2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)最新文献

筛选
英文 中文
Comparative Analysis of Recent Neuro Fuzzy Systems For Stock Market Prediction 近期神经模糊系统在股市预测中的比较分析
P. K. Bharne, S. Prabhune
{"title":"Comparative Analysis of Recent Neuro Fuzzy Systems For Stock Market Prediction","authors":"P. K. Bharne, S. Prabhune","doi":"10.1109/ICCMC.2019.8819644","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819644","url":null,"abstract":"The fuzzy logic and neural networks are the two powerful techniques commonly used in various application field from their evolution. The combination of both techniques is commonly termed as Neuro-Fuzzy System (NFS). Both techniques are combined because they overcome the limitations of each other. Basically, this model is used to construct the complex model by using fuzzy logic and its capabilities are improves with a neural network. In NFS, fuzzy rules are adjusted by the input-output patterns of a neural network. This paper presents the use of this powerful NFS system in the fields of stock market application for stock price prediction. Most of the traditional approaches do not consider all kind of stock price movements. But literature proves that the NFS is a leading technique in stock market prediction. This paper initially describes the brief description of neural networks and Fuzzy logic system along with their pros and cons. Further discussing, how the advantages of both systems combined in NFS. Also, the different types and architectures of NFS are presented here. Finally, this paper studies the recent NFS dependent methods which is used for the prediction of stock market. This paper summarizes the analysis of these techniques based on the technique used, the dataset used, their advantages and some research gap of all these techniques.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126170842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Diabetic Retinopathy Prediction System using Data Mining 基于数据挖掘的糖尿病视网膜病变预测系统的实现
Siddharekh S. Patil, Kalpana Malpe
{"title":"Implementation of Diabetic Retinopathy Prediction System using Data Mining","authors":"Siddharekh S. Patil, Kalpana Malpe","doi":"10.1109/ICCMC.2019.8819865","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819865","url":null,"abstract":"Diabetic retinopathy (DR) is the most common cause of newly diagnosed blindness every year. Annual eye checking for diabetic patients are suggested in order to find and treat DR in a timely manner, since blindness from this condition is preventable with early identification. DR detection is solely based on existing patient records. Now a day’s medical data growing tremendously and we need to process that data for detection. But it is time consuming hence data mining techniques helps to get rid from this issue. We use neural network (NN) and naïve bayes for classification. According to comparison results NN gives better accuracy than naïve bayes and time and memory required for NN is less as compared to naïve bayes.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"58 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Load Balanced Clustering protocol for lifetime enhancement of WSN 用于WSN生存期增强的负载均衡聚类协议
Kumkum Dubey, Vijeta Sharma, Amrita Gupta, Ankita Srivastava, Shivendu Mishra, Prince Rajpoot
{"title":"Load Balanced Clustering protocol for lifetime enhancement of WSN","authors":"Kumkum Dubey, Vijeta Sharma, Amrita Gupta, Ankita Srivastava, Shivendu Mishra, Prince Rajpoot","doi":"10.1109/ICCMC.2019.8819854","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819854","url":null,"abstract":"WSN have large numbers of spatially distributed and dedicated sensing devices, which are used for sensing the physical condition of the environment in which they are deployed. Todays time, WSN have lots of areas for research and it plays important role like tracking of area, health-scanning, earthquake-sensing and so on. WSN sets supplementary life as well as nodes time-period in sensor nodes. Network life cycle is dependent on many factors like their topology type, residual energy after some rounds, sensor-node distance to sink node etc. There are already lots of work done on this concept. Clustering is one of the most important approach to make efficient communication. In this paper, we used clustering approach that uses the minimum energy consumption by choosing the Clusters-Heads (CHs) using five parameters: delay, standard deviation of Eres, average distance of CHs, standard deviation of average life time of cluster head and max distance to Base Station (BS). Results verify that our proposed algorithm will prolong the lifetime of network over LEACH and base algorithm.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121818386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effective Analysis using DWT and RBF for Biomedical Signals Pick-up from Heart through Surface Electrodes 基于小波变换和RBF的表面电极心脏生物医学信号有效分析
Padma Tatiparti, C. Kumari
{"title":"Effective Analysis using DWT and RBF for Biomedical Signals Pick-up from Heart through Surface Electrodes","authors":"Padma Tatiparti, C. Kumari","doi":"10.1109/ICCMC.2019.8819817","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819817","url":null,"abstract":"It deals with the detection of heart diseases as a deciding path for treatment. The proposed work is for finding an effective technique for ECG Signal Analysis with modest reasonable accuracy and minimum computation time. ECG signal Patterns and heart rate are the parameters to indicate cardiac health. ECG signals are recorded by placing the surface electrodes on body to pick up rhythmically produced due to repolarization and depolarization activity of heart. For Instance the arrhythmia of ECG rhythm are irregular, it neither too slow nor too fast significant based on difference observed between normal sinus heart rhythm and types of arrhythmia. To avoid any risk, the recognition using computer based for classification of ECG signals pinched significant attention since last few decades. The predominant attributes used in detection of cardiac cycle for arrhythmic activity are Heart Rate, QRS complex and intervals and ST segment. Algorithms used for detection and also classification of various ECG signal abnormalities, some recordings from databases of arrhythmias is used in training and also testing classification based on Neural Networks. The data mining tool like Multilayer Perceptron, Radial Basis Functions Neural Networks are implemented for classification purpose due to its simplicity, adaptiveness and easy implementation produced high efficiency.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"33 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114022604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Machine Learning Methodologies for Network Intrusion Detection 网络入侵检测的机器学习方法综述
Aditya Phadke, Mohit Kulkarni, Pranav Bhawalkar, Rashmi Bhattad
{"title":"A Review of Machine Learning Methodologies for Network Intrusion Detection","authors":"Aditya Phadke, Mohit Kulkarni, Pranav Bhawalkar, Rashmi Bhattad","doi":"10.1109/ICCMC.2019.8819748","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819748","url":null,"abstract":"The Internet continues to spread itself over the globe, providing a great opportunity for various threats which are growing on a daily basis. Current static detection techniques only detect known malicious attacks and they also require frequent updates to signature-based databases. To reduce this work, systems are proposed for network intrusion detection systems capable of analyzing contents of the network by means of machine learning techniques to analyze and classify the malicious contents. Various machine learning algorithms are used for developing a Network Intrusion Detection System. The review intends to provide an exhaustive survey of the currently proposed machine learning based intrusion detection systems in order to assist Network Intrusion Detection System developers to gain a better intuition.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133173561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Design of Rectangular Patch Array Antenna for Satellite Communication 卫星通信用矩形贴片阵列天线的设计
Touko Tcheutou Stephane Borel, Arvind R. Yadav, Utkarsh Shah
{"title":"Design of Rectangular Patch Array Antenna for Satellite Communication","authors":"Touko Tcheutou Stephane Borel, Arvind R. Yadav, Utkarsh Shah","doi":"10.1109/ICCMC.2019.8819861","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819861","url":null,"abstract":"Microstrip patch array antennas are widely used in satellite communication, because of its advantages compared to the conventional antennas. Literature study of previous years of patch array antenna (PAA) shows that several techniques were used for making the small size of patch array antenna. This paper presents the micro strip array antenna 2x2 operating at 12 GHz with a bandwidth equal to 693.6 MHZ (5.9 %), a gain equal to 8.98 dB, directivity equal to 10.83 dB and finally an efficiency equal to 83 %. A 2x2 linear array is designed for line feeding, the substrate used is FR4 with a thickness of 1.6mm and a dielectric constant of 4.4. This array antenna is made for satellite communication, X-band applications, and KU applications. The antenna array is designed by using HFSS 12 (High Frequency Structure Simulator) and also the simulation has been done by the same software.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"247 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133331219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Improved Conditional Privacy Protection in Vehicle Ad-hoc Networks 改进的车载Ad-hoc网络条件隐私保护
K. Mankar, Chitra T. Wasnik
{"title":"Improved Conditional Privacy Protection in Vehicle Ad-hoc Networks","authors":"K. Mankar, Chitra T. Wasnik","doi":"10.1109/ICCMC.2019.8819827","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819827","url":null,"abstract":"Vehicle ad-hoc networks (VANETs) are susceptible to numerous attacks since all nodes of the network contain information like driver details, vehicle type, license plate, speed, location, and moving route. Since human lives are at stake, privacy is one of the major challenges. The abovementioned information is required by legal authorities for traffic management and prevention of accidents/crimes. Hence, the requirement of a conditional privacy scheme to achieve both obscurity as well as traceability has become a growing field of research. This paper presents an improved conditional privacy protection scheme in VANETs where an identity-based cryptosystem uses pseudonyms to assure user obscurity; at the same time, a backdoor access is provided for legal authorities to track defiant and untrustworthy users.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131803656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certificateless Aggregate Message Authentication for Hierarchical Trusted Authority based VANET 基于分层可信机构VANET的无证书聚合消息身份验证
Ruchi Dewangan, Fahiem Altaf, Soumyadev Maity
{"title":"Certificateless Aggregate Message Authentication for Hierarchical Trusted Authority based VANET","authors":"Ruchi Dewangan, Fahiem Altaf, Soumyadev Maity","doi":"10.1109/ICCMC.2019.8819737","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819737","url":null,"abstract":"In VANET, vehicles periodically transmit beacon messages to the neighboring vehicles and the RSU. To establish the authenticity of these messages, a number of digital signature schemes have been proposed in literature. Many of these schemes enable an RSU to perform aggregate verification of the signatures to deal with high vehicle density scenarios. These schemes are either based on traditional PKC concept involving certificate management overhead or identity based cryptography having key escrow problem. Further, these schemes require the existence of OBU device which is resistant to side channel attacks. In this paper, we propose a hierarchical trusted authority privacy preserving certificateless aggregate signature scheme for VANET. In addition to providing message authentication, integrity and non-repudiation, our scheme is resistant to message forgeability attack. The proposed scheme assumes hierarchical organization of network such that vehicles operate under multiple trusted authorities (TA) which in turn are controlled by single root TA. Using our scheme, the entity could verify messages received from vehicles which operate under multiple TAs. The proposed scheme is free from key escrow problem and resistant to side channel attacks on OBU. It also possesses conditional linkability such that originator of a message could be revealed whenever required. Simulations confirm the efficient nature in terms of verification delay as compared to other well known schemes proposed in literature.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134278595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Contemplation of Cloud Services Quality by exerting Coadunate-Coalesce Cryptography and Yajat method 运用共轭聚并密码和Yajat方法对云服务质量的思考
N V Satya Naresh Kalluri, Divya Vani Yarlagadda, K. R. Kumari, Rajesh Arepalli
{"title":"Contemplation of Cloud Services Quality by exerting Coadunate-Coalesce Cryptography and Yajat method","authors":"N V Satya Naresh Kalluri, Divya Vani Yarlagadda, K. R. Kumari, Rajesh Arepalli","doi":"10.1109/ICCMC.2019.8819847","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819847","url":null,"abstract":"Cloud computing is network consisting of configurable multifarious resources and predominant-level services which can be rapidly exerted with minimal management effort over the Internet. Cloud computing endows lot of services and consumers avail services from cloud agilely bestowed through internet. Some consumers without any knowledge about quality peculiarities, consumers may merely avail cloud service and feel unhappy, disenchant by using cloud service. As it is extremely imperative for consumers to recognize about cloud service quality before availing the service, this paper bestows about contemplation of quality for the services existing in cloud. This paper induces Yajat method for cogitation about cloud services quality to forthcoming patrons. In Yajat method quality ranking fixin based on different quality peculiarities is calculated for every service in cloud. Security quandary will occur while congregating quality assessment testimony by deeming multifarious quality peculiarities from consumers for Yajat method. To solve security quandary coadunate cryptography and Coalesce cryptography method is induced in this paper. Firstly by exerting Coadunate and coalesce cryptography, quality assessment testimony about cloud is collected securely and bestowed to Yajat method as input. Secondly by availing proctors in Yajat method, quality ranking fixin are calculated and bestowed to forthcoming consumers. The output of yajat method is bestowed to forthcoming consumers by proctors of cloud. Thus this paper intends forthcoming consumers by scrutinizing the output of yajat method, effortlessly choose to avail cloud service with the quality they aspire and feel elated, blissful by using cloud service.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130293382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Approaches to Identify and Prevent Cyber Attacks in Web 识别和预防网络攻击的新方法
S. Sodagudi, Sita Kumari Kotha, M. David Raju
{"title":"Novel Approaches to Identify and Prevent Cyber Attacks in Web","authors":"S. Sodagudi, Sita Kumari Kotha, M. David Raju","doi":"10.1109/ICCMC.2019.8819822","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819822","url":null,"abstract":"Security is the biggest challenging approach in today’s internet accessible technologies like, mobile phones, webmail, instant messaging services, and removable storage media. Internet access has given the ability to easily carry and handle the large amounts of data. With the growing technologies, the usage of internet increases along with the threats/data breaches like view or modify the confidential data by an unauthorized entities. Though the technology increases, there is no guarantee for the overall security. Every web application contains vulnerabilities and it is the most crucial area for the intruders to place cyber attacks on it. These attacks are very harmful for the society. They involve creating financial theft, data threats, blackmailing, resource upholding and many more. This paper provides the approaches to identify, detect and taking preventive measures for the eradication of attacks. For this available tools and scanners can also be used in the present world scenario. SQL injection, DNS attacks and DoS attacks are emphasized towards implementation since the risk encountered is more in such attacks.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115665049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信