2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)最新文献

筛选
英文 中文
Fingerprint localization using WLAN RSS and magnetic field with landmark detection 利用无线局域网RSS和磁场进行指纹定位
Peng Tang, Zhiqing Huang, Jun Lei
{"title":"Fingerprint localization using WLAN RSS and magnetic field with landmark detection","authors":"Peng Tang, Zhiqing Huang, Jun Lei","doi":"10.1109/CIACT.2017.7977316","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977316","url":null,"abstract":"In this paper, we proposed an indoor localization technique which use WLAN fingerprint and magnetic field fingerprint with landmarks detection. First, we use WLAN RSS fingerprint and magnetic field fingerprint to improve fingerprint's spatial and time characterization and localization accuracy. Second against the special position like stairs, elevators, etc., we mark the special position as landmarks and use the accelerometer sensor data to detect whether the user is in the special position. Through landmarks detection we can reduce the impact of the limitations of location fingerprinting positioning effectively and improve the localization algorithm's efficiency. Experimental results show that, compared to a single widely used WLAN RSS fingerprint localization algorithm, the proposed algorithm can effectively improve the accuracy and efficiency of indoor location.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125010611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Study on DDoS attacks based on DPDK in cloud computing 云计算中基于DPDK的DDoS攻击研究
Xutao Zhao
{"title":"Study on DDoS attacks based on DPDK in cloud computing","authors":"Xutao Zhao","doi":"10.1109/CIACT.2017.7977325","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977325","url":null,"abstract":"DDoS (distributed denial of service attack) is a common and destructive network attack. In order to minimize the impact of network equipments and protect cloud platform user'security, this paper puts forward a prevention strategy based on DPDK. The BP algorithm is applied to the abnormal traffic detection module and DPDK is used to process network packet in user mode. This kind of mode not only improves the DDoS detection rate but also makes full use of the CPU's powerful computation ability, which greatly enhances the efficiency of real-time processing.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127991369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Materialized view selection using exchange function based particle swarm optimization 基于交换函数的粒子群优化物化视图选择
Amit Kumar, T. Kumar
{"title":"Materialized view selection using exchange function based particle swarm optimization","authors":"Amit Kumar, T. Kumar","doi":"10.1109/CIACT.2017.7977364","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977364","url":null,"abstract":"Data warehousing is an essential part of any effectual business intelligence endeavor. The queries necessary for business decision making against a large data warehouse are usually analytical, complex and exploratory in nature. The facility to answer these queries economically is a critical performance concern in the data warehouse environment. One of the techniques employed in data warehouse to improve query performance is to identify and store the relevant data as summaries or aggregates, referred to as materialized view. The problem of choosing such data and storing them as views has been shown to be an NP-hard problem. This problem has been solved using exchange function based particle swarm optimization (EFPSO) in this paper. Accordingly EFPSO based view selection algorithm (EFPSOVSA) is proposed. Experimentally, it is observed that EFPSOVSA selects comparatively better quality views than the greedy algorithm for view selection.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128965708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure routing against DDoS attack in wireless sensor network 无线传感器网络抵御DDoS攻击的安全路由
Surendra Nagar, S. S. Rajput, A. Gupta, M. Trivedi
{"title":"Secure routing against DDoS attack in wireless sensor network","authors":"Surendra Nagar, S. S. Rajput, A. Gupta, M. Trivedi","doi":"10.1109/CIACT.2017.7977375","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977375","url":null,"abstract":"Wireless sensor network is a low cost network to solve many of the real world problems. These sensor nodes used to deploy in the hostile or unattended areas to sense and monitor the atmospheric situations such as motion, pressure, sound, temperature and vibration etc. The sensor nodes have low energy and low computing power, any security scheme for wireless sensor network must not be computationally complex and it should be efficient. In this paper we introduced a secure routing protocol for WSNs, which is able to prevent the network from DDoS attack. In our methodology we scan the infected nodes using the proposed algorithm and block that node from any further activities in the network. To protect the network we use intrusion prevention scheme, where specific nodes of the network acts as IPS node. These nodes operate in their radio range for the region of the network and scan the neighbors regularly. When the IPS node find a misbehavior node which is involves in frequent message passing other than UDP and TCP messages, IPS node blocks the infected node and also send the information to all genuine sender nodes to change their routes. All simulation work has been done using NS 2.35. After simulation the proposed scheme gives feasible results to protect the network against DDoS attack. The performance parameters have been improved after applying the security mechanism on an infected network.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
High-accuracy homography estimation for robust pan-tilt-zoom camera calibration 稳健平移-倾斜变焦相机标定的高精度单应性估计
Jiaoru Yang, Rui Wang
{"title":"High-accuracy homography estimation for robust pan-tilt-zoom camera calibration","authors":"Jiaoru Yang, Rui Wang","doi":"10.1109/CIACT.2017.7977293","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977293","url":null,"abstract":"A robust and full automatic pan-tilt-zoom (PTZ) camera calibration of intrinsic parameters is proposed in this paper. This method elegantly combined the estimation of lens distortion coefficient and the homography given an image pair taken by the camera undergoing an arbitrary pan-tilt rotation in a fixed zoom. Addressing the problem that the feature-based homography estimation approaches loose the optimality in presence of feature location noise which was assumed as isotropic and identical distributed, we propose a better homography and lens distortion estimation by using covariance matrix weighted Ransac under lens distortion called as CWRLD in which the feature location noise is considered as anisotropic non identical distributed noise. The robustness and effectiveness of our method are demonstrated on both synthetic and real data.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130517920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A security criteria regulation middleware using security policy for Web Services on multi-Cloud tenancies 一个安全标准规范中间件,在多云租赁中使用Web服务的安全策略
Ziyi Su, Changda Song, Lin Dai, Fuyong Ge, Ruopeng Yang, F. Biennier
{"title":"A security criteria regulation middleware using security policy for Web Services on multi-Cloud tenancies","authors":"Ziyi Su, Changda Song, Lin Dai, Fuyong Ge, Ruopeng Yang, F. Biennier","doi":"10.1109/CIACT.2017.7977320","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977320","url":null,"abstract":"In the multi-cloud tenancy environments, Web Service offers an standard approach for discovering and using capabilities in an environment that transcends ownership domains. This brings into concern the ownership and security related to Web Service governance. Our approach for this issue involves an ESB-integrated middleware for security criteria regulation on Clouds. It uses an attribute-based security policy model for the exhibition of assets consumers' security profiles and deducing service accessing decision. Assets represent computing power/functionality and information/data provided by entities. Experiments show the middleware to bring minor governance burdens on the hardware aspect, as well as better performance with colosum scaling property, dealing well with cumbersome policy files, which is probably the situation of complex composite service scenarios.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133902832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy — Efficiency techniques in cooperative spectrum sensing: A survey 协同频谱传感中的能效技术:综述
Meenakshi Awasthi, Vijay Kumar, M. Nigam
{"title":"Energy — Efficiency techniques in cooperative spectrum sensing: A survey","authors":"Meenakshi Awasthi, Vijay Kumar, M. Nigam","doi":"10.1109/CIACT.2017.7977341","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977341","url":null,"abstract":"Cognitive radio is a propitious technology to alleviate the issue of spectrum paucity by sensing and allocation of free spectrum bands. Spectrum sensing may be local: single node or cooperative: multiple nodes. It is customary that single node spectrum sensing is not much reliable as compared to cooperative spectrum sensing. However, cooperative spectrum sensing suffers from large overhead due to multiple secondary users who are working in cooperation with each other. Hence, energy efficiency in cooperative spectrum sensing is a challenging concern in cognitive radio. This survey enlightens the various aspects of energy efficiency in cooperative spectrum sensing. Various energy efficient algorithms are available in the literature. This survey compares various methods and techniques used for the optimization of no. of collaborative user in cooperative spectrum sensing. Challenges, drawbacks and newfangled ways of energy efficient collaborative sensing are briefly covered.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124193920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Research on fuzzy PID-based variable frequency control technology of electroplating power supply 基于模糊pid的电镀电源变频控制技术研究
Zhou Jie, Huang Chunlin
{"title":"Research on fuzzy PID-based variable frequency control technology of electroplating power supply","authors":"Zhou Jie, Huang Chunlin","doi":"10.1109/CIACT.2017.7977343","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977343","url":null,"abstract":"To improve the intelligent level of electroplating power supply control system and meet the demand of electroplating products of various kinds, this paper designs a fuzzy PID algorithm-based electroplating power control system. The system, with fuzzy PID algorithm and variable frequency speed control technology as its core, applies fuzzy algorithm to adjust PID parameters in real time to control the inverter output frequency with a purpose to change the power supply of the motor speed, to improve the quality of current modulation, and to adapt to different plating load. The test proves that the transformed power supply control system can ensure its rapidity and accuracy of current regulation under different loads, and has strong ability to restrain disturbance. In addition, the power control can be carried out both in the field and on remote clients and therefore increases its flexibility.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128457010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of elastic properties of nc-BC2N nc-BC2N的弹性性能分析
M. Goyal
{"title":"Analysis of elastic properties of nc-BC2N","authors":"M. Goyal","doi":"10.1109/CIACT.2017.7977387","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977387","url":null,"abstract":"The isothermal equations of state are applied to analyze the elastic properties of cubic shaped nanocrystalline BC2N under pressure. The equations of state (EOS) used are Usual Tait's EOS, Shanker EOS and its empirically modified form used earlier for the study of nanomaterials. It is noted that Usual Tait's equation yields results in between the results obtained using Shanker EOS and its modified form. The results for volume compression from the applied EOS's are compared with the experimental data available and the best results are found from modified Shanker EOS.A good agreement of theoretical results with the experimental proves the validity of the potential independent approach used for explaining the elastic properties of nanocrystalline BC2N. The variation in elastic parameters across the nanocrystal in BC2N under pressure is studied using Usual Tait's EOS and empirically modified Shanker EOS. Further, we have determined the variation in poisson's ratio with pressure using these theoretical models considered. The variation of elastic constants for cubic crystal, i.e. C11, C12 and C44, are also determined with pressure.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116944261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A DDoS prevention scheme for session resumption SEA architecture in healthcare IoT 医疗物联网中会话恢复SEA架构的DDoS防护方案
Aditya Rajagopalan, M. Jagga, Anju Kumari, Syed Taqi Ali
{"title":"A DDoS prevention scheme for session resumption SEA architecture in healthcare IoT","authors":"Aditya Rajagopalan, M. Jagga, Anju Kumari, Syed Taqi Ali","doi":"10.1109/CIACT.2017.7977361","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977361","url":null,"abstract":"We propose a scheme for DDoS prevention in session resumption based end-to-end security for healthcare Internet of Things. In the proposed scheme a certificate based DTLS handshake takes place for mutual authentication between Smart e-Health Gateway and client. The end-to-end communication between client and medical sensors is susceptible to replay and DDoS attacks, and the communication is made secure by ensuring all requests to the medical sensor are sent through the Smart e-Health Gateways in the fog layer. This model not only makes the communication more secure, but also reduces the load on the resource-constrained medical sensors.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126807729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信