2015 International Conference on Advances in Computer Engineering and Applications最新文献

筛选
英文 中文
Digital image authentication and encryption using digital signature 使用数字签名的数字图像认证和加密
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164725
S. Alam, A. Jamil, Ankur Saldhi, Musheer Ahmad
{"title":"Digital image authentication and encryption using digital signature","authors":"S. Alam, A. Jamil, Ankur Saldhi, Musheer Ahmad","doi":"10.1109/ICACEA.2015.7164725","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164725","url":null,"abstract":"In this paper, a methodology for digital image authentication using digital signature is proposed. The hash of the original image is taken and is encrypted by RSA. The digital signature obtained is concealed in the image. Digital signature is sent along with the encrypted image which decreases the probability of meticulous attack by the intruder. The encrypted image is shuffled using Chaotic Logistic Map to get the final shuffled encrypted image. The use of Logistic Map improves the randomness in the image. For the authentication, a comparator is employed which evaluates correctness of the hash extracted. The simulations have been carried out to examine the proposed authentication and encryption technique.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"92 1-3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114016775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Prevention of shoulder surfing attack using randomized square matrix virtual keyboard 用随机方阵虚拟键盘防止肩冲浪攻击
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164836
Pradyumn Nand, P. Singh, Joy Aneja, Yash Dhingra
{"title":"Prevention of shoulder surfing attack using randomized square matrix virtual keyboard","authors":"Pradyumn Nand, P. Singh, Joy Aneja, Yash Dhingra","doi":"10.1109/ICACEA.2015.7164836","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164836","url":null,"abstract":"Password authentication in public space or using public computer infrastructure often poses the problem of disclosure either through spywares like keyloggers installed on target machine or a malicious onlooker who observes while the victim enters the password. Virtual keyboards offer protection against keyloggers but fail to prevent shoulder surfing. Recent attempts have attempted to improvise these keyboards by dynamically loading and changing the layout to confuse the snooping miscreant. Some attempt to introduce graphical passwords which have to be drawn in a particular geometry to authenticate the user. But even then they are vulnerable to attacks like screenshot capture, are not easy to integrate with existing systems & services and have major usability issues like longer authentication time, complexity in understanding among others. PassBoard is a new approach to tackle this problem.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122959812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Combined horizontal and vertical projection feature extraction technique for Gurmukhi handwritten character recognition 结合水平和垂直投影特征提取技术的古穆克手写字符识别
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164646
M. K. Mahto, K. Bhatia, R. Sharma
{"title":"Combined horizontal and vertical projection feature extraction technique for Gurmukhi handwritten character recognition","authors":"M. K. Mahto, K. Bhatia, R. Sharma","doi":"10.1109/ICACEA.2015.7164646","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164646","url":null,"abstract":"Despite the advancements in Optical Character Recognition (OCR) technologies, problem of Indic script character recognition remains challenging. Especially in case of handwritten characters the challenges are even more. In this work, we focus on off-line recognition of handwritten characters of Gurmukhi, an Indic script commonly used in state of Punjab in India. As a part of this work, we collected a Gurmukhi character dataset of 3500 images. This dataset is collected from 10 writers. We propose a combined horizontal and vertical projection feature extraction scheme for recognition of Gurmukhi characters. We have tested our method on the collected dataset and achieved a high character recognition accuracy of 98.06%.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121772948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Formal specification of asynchronous checkpointing using Event-B 使用Event-B的异步检查点的正式规范
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164773
Natthan Singh, M. Chandra, Divakar Yadav
{"title":"Formal specification of asynchronous checkpointing using Event-B","authors":"Natthan Singh, M. Chandra, Divakar Yadav","doi":"10.1109/ICACEA.2015.7164773","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164773","url":null,"abstract":"The major issue in distributed systems is the recovery from some short term failures. It is desired to have transparent scheme for recovery, from such failures, which is efficient as well. Checkpoint is the one of the scheme. Checkpoint-based protocols simply depend on checkpointing in order to get system state restoration. Generally, checkpointing may be categorised as synchronous, asynchronous or communication-induced. While, there is another mechanism, log-based, in which checkpointing also include logging of nondeterministic events. These events are encoded in tuples known as determinants. A formal reasoning is required to precisely understand the behaviour of such techniques and to understand how they achieve the objectives. Event-B is a formal technique which gives a framework for the distributed systems by mathematical models. We are presenting a formal development of asynchronous checkpointing using Event-B in this paper.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115054741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of e-learning web application's alignment with six facets of understanding 分析电子学习web应用程序与理解的六个方面的一致性
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164737
R. Kamatchi, Kimaya Ambekar
{"title":"Analysis of e-learning web application's alignment with six facets of understanding","authors":"R. Kamatchi, Kimaya Ambekar","doi":"10.1109/ICACEA.2015.7164737","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164737","url":null,"abstract":"E-learning web applications are a boon for the learners which provide the abundant knowledge at their doorsteps. This has wrecked the barriers between the mentor and the learner to make the educational system more interactive and effective. These portals not only focus on content delivery, but also concentrate towards the demonstration and continuous evaluation. Even though the effective delivery is an important quotient of any teaching learning process, the level of understanding among the learners are to be analyzed and evaluated concurrently. The alignment of e-learning portals with the understanding facets is the essential and challenging task. This paper focuses towards the analysis of web portal alignment with the understanding facets and the ways and means to analyze the alignment. The first part of this paper focuses on the advent of elearning and the facets of understanding. The second part describes various parameters to analyze the alignment of elearning web applications with the measurement procedure. The final part of this paper depicts the actual analysis and the results found.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114561802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exhaustive study of SDLC phases and their best praxctices to create CDP model for process improvement 详尽研究SDLC阶段及其最佳实践,为过程改进创建CDP模型
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164852
Rachna Lekh, Pooja
{"title":"Exhaustive study of SDLC phases and their best praxctices to create CDP model for process improvement","authors":"Rachna Lekh, Pooja","doi":"10.1109/ICACEA.2015.7164852","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164852","url":null,"abstract":"This paper reveals the study of sub methods of the phases of SDLC i.e. Software Development Life Cycle. Some methods or sub-practices are always required to execute each and every phase. There is always a need of some procedures, steps, methods and processes to build anything whether it is software or anything. Even a recipe needs a proper steps otherwise it will give a bad taste. An appropriate approach or accurate steps are to be followed always to construct a quality product. Various models, standards and processes have been introduced by ISO, CMMi etc to follow a proper approach to reach the destination. There was a need to find a method which would be suitable for company/organization. As companies have to manage each and everything with the existing resources by keeping in mind the quality and goal of customer. This paper represents the exhaustive study of the sub-methods or sub-practices of SDLC phases as per the process areas of CMMi and a model which shows the best suited combinations of various methods to achieve the desired product as per the requirements and existing resources. This is was the part of process improvement of a software organization “Saber Corp(Made-Up)”. This whole paper represents the CDP model which was the output of process improvement process of company Saber Corp.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"385 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123355156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Soft computing technique based on ANFIS for the early detection of sleep disorders 基于ANFIS的软计算技术在睡眠障碍早期检测中的应用
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164649
V. Garg, R. Bansal
{"title":"Soft computing technique based on ANFIS for the early detection of sleep disorders","authors":"V. Garg, R. Bansal","doi":"10.1109/ICACEA.2015.7164649","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164649","url":null,"abstract":"Sleep is a great natural occurring state in which everything is forgotten for a while, become fresh and ready for next coming daily routine exercises. Any person can lag in these exercises, if their sleep is not well taken. But, sometime it is observed that the sleep gets disturbed due to some awkward behaviors known as sleep disorders. The various intelligent techniques/methods are proposed for the diagnosis, detection and classification of sleep disorders, sleep spindles and other sleep related events. In this paper, a system is proposed based on physio-psycho symptoms by using an adaptive neuro-fuzzy inference system (ANFIS). The major concern is taken towards the early detection of only four sleep disorders that are Sleep Apnea, Insomnia, Parasomnia and Snoring. The prior detection of all these disorders are having a prime importance, as it can help a person to safe itself from the further effects that can arise from these sleep disorders. To implement the system, the data set is collected from various physicians comprising the record of 96 patients.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124930139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Integration of heterogeneous databases 异构数据库集成
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164859
B. Garg, Karamjit Kaur
{"title":"Integration of heterogeneous databases","authors":"B. Garg, Karamjit Kaur","doi":"10.1109/ICACEA.2015.7164859","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164859","url":null,"abstract":"Database integration implies the integration and aggregation of data from different databases within or outside the organization and use that integrated data in many real time applications. Today, due to cloud computing come into the picture there is a need of sharing the resources and need to achieve consistency also. But there are some problems like we have different platforms, different query languages, different data models, different dependencies exist among databases and applications. So, integration solves all above problems and provides a transparent environment to the user.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121874179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and development of peer to peer web caching technique for mobile Ad-Hoc networks: A review 移动Ad-Hoc网络对等网络缓存技术的设计与开发综述
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164687
Bhagyashree V. Vaidya, Ramchandra S. Mangrulkar
{"title":"Design and development of peer to peer web caching technique for mobile Ad-Hoc networks: A review","authors":"Bhagyashree V. Vaidya, Ramchandra S. Mangrulkar","doi":"10.1109/ICACEA.2015.7164687","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164687","url":null,"abstract":"In this paper we analyze one technique for web caching in MANET. MANET stands for Mobile Ad Hoc Network which is an evolving concept. There are many emerging researches focused on MANET aspects such as routing and caching. Among them, the lack of efforts done on MANET web caching is acknowledged. As the node in MANET is moving, the web caching is difficult task. The paper reviews the traditional web caching techniques to improve the performance of MANET. In previous techniques, Better Approach to Mobile Ad-Hoc (B.A.T.M.A.N.) is a web caching protocol which is implemented for MANET. The overall performance of B.A.T.M.A.N. is more time consuming. The proposed technique improves the performance of web application in MANET by reducing internet bandwidth. Also preserves the energy consumption. This peer to peer web caching concept purely focused on web applications in MANET.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121883497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative study of Mamdani-type and Sugeno-type fuzzy inference systems for diagnosis of diabetes mamdani型与sugeno型模糊推理系统诊断糖尿病的比较研究
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164799
Jimmy Singla
{"title":"Comparative study of Mamdani-type and Sugeno-type fuzzy inference systems for diagnosis of diabetes","authors":"Jimmy Singla","doi":"10.1109/ICACEA.2015.7164799","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164799","url":null,"abstract":"Fuzzy inference systems for diagnosis of diabetes are developed using Mamdani-type and Sugeno-type fuzzy models. The outcome obtained by two fuzzy inference systems is evaluated. This paper summarizes the essential variation among the Mamdani-type and Sugeno-type fuzzy inference systems. MATLAB fuzzy logic toolbox is used for the simulation of both the models. This also confirms which one is a superior choice of the two fuzzy inference systems for diagnosis of diabetes.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123850743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信