2019 1st International Conference on Advances in Information Technology (ICAIT)最新文献

筛选
英文 中文
Performance Evaluation of Software-Defined Wireless Networks in IT-SDN and Mininet-WiFi 软件定义无线网络在IT-SDN和mini - wifi中的性能评估
2019 1st International Conference on Advances in Information Technology (ICAIT) Pub Date : 2019-07-01 DOI: 10.1109/ICAIT47043.2019.8987342
Aanchal Chaurasia, S. Mishra, S. Chinara
{"title":"Performance Evaluation of Software-Defined Wireless Networks in IT-SDN and Mininet-WiFi","authors":"Aanchal Chaurasia, S. Mishra, S. Chinara","doi":"10.1109/ICAIT47043.2019.8987342","DOIUrl":"https://doi.org/10.1109/ICAIT47043.2019.8987342","url":null,"abstract":"In this paper, we compare the performance of IT-SDN framework and Mininet-WiFi OpenFlow Network Emulator for Software-Defined Wireless Networks. The topology consists of a number of source nodes generating traffic towards a sink node. The controller sets up flow rules for the packets, following which the switches route the wireless traffic. The communication between the controller and the switches is governed by the underlying southbound protocol. The performance of IT-SDN and Mininet-WiFi for the stated network scenario was measured using the metrics: end-to-end delay, throughput, packet delivery ratio and control overhead. The results show that IT-SDN outperforms Mininet-WiFi in terms of the above mentioned metrics for the given wireless network scenario.","PeriodicalId":221994,"journal":{"name":"2019 1st International Conference on Advances in Information Technology (ICAIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125787992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formal Verfication of Security Protocol Using Spin Tool 使用Spin工具对安全协议进行正式验证
2019 1st International Conference on Advances in Information Technology (ICAIT) Pub Date : 2019-07-01 DOI: 10.1109/ICAIT47043.2019.8987376
Kumar T G Keerthan, S. Ramu
{"title":"Formal Verfication of Security Protocol Using Spin Tool","authors":"Kumar T G Keerthan, S. Ramu","doi":"10.1109/ICAIT47043.2019.8987376","DOIUrl":"https://doi.org/10.1109/ICAIT47043.2019.8987376","url":null,"abstract":"Nowadays, security is a big issue related with the network. In order to send sensitive information through the network, we require a mechanism to ensure the information is sent to the intended receiver. Various methods is discussed which is used for verification and model checking method is implemented to construct a model using promela which verifies the properties that satisfies with a cryptographic protocol. This paper involves a brief survey on different methods available for the verification of security protocols and suggests a better method based on qualitative analysis on the survey. Also, we give a verification analysis of NSPK protocol using model checking tool Spin.","PeriodicalId":221994,"journal":{"name":"2019 1st International Conference on Advances in Information Technology (ICAIT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124717268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Emphasize Opportunistic Routing Etiquette in Cognitive Radio Sensor Network 论认知无线电传感器网络中的机会路由礼仪
2019 1st International Conference on Advances in Information Technology (ICAIT) Pub Date : 2019-07-01 DOI: 10.1109/ICAIT47043.2019.8987408
D. Bhavana
{"title":"An Emphasize Opportunistic Routing Etiquette in Cognitive Radio Sensor Network","authors":"D. Bhavana","doi":"10.1109/ICAIT47043.2019.8987408","DOIUrl":"https://doi.org/10.1109/ICAIT47043.2019.8987408","url":null,"abstract":"Wireless Sensor Networks is growing very fast in today’s era. The ideas of of this circuitry’s digital is, wireless transceiver, and micro electro-mechanical systems (MIELMESY) has made it possible that all the combined way of occasion, data firefight, wireless tinkle and power supply will be available into an low-cost inch scale device. Conjunctively, the torque and inexpensive WSN consist of thousands of these nodes and it has attracted much customer retention. Balance Scale sensor devices have been designed to work with limited power requirements for longest times. One of the hard-fought challenges that had been faced by the WSNs is their energy performant with an increase in the network engorged at any point of time number of sensor nodes can amalgamate or disconnect the network and also the torque of the network is sweepingly high.","PeriodicalId":221994,"journal":{"name":"2019 1st International Conference on Advances in Information Technology (ICAIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124964194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid cross layer mechanism for high reliability in under water wireless sensor network 水下无线传感器网络高可靠性的混合跨层机制
2019 1st International Conference on Advances in Information Technology (ICAIT) Pub Date : 2019-07-01 DOI: 10.1109/ICAIT47043.2019.8987251
V. K, M. Siddappa, B. Shanmukha
{"title":"Hybrid cross layer mechanism for high reliability in under water wireless sensor network","authors":"V. K, M. Siddappa, B. Shanmukha","doi":"10.1109/ICAIT47043.2019.8987251","DOIUrl":"https://doi.org/10.1109/ICAIT47043.2019.8987251","url":null,"abstract":"Under water sensor network finds lot of applications in sea environment monitoring. Tsunami like conditions can be monitored and reported earlier so that people on shores can be safe. Due to nature of medium, the data delivery ratio in under water sensor networks is very low. The various problems in the underwater sensor networks are medium significant delay, Double-side-spreading, Doppler- spreads, frequency-selective fading and limited bandwidth. These problems reduce the data delivery ratio. In this work hybrid cross layer method with mechanisms in physical, data link and routing layer are proposed to increase the reliability of underwater wireless sensor networks.","PeriodicalId":221994,"journal":{"name":"2019 1st International Conference on Advances in Information Technology (ICAIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116541481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agent-based Self-Adaptive System for Cloud 基于agent的云自适应系统
2019 1st International Conference on Advances in Information Technology (ICAIT) Pub Date : 2019-07-01 DOI: 10.1109/ICAIT47043.2019.8987406
G. Shyam, F. Azam
{"title":"Agent-based Self-Adaptive System for Cloud","authors":"G. Shyam, F. Azam","doi":"10.1109/ICAIT47043.2019.8987406","DOIUrl":"https://doi.org/10.1109/ICAIT47043.2019.8987406","url":null,"abstract":"There is a need to analyze the appropriate assets/resource requirements and identify the reason for Quality-of-Service (QoS) degradation (if any), and ensure better assets/resource allocation decisions in Cloud computing scenario. In this work, agents are used to achieve the same through the condition of assets/resource at run-time and about expectations by clients. We have developed an agent application learning system for decision making including readily available globalized and localized information, and client assets/resource requirements etc. Results demonstrate that the proposed system can enhance assets/resource utility, while fulfilling the QoS requested by clients.","PeriodicalId":221994,"journal":{"name":"2019 1st International Conference on Advances in Information Technology (ICAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130345658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of Hybrid VANET Design for Provisioning Infotainment Application 面向信息娱乐应用的混合VANET设计综述
2019 1st International Conference on Advances in Information Technology (ICAIT) Pub Date : 2019-07-01 DOI: 10.1109/ICAIT47043.2019.8987233
S. S, A. Patil
{"title":"Survey of Hybrid VANET Design for Provisioning Infotainment Application","authors":"S. S, A. Patil","doi":"10.1109/ICAIT47043.2019.8987233","DOIUrl":"https://doi.org/10.1109/ICAIT47043.2019.8987233","url":null,"abstract":"This paper presents a survey of various existing VANET model for provisioning real-time (i.e. safety critical application) and non-real smart infotainment application for user on the go. Further, it carries out survey of various existing hybrid VANET for provisioning QoS (Quality of services), increase network density using SDN (software defined network), fog computing and cloud computing framework, and future generation high speed wireless network such as LTE (Long term evolution), 5G (Fifth generation), CRAN (Cloud based Radio area network). However, from extensive analysis carried out it can be seen existing hybrid model do not consider feature of each framework/architecture such as VANET communication (i.e. among V2I and V2V), QoS controlling mechanism in SDN for provisioning data from cloud to VANET user and also do not provide efficient resource allocation technique in cloud computing environment to minimize computation cost. This paper shows meeting aforementioned feature in designing hybrid VANET model will aid in offering scalable and flexible smart infotainment application to VANET user. Further, the survey show how propagation model is affected due to environmental factor and presence of obstacle in LOS. Further, discusses about the need for new MAC (Medium access model). Then, discusses about selecting simulation environment/tool to evaluate performance of Hybrid VANET model. Lastly, a novel possible solution is described to overcome research problem which will be the future research direction of this survey. The proposed envisioned model will aid in offering superior performance than existing models.","PeriodicalId":221994,"journal":{"name":"2019 1st International Conference on Advances in Information Technology (ICAIT)","volume":"2007 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132575534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generation And Analysis Of Trust Networks 信任网络的生成与分析
2019 1st International Conference on Advances in Information Technology (ICAIT) Pub Date : 2019-07-01 DOI: 10.1109/ICAIT47043.2019.8987287
Avinash Vaka, G. Manasa, G. Sameer, Bhaskarjyoti Das
{"title":"Generation And Analysis Of Trust Networks","authors":"Avinash Vaka, G. Manasa, G. Sameer, Bhaskarjyoti Das","doi":"10.1109/ICAIT47043.2019.8987287","DOIUrl":"https://doi.org/10.1109/ICAIT47043.2019.8987287","url":null,"abstract":"Trust is known to be a key component in human social relationships. It is trust that defines human behavior with others to a large extent. Generative models have been extensively used in social networks study to simulate different characteristics and phenomena in social graphs. In this work, an attempt is made to understand how trust in social graphs can be combined with generative modeling techniques to generate trust-based social graphs. These generated social graphs are then compared with the original social graphs to evaluate how trust helps in generative modeling. Two well-known social network data sets i.e. the soc-Bitcoin and the wiki administrator network data sets are used in this work. Social graphs are generated from these data sets and then compared with the original graphs along with other standard generative modeling techniques to see how trust is a good component in this. Other Generative modeling techniques have been available for a while but this investigation with the real social graph data sets validate that trust can be an important factor in generative modeling.","PeriodicalId":221994,"journal":{"name":"2019 1st International Conference on Advances in Information Technology (ICAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123634437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated Machine Learning Model for Prediction of Lung Cancer Stages from Textual data using Ensemble Method 基于集成方法的基于文本数据预测肺癌分期的集成机器学习模型
2019 1st International Conference on Advances in Information Technology (ICAIT) Pub Date : 2019-07-01 DOI: 10.1109/ICAIT47043.2019.8987295
D. Reddy, Emmidi Naga Hemanth Kumar, D. Reddy, Monika P
{"title":"Integrated Machine Learning Model for Prediction of Lung Cancer Stages from Textual data using Ensemble Method","authors":"D. Reddy, Emmidi Naga Hemanth Kumar, D. Reddy, Monika P","doi":"10.1109/ICAIT47043.2019.8987295","DOIUrl":"https://doi.org/10.1109/ICAIT47043.2019.8987295","url":null,"abstract":"Research and Development on cancer detection is more on imaging than textual data. With the help of documented symptoms in the form of text and Machine Learning (ML) techniques, it is possible to predict the lung cancerstages effectively. This paper conjectures the oeuvre modelwhich is efficient in predicting the stages of lung carcinoma by applying the concepts of ML algorithms. The proposed model is combination of K-Nearest Neighbours, Decision Tree and Neural Networks modelsalong with bagging ensemble method for enhancing the accuracy of the overall prediction. The predictedresults of the suggested model are showing better accuracy compared to individual algorithms.","PeriodicalId":221994,"journal":{"name":"2019 1st International Conference on Advances in Information Technology (ICAIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123690986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detection of Network Intrusions using Hybrid Intelligent Systems 基于混合智能系统的网络入侵检测
2019 1st International Conference on Advances in Information Technology (ICAIT) Pub Date : 2019-07-01 DOI: 10.1109/ICAIT47043.2019.8987368
Afreen Bhumgara, Anand Pitale
{"title":"Detection of Network Intrusions using Hybrid Intelligent Systems","authors":"Afreen Bhumgara, Anand Pitale","doi":"10.1109/ICAIT47043.2019.8987368","DOIUrl":"https://doi.org/10.1109/ICAIT47043.2019.8987368","url":null,"abstract":"With the advancement in technology, our society has become so dependent on the internet and the number of internet users keeps rising each day. However, with the increased users comes the risk of hacking and malicious activities. One of the major concerns facing the technology sector today is the risk of intrusion. Thus, in the domain of security and computer networks, research in intrusion detection is essential. To combat the threats and malicious activities of the internet, the computer industry has gone a mile by creating new software and hardware products such as the Firewalls, Intrusion Prevention Systems and Detection Systems. Recently researchers created a Network-IDS to prevent such intrusions. However, these systems were prone to manipulations and had defects that were based on classification techniques. These systems failed to provide the necessary protections as they used a single classifier system or the individual classification technique. A single classifier classifies all of the data as normal or not, however due to the evolution of new attack patterns these systems failed to provide optimal attack detection rates with poor false alarm rates. The rise of different attack patterns meant that these systems cannot offer complete protection hence researchers came up with more sophisticated classification techniques that uses blends of several classification algorithms known as a hybrid intelligent system, leading to more detection accuracy. The aim of this study is to contrast various classifiers for network intrusions while combining these classifiers to direct the study towards hybrid intelligent systems. The study is carried out by performing an empirical and literature review while simultaneously providing a base for future studies.","PeriodicalId":221994,"journal":{"name":"2019 1st International Conference on Advances in Information Technology (ICAIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128525370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IoT based Smart Attendance Monitoring System using RFID 基于物联网的RFID智能考勤监控系统
2019 1st International Conference on Advances in Information Technology (ICAIT) Pub Date : 2019-07-01 DOI: 10.1109/ICAIT47043.2019.8987263
Unnati Koppikar, Shobha Hiremath, Akshata Shiralkar, Akshata Rajoor, V. Baligar
{"title":"IoT based Smart Attendance Monitoring System using RFID","authors":"Unnati Koppikar, Shobha Hiremath, Akshata Shiralkar, Akshata Rajoor, V. Baligar","doi":"10.1109/ICAIT47043.2019.8987263","DOIUrl":"https://doi.org/10.1109/ICAIT47043.2019.8987263","url":null,"abstract":"Most of the institutional authorities are troubled with the cumbersome method of maintaining manual attendance of their employees. The manual process of signing on a paper is prolonged and insecure. An efficient attendance monitoring system needs to be enforced at such places. Radio Frequency Identification (RFID) based attendance system provides us with a solution that caters to issues like proxy attendance. This paper describes the design of an RFID based attendance monitoring system which uniquely identifies each employee/student based on their RFID tag which is attached to their ID card. This makes the mechanism of recording the attendance effortless, quicker and protected as compared to conventional method. This system is designed to be used at different educational institutions, corporate offices, government offices etc. The proposed system consist of both hardware and software components based on IoT Technology. The hardware component consists of RC522 RFID card reader and RFID tags/cards. The software component consists of the Web-based GUI for viewing the employee’s or student’s attendance, which is hosted on a web server and which stores the data in a database server. The employees or students just need to place their RFID card or tag on the reader and their attendance will be recorded for the day. Also, the attendance recorded will be more accurate as the system is synced with a real-time clock.","PeriodicalId":221994,"journal":{"name":"2019 1st International Conference on Advances in Information Technology (ICAIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115030275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信