2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)最新文献

筛选
英文 中文
Secret sharing scheme for group authentication — A review 用于组认证的秘密共享方案-综述
S. K. Narad, M. R. Sayankar, S. Alone, P. S. Mahiskar
{"title":"Secret sharing scheme for group authentication — A review","authors":"S. K. Narad, M. R. Sayankar, S. Alone, P. S. Mahiskar","doi":"10.1109/ICECA.2017.8203663","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203663","url":null,"abstract":"User authentication is the most important security services for communication purpose. Group Authentication authenticates all users belonging to the same group is proposed in this paper. The (n, n) Group Authentication Scheme is very efficient since it is sufficient to authenticate all users at once if all users are group members; however, if there are nonmembers, it can be used as a preprocess before applying conventional user authentication to identify non-members. Also, if any of the user present in group authentication is absent then the group is not authenticated at all, as each share is distributed to each user. It results in best authenticated system as the hacker cannot hack each share in a secret. Also, Group Authentication is implemented with Neural Network so it becomes complicated for hackers to hack each neuron in a neural network. The Neural Network based group authentication is specially designed for group-oriented applications using Shamir Secret Sharing Scheme. It is a many-to-many type of authentication.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126080679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Perceive EEmotion from facial expressions 从面部表情中感知情绪
Preeti Jha, Hemant Makwana
{"title":"Perceive EEmotion from facial expressions","authors":"Preeti Jha, Hemant Makwana","doi":"10.1109/ICECA.2017.8212718","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212718","url":null,"abstract":"Humans are trying to interact with the computer via touch screen, smart-phones, audio and video. A computer get information from the human via an interface and likewise, a human recognize an information from the computer via an interface. Facial expression recognition is a key element in a human communication. In order to promote the man and machine interaction, a framework is proposed for the facial expression recognition from the images. The approach for representing the facial parts was done by Haar-Like features and the learning of these features was made possible by AdaBoost algorithm. Several application scenarios were proposed in terms of the feature extraction and emotion detection. As this system is capable of detecting the emotions from the images stored in a database, is going further here in this paper, an efficiency of emotion detection is giving the better response in terms of the time. The experimental results represents that, the proposed approach has the capability of detecting the false acceptance rate is 18% while the false rejection rate is just 5%.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126089208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public auditing for shared data in cloud with safe user revocation 对云中的共享数据进行公共审计,并提供安全的用户撤销
S. Samundiswary, Nilima Dongre Jawade
{"title":"Public auditing for shared data in cloud with safe user revocation","authors":"S. Samundiswary, Nilima Dongre Jawade","doi":"10.1109/ICECA.2017.8203603","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203603","url":null,"abstract":"Cloud computing is a most adopted emerging technology by all organizations. Data storage and sharing of data in cloud is the most used services, whereas secure public auditing makes challenge in such services. Since cloud infrastructure which is not a trustable, users in the group for data sharing must compute their signatures and shares their block for integrity auditing. Any corruption, insider attack of data is possible in an outsourced data from users to cloud. All Participants in the sharing group can also able to modify data along with the access. If any user does any malicious activities, Group manager can revoke such user from group so revoked user cannot be part of sharing. The major challenges of data security is integrity of outsourced data in cloud is analyzed and proposes a privacy preserving public auditing mechanism where Third Party Auditor is used for integrity checking of data and Proxy resignature mechanism is used for re-signing keys for revoked users from the group. Additionally to avoid collusion between cloud and revoked user, our system uses secret sharing scheme called Cheater identifiable sharing based on Shamir's sharing scheme. The scheme identifies the dishonest user in the group which helps for efficient user revocation by group manager.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125113714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multi-objective test case minimization using evolutionary algorithms: A review 使用进化算法的多目标测试用例最小化:回顾
Vandana, Ajmer Singh
{"title":"Multi-objective test case minimization using evolutionary algorithms: A review","authors":"Vandana, Ajmer Singh","doi":"10.1109/ICECA.2017.8203698","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203698","url":null,"abstract":"Software testing is one of the primal phase in various software development lifecycle models and consumes approximately 70% of development time and 40% cost of the overall budget. Nowadays automated testing tools along with different meta-heuristic algorithms which work similarly as simple testing techniques but they significantly outperforms when the complexity of the program is high are used in software testing phase to reduce the effort and time to test various program codes. Recent studies shows that various Evolutionary Algorithms (EA) like Artificial Immune System (AIS), Particle Swarm Optimization (PSO), Simulated annealing, Artificial Bee Colony (ABC), Cuckoo Search Algorithm (CSA), Ant colony optimization (ACO) are being functionalized in the field of Software Engineering to obtain optimal solutions. This review paper demonstrates the minimization of test cases using these evolutionary algorithms.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127425997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Energy support to airports by wind systems 风力系统对机场的能源支持
V. Hariprasad, A. Anand, J. Sahana, P. Priya, A. Christopher, R. A. Singh, S. Jayalakshmi
{"title":"Energy support to airports by wind systems","authors":"V. Hariprasad, A. Anand, J. Sahana, P. Priya, A. Christopher, R. A. Singh, S. Jayalakshmi","doi":"10.1109/ICECA.2017.8212767","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212767","url":null,"abstract":"Airports require constant power supply throughout the year. As a solution to this growing demand, power requirement of airports can be supported from renewable energy sources such as wind and solar. Wind energy can be harvested near airports by using a series of wind turbines of small sizes. Such small turbine can be placed around airports without violating aviation regulations. In this work, a three-bladed savonius wind turbine that can be easily manufactured at low cost and which is effective in turbulent air condition is proposed for this purpose. The pressure distribution over the turbines blades and the revolutions per minute (RPM) of the turbine are estimated/calculated by using a wind tunnel. In this investigation, it was observed that the savonius turbine designed for airport installation has the desirable characteristic of low cut-in speed. The flow around the turbine is visualized using a water flow channel and colorants. The visualization technique aids in understanding the performance of turbine against smooth as well as turbulent wind conditions.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129074988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative performance analysis of multiplexer based single precision floating point multipliers 基于单精度浮点乘法器的多路复用器性能比较分析
K. V. Gowreesrinivas, P. Samundiswary
{"title":"Comparative performance analysis of multiplexer based single precision floating point multipliers","authors":"K. V. Gowreesrinivas, P. Samundiswary","doi":"10.1109/ICECA.2017.8212851","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212851","url":null,"abstract":"Floating-point arithmetic plays major role in computer systems. The single precision floating point arithmetic operations are multiplication, division, addition and subtraction. Among all these multiplication is extensively used and involves composite arithmetic functions. The single precision (32-bit) floating point number split into three parts namely Sign part, and Exponent part and Mantissa part. The most significant bit of the number is a sign bit and it is a 1-bit length. Next 8-bits represent the exponent part of the number and next 23-bits represent the mantissa part of the number. Mantissa part needs large 24-bit multiplication. The performance of the single-precision floating point number mostly based on the occupied area and delay of the multiplier. In this paper, performance comparison of multiplexer based single precision floating point multiplication using Array, Wallace tree and Vedic multipliers is done in terms of area and delay. These floating point multipliers modules are programmed and synthesized using Verilog in Xilinx ISE Simulator. Maximum propagated path delay and number of slices required on FPGA are compared for different multipliers. From the result it is concluded that Multiplexer based Vedic multiplier method has a great impact on improving the speed and reducing the area required on FPGA.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133769718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of visitor's behavior from web log using web log expert tool 利用网络日志专家工具对网络日志中的访问者行为进行分析
Manoj Kumar, Meenu
{"title":"Analysis of visitor's behavior from web log using web log expert tool","authors":"Manoj Kumar, Meenu","doi":"10.1109/ICECA.2017.8212820","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212820","url":null,"abstract":"Web usage mining is a data mining technique. There are large amount of data are stored on the internet. When user search any particular information by search engine like Google, Bing etc. is very difficult because the complexity of web pages is increases day by day. Web usage mining plays an important role to solve this problem. In web usage mining we are creating a suitable pattern according to the user's visiting behavior. The goal of this paper is to implement a web log Expert tool on web server log file (an educational institution web log data) to find the behavioral pattern and profiles of users interacting with a web site. The web mining usage pattern of an Technical Institution web data. Web related data is coteries in to three parts namely web log, access log, error log and proxy log data and collect the data in web server and implemented a web log expert. Our experimental results help to predict and identify the number of visitor for the website and improve the website usability. The web related log data are three types, namely proxy log data, web log data, and error log data. We exploration the activity statistic by daily based hourly based week and monthly based report of web usage pattern. The web usage mining is playing an important role to improve the availability of information of your web site.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133547389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design of a dual band frequency reconfigurable monopole antenna using a circular split ring resonator for Wi-Fi and Wi-Max applications 设计一种用于Wi-Fi和Wi-Max应用的双频频率可重构单极天线,采用圆形分环谐振器
Prasanna G. Paga, H. C. Nagaraj, T. Rukmini
{"title":"Design of a dual band frequency reconfigurable monopole antenna using a circular split ring resonator for Wi-Fi and Wi-Max applications","authors":"Prasanna G. Paga, H. C. Nagaraj, T. Rukmini","doi":"10.1109/ICECA.2017.8212796","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212796","url":null,"abstract":"This paper highlights the proposed design for a Dual band Fractal Monopole antenna using a Circular Split Ring Resonator and fed through a 50Ω inset feed over the Rogers RT/Duroid 5880tm substrate for the Wi-Fi and Wi-Max applications. The proposed antenna resonates at Wi-Fi frequency (2.4 GHz) and the Wi-Max frequency (3.5GHz). The proposed Antenna resulted in a Gain of 0.14dBi for 2.4GHz and 2.9dBi for 3.5GHz. The results were validated by the Antenna simulation tool Ansoft HFSS™ version15.0.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122905906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
EEG signal denoising based on wavelet transform 基于小波变换的脑电信号去噪
Harender, Ranjan Sharma
{"title":"EEG signal denoising based on wavelet transform","authors":"Harender, Ranjan Sharma","doi":"10.1109/ICECA.2017.8203645","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8203645","url":null,"abstract":"Low amplitude EEG signal are easily affected by various noise sources. This work presents de-noising methods based on the combination of stationary wavelet transform (SWT), universal threshold, statistical threshold and Discrete Wavelet Transform (DWT) with symlet, haar, coif, and bior4.4 wavelets. The results show significant improvement in performance parameter such as Signal to Artifacts ratio (SAR), Correlation Coefficient (CC) and Normalized Mean Squared error (NMSE). Simulink has been used to model DWT based de noising of EEG signal implementable on FPGA with Xilinx System Generator.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122985559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An encryption based on DNA cryptography and steganography 一种基于DNA密码术和隐写术的加密技术
K. S. Sajisha, S. Mathew
{"title":"An encryption based on DNA cryptography and steganography","authors":"K. S. Sajisha, S. Mathew","doi":"10.1109/ICECA.2017.8212786","DOIUrl":"https://doi.org/10.1109/ICECA.2017.8212786","url":null,"abstract":"The data security is a challenging issue nowadays with the increase of information capacity and its transmission rate. The most common and widely used techniques in the data security fields are cryptography and steganography. The combination of cryptography and steganography methods provides more security to the data. Now, DNA (Deoxyribonucleic Acid) is explored as a new carrier for data security since it achieves maximum protection and powerful security with high capacity and low modification rate. A new data security method can be developed by taking the advantages of DNA based AES (Advanced Encryption Standard) cryptography and DNA steganography. This new technique will provide multilayer security to the secret message. Here the secret message is first encoded to DNA bases then DNA based AES algorithm is applied to it. Finally the encrypted DNA will be concealed in another DNA sequence. This hybrid technique provides triple layer security to the secret message.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123087325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信