{"title":"Fingerprint localization using WLAN RSS and magnetic field with landmark detection","authors":"Peng Tang, Zhiqing Huang, Jun Lei","doi":"10.1109/CIACT.2017.7977316","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977316","url":null,"abstract":"In this paper, we proposed an indoor localization technique which use WLAN fingerprint and magnetic field fingerprint with landmarks detection. First, we use WLAN RSS fingerprint and magnetic field fingerprint to improve fingerprint's spatial and time characterization and localization accuracy. Second against the special position like stairs, elevators, etc., we mark the special position as landmarks and use the accelerometer sensor data to detect whether the user is in the special position. Through landmarks detection we can reduce the impact of the limitations of location fingerprinting positioning effectively and improve the localization algorithm's efficiency. Experimental results show that, compared to a single widely used WLAN RSS fingerprint localization algorithm, the proposed algorithm can effectively improve the accuracy and efficiency of indoor location.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125010611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on DDoS attacks based on DPDK in cloud computing","authors":"Xutao Zhao","doi":"10.1109/CIACT.2017.7977325","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977325","url":null,"abstract":"DDoS (distributed denial of service attack) is a common and destructive network attack. In order to minimize the impact of network equipments and protect cloud platform user'security, this paper puts forward a prevention strategy based on DPDK. The BP algorithm is applied to the abnormal traffic detection module and DPDK is used to process network packet in user mode. This kind of mode not only improves the DDoS detection rate but also makes full use of the CPU's powerful computation ability, which greatly enhances the efficiency of real-time processing.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127991369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Materialized view selection using exchange function based particle swarm optimization","authors":"Amit Kumar, T. Kumar","doi":"10.1109/CIACT.2017.7977364","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977364","url":null,"abstract":"Data warehousing is an essential part of any effectual business intelligence endeavor. The queries necessary for business decision making against a large data warehouse are usually analytical, complex and exploratory in nature. The facility to answer these queries economically is a critical performance concern in the data warehouse environment. One of the techniques employed in data warehouse to improve query performance is to identify and store the relevant data as summaries or aggregates, referred to as materialized view. The problem of choosing such data and storing them as views has been shown to be an NP-hard problem. This problem has been solved using exchange function based particle swarm optimization (EFPSO) in this paper. Accordingly EFPSO based view selection algorithm (EFPSOVSA) is proposed. Experimentally, it is observed that EFPSOVSA selects comparatively better quality views than the greedy algorithm for view selection.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128965708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Surendra Nagar, S. S. Rajput, A. Gupta, M. Trivedi
{"title":"Secure routing against DDoS attack in wireless sensor network","authors":"Surendra Nagar, S. S. Rajput, A. Gupta, M. Trivedi","doi":"10.1109/CIACT.2017.7977375","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977375","url":null,"abstract":"Wireless sensor network is a low cost network to solve many of the real world problems. These sensor nodes used to deploy in the hostile or unattended areas to sense and monitor the atmospheric situations such as motion, pressure, sound, temperature and vibration etc. The sensor nodes have low energy and low computing power, any security scheme for wireless sensor network must not be computationally complex and it should be efficient. In this paper we introduced a secure routing protocol for WSNs, which is able to prevent the network from DDoS attack. In our methodology we scan the infected nodes using the proposed algorithm and block that node from any further activities in the network. To protect the network we use intrusion prevention scheme, where specific nodes of the network acts as IPS node. These nodes operate in their radio range for the region of the network and scan the neighbors regularly. When the IPS node find a misbehavior node which is involves in frequent message passing other than UDP and TCP messages, IPS node blocks the infected node and also send the information to all genuine sender nodes to change their routes. All simulation work has been done using NS 2.35. After simulation the proposed scheme gives feasible results to protect the network against DDoS attack. The performance parameters have been improved after applying the security mechanism on an infected network.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High-accuracy homography estimation for robust pan-tilt-zoom camera calibration","authors":"Jiaoru Yang, Rui Wang","doi":"10.1109/CIACT.2017.7977293","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977293","url":null,"abstract":"A robust and full automatic pan-tilt-zoom (PTZ) camera calibration of intrinsic parameters is proposed in this paper. This method elegantly combined the estimation of lens distortion coefficient and the homography given an image pair taken by the camera undergoing an arbitrary pan-tilt rotation in a fixed zoom. Addressing the problem that the feature-based homography estimation approaches loose the optimality in presence of feature location noise which was assumed as isotropic and identical distributed, we propose a better homography and lens distortion estimation by using covariance matrix weighted Ransac under lens distortion called as CWRLD in which the feature location noise is considered as anisotropic non identical distributed noise. The robustness and effectiveness of our method are demonstrated on both synthetic and real data.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130517920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ziyi Su, Changda Song, Lin Dai, Fuyong Ge, Ruopeng Yang, F. Biennier
{"title":"A security criteria regulation middleware using security policy for Web Services on multi-Cloud tenancies","authors":"Ziyi Su, Changda Song, Lin Dai, Fuyong Ge, Ruopeng Yang, F. Biennier","doi":"10.1109/CIACT.2017.7977320","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977320","url":null,"abstract":"In the multi-cloud tenancy environments, Web Service offers an standard approach for discovering and using capabilities in an environment that transcends ownership domains. This brings into concern the ownership and security related to Web Service governance. Our approach for this issue involves an ESB-integrated middleware for security criteria regulation on Clouds. It uses an attribute-based security policy model for the exhibition of assets consumers' security profiles and deducing service accessing decision. Assets represent computing power/functionality and information/data provided by entities. Experiments show the middleware to bring minor governance burdens on the hardware aspect, as well as better performance with colosum scaling property, dealing well with cumbersome policy files, which is probably the situation of complex composite service scenarios.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133902832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy — Efficiency techniques in cooperative spectrum sensing: A survey","authors":"Meenakshi Awasthi, Vijay Kumar, M. Nigam","doi":"10.1109/CIACT.2017.7977341","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977341","url":null,"abstract":"Cognitive radio is a propitious technology to alleviate the issue of spectrum paucity by sensing and allocation of free spectrum bands. Spectrum sensing may be local: single node or cooperative: multiple nodes. It is customary that single node spectrum sensing is not much reliable as compared to cooperative spectrum sensing. However, cooperative spectrum sensing suffers from large overhead due to multiple secondary users who are working in cooperation with each other. Hence, energy efficiency in cooperative spectrum sensing is a challenging concern in cognitive radio. This survey enlightens the various aspects of energy efficiency in cooperative spectrum sensing. Various energy efficient algorithms are available in the literature. This survey compares various methods and techniques used for the optimization of no. of collaborative user in cooperative spectrum sensing. Challenges, drawbacks and newfangled ways of energy efficient collaborative sensing are briefly covered.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124193920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on fuzzy PID-based variable frequency control technology of electroplating power supply","authors":"Zhou Jie, Huang Chunlin","doi":"10.1109/CIACT.2017.7977343","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977343","url":null,"abstract":"To improve the intelligent level of electroplating power supply control system and meet the demand of electroplating products of various kinds, this paper designs a fuzzy PID algorithm-based electroplating power control system. The system, with fuzzy PID algorithm and variable frequency speed control technology as its core, applies fuzzy algorithm to adjust PID parameters in real time to control the inverter output frequency with a purpose to change the power supply of the motor speed, to improve the quality of current modulation, and to adapt to different plating load. The test proves that the transformed power supply control system can ensure its rapidity and accuracy of current regulation under different loads, and has strong ability to restrain disturbance. In addition, the power control can be carried out both in the field and on remote clients and therefore increases its flexibility.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128457010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of elastic properties of nc-BC2N","authors":"M. Goyal","doi":"10.1109/CIACT.2017.7977387","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977387","url":null,"abstract":"The isothermal equations of state are applied to analyze the elastic properties of cubic shaped nanocrystalline BC2N under pressure. The equations of state (EOS) used are Usual Tait's EOS, Shanker EOS and its empirically modified form used earlier for the study of nanomaterials. It is noted that Usual Tait's equation yields results in between the results obtained using Shanker EOS and its modified form. The results for volume compression from the applied EOS's are compared with the experimental data available and the best results are found from modified Shanker EOS.A good agreement of theoretical results with the experimental proves the validity of the potential independent approach used for explaining the elastic properties of nanocrystalline BC2N. The variation in elastic parameters across the nanocrystal in BC2N under pressure is studied using Usual Tait's EOS and empirically modified Shanker EOS. Further, we have determined the variation in poisson's ratio with pressure using these theoretical models considered. The variation of elastic constants for cubic crystal, i.e. C11, C12 and C44, are also determined with pressure.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116944261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aditya Rajagopalan, M. Jagga, Anju Kumari, Syed Taqi Ali
{"title":"A DDoS prevention scheme for session resumption SEA architecture in healthcare IoT","authors":"Aditya Rajagopalan, M. Jagga, Anju Kumari, Syed Taqi Ali","doi":"10.1109/CIACT.2017.7977361","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977361","url":null,"abstract":"We propose a scheme for DDoS prevention in session resumption based end-to-end security for healthcare Internet of Things. In the proposed scheme a certificate based DTLS handshake takes place for mutual authentication between Smart e-Health Gateway and client. The end-to-end communication between client and medical sensors is susceptible to replay and DDoS attacks, and the communication is made secure by ensuring all requests to the medical sensor are sent through the Smart e-Health Gateways in the fog layer. This model not only makes the communication more secure, but also reduces the load on the resource-constrained medical sensors.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126807729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}