B. Sathish, V. Kalist, K. Basha, Shaik
{"title":"Performance of fuzzy based clustering algorithms for the segmentation of satellite images — A comparative study","authors":"Ganesan P, K. Palanivel, B. Sathish, V. Kalist, K. Basha, Shaik","doi":"10.1109/NCCCIS.2015.7295906","DOIUrl":"https://doi.org/10.1109/NCCCIS.2015.7295906","url":null,"abstract":"Segmentation is the process of partitioning or classifying an image into some meaningful classes or clusters or segments. The segmentation process based on any one characteristics of the image such as texture, color or intensity. The images received from the satellite contains huge amount of information to process and analyze. It is possible to extract the or identify the object or regions of interest in the image from the segmentation results. The segmentation process is very useful to the subsequent image analysis. Many approaches have been proposed for the segmentation of satellite images, but fuzzy based approaches are most popular and widely used because they have a good performance in a large class of images. In this paper, the fuzzy based clustering approaches Fuzzy-C-Means (FCM) Clustering, Possibilistic C Means (PCM) and Possibilistic Fuzzy C Means (PFCM) are compared and the performance of these algorithms were tested with number of satellite images.","PeriodicalId":201980,"journal":{"name":"2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133415404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of dynamic resistance against malicious attacks & collusion through enhanced authentication schemes in application to smartcard","authors":"G. Rohith, M. Bhuvaneswari, S. Kannaki","doi":"10.1109/NCCCIS.2015.7295905","DOIUrl":"https://doi.org/10.1109/NCCCIS.2015.7295905","url":null,"abstract":"Smart card accelerates and harmonizes the usage in development of day to day activities. The message authentication during the transaction with valid digit codes prevails in systematic higher end secured level of authentication. However, several message authentication schemes have been experimented to protect messages but these authentication schemes have the limitations of high computational and communication overhead, lack of scalability, resilience to node compromise attacks and threshold problem. The enhanced resistance against collusion and malicious attacks on wireless sensor network is presented in this paper. Conventional methods experimented to mitigate the false data and observe the system behavior at the cost of decrease in efficiency. In this paper, a novel filtering system and interleaved hop-by-hop authentication system is developed that effectively localize the mitigation of injected false data. Design of filtering system is tested with well known bench mark of false data mitigation created by the user. Quantitative analysis is performed to enrich the efficiency of the designed system. Furthermore, this approach envisages for the identification of malicious attacks, false packet detection and removal effectively by this authentication scheme which delivers higher order of security.","PeriodicalId":201980,"journal":{"name":"2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127483092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of 2.4GHz patch antennae for WLAN applications","authors":"M. Karthick","doi":"10.1109/NCCCIS.2015.7295902","DOIUrl":"https://doi.org/10.1109/NCCCIS.2015.7295902","url":null,"abstract":"In this letter, a simple microstrip patch antenna is designed for Wireless Local Area Network (WLAN) applications in IEEE 802.11b/g/n are presented. WLAN is most commonly used wireless distribution standard for short distance network communication. This paper describes a high-gain; single band microstrip antenna is printed on FR-4 substrate and has dimensions of 29.2 × 29.2 × 1.6mm3 with a ground plane. The proposed patch antenna design covers 2.4GHz frequency range with the return loss of -39.008dB. The simulation has been done through ADS 2014. And the designed antenna deliberates excellent performance and a great solution for WLAN applications.","PeriodicalId":201980,"journal":{"name":"2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133659334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amit Goyal, Francesco Bonchi, Reihaneh Rabbany Khorasgani, Lars Backstrom, Dan Huttenlocher
{"title":"Identification of prominent Leaders and analysis of their influence in online social networks","authors":"Amit Goyal, Francesco Bonchi, Reihaneh Rabbany Khorasgani, Lars Backstrom, Dan Huttenlocher","doi":"10.1109/NCCCIS.2015.7295904","DOIUrl":"https://doi.org/10.1109/NCCCIS.2015.7295904","url":null,"abstract":"Human life is diffused by Social networks(SNs): persons interrelate, influence and are influenced by their confrères. With the advent of WWW, the amount of information accessible on SNs is gigantic, allowing the eminent exploration of data. Social network analysis(SNA) has been achieving consideration from divergent areas like anthropology, biology, psychology, economics. The swift upsurge of the online SN sites and their publicly obtainable data attaining API's has crystallized the prosperity of SNA research. Tracing potent users and their influence is one of the trendiest topics of SNA. Contemporary exploration of associations among the members of a SN reveals that people influence indirect contacts through direct ones. Indispensable evidence about the influential users and the ability to predict them may be leveraged for several applications. This research work employs Pareto front function to mark the prominent leaders which is followed by an empirical analysis of the results of their unswerving influence.","PeriodicalId":201980,"journal":{"name":"2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Region growing segmentation of MRI — A metric topological approach","authors":"B. Gowri, G. Ilango","doi":"10.1109/NCCCIS.2015.7295907","DOIUrl":"https://doi.org/10.1109/NCCCIS.2015.7295907","url":null,"abstract":"Region growing technique has gained a significant importance in medical image segmentation for finer segmentation of tumor. Here, a novel region growing segmentation algorithm is proposed based on metric topological neighbourhoods. The quality of segmentation is measured using the new objective measure entropy along with the traditional validity measures accuracy, PSNR and MSE.","PeriodicalId":201980,"journal":{"name":"2015 IEEE Seventh National Conference on Computing, Communication and Information Systems (NCCCIS)","volume":"415 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131528700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}