2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)最新文献

筛选
英文 中文
Multi-Tier Data Encryption Algorithm 多层数据加密算法
2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) Pub Date : 2020-06-01 DOI: 10.1109/ICOEI48184.2020.9142890
M. Abid, S. Revathy
{"title":"Multi-Tier Data Encryption Algorithm","authors":"M. Abid, S. Revathy","doi":"10.1109/ICOEI48184.2020.9142890","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142890","url":null,"abstract":"Gentry, Sahai, and Waters created the first identity-based encryption (IBE) and lattice-based cryptography in CRYPTO 2013. This scheme is improved in this paper by exploiting the US National Security Agency's (NSA) hashing function. POSIX is used to create a small and portable algorithm to assimilate multiple keys under a single identity-key that enables protection under different identities to be evaluated as one. The encryption renders the original file transformed by splitting it and encrypting the resulting files before encrypting the combination as a whole. Focus has been converged on modulating and modifying available encryption techniques to be processed as multiple segments of a single algorithm for more robust and powerful application. Both, the passkey as well as the data is encrypted using sets of pre-defined encryption techniques and the algorithm is processed via legacy libraries to be more versatile and provide an easy to implement scheme. The algorithm is developed to be applied in the instances of standalone dataset or in cases of virtualization where the algorithm can be inherited by the subsystems as modules to be used for security purposes.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121366714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Domain-Specific Allocation & Load Balancing in Cloud Computing Using Virtual Machines 基于虚拟机的云计算领域特定分配与负载均衡
2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) Pub Date : 2020-06-01 DOI: 10.1109/ICOEI48184.2020.9143006
N. Manikandan, S. Devayani, M. Divya
{"title":"Domain-Specific Allocation & Load Balancing in Cloud Computing Using Virtual Machines","authors":"N. Manikandan, S. Devayani, M. Divya","doi":"10.1109/ICOEI48184.2020.9143006","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143006","url":null,"abstract":"Domain specific allocation plays a major role in cloud computing. The recent trends in cloud computing attracts user to generate random requests to any processor which are not domain specific. Therefore load balancing is a significant aspect in distributing the workload evenly among all the nodes. Since the workload is not distributed uniformly, some processors are overloaded while others are under-loaded. This might result with the resources being overheated, sometimes might lead to carbon emission. Therefore in domain-specific storage text based and image based files are stored separately in two virtual machines for faster response. This paper presents the SJF scheduling algorithm for load balancing and AES algorithm for data encryption. The data is migrated into cloud called CloudMe for data recovery and data storage. This reduces the excessive work of the servers and provides efficient load balancing. The project handles both basic and premium users where premium user requests are prioritized and handled. The ‘n’ number of requests that is generated using bots by brute force attack can also be prevented. Thus the project aims to maintain a domain-specific storage to avoid overloading of virtual machines and maintains system stability and reduce carbon emission.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122851872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Construction of Programmable Time-to- Amplitude Converter 可编程时幅转换器的设计与构造
2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) Pub Date : 2020-06-01 DOI: 10.1109/ICOEI48184.2020.9142973
Aishwarya Salvi, Kanchan Chavan, P. Vaidya
{"title":"Design and Construction of Programmable Time-to- Amplitude Converter","authors":"Aishwarya Salvi, Kanchan Chavan, P. Vaidya","doi":"10.1109/ICOEI48184.2020.9142973","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142973","url":null,"abstract":"A method of implementation of programmable time- to-amplitude converter is reported in this paper. It employs a 16-bit multiplying digital-to-analog converter which outputs a precise current equivalent to the digital code applied. An integrator circuit using an operational amplifier having a low input bias current with a very high-speed analog switch in its feedback is used that governs the charging and discharging of the ramp. The start and stop pulses are applied to this switch. As per the change in the digital code applied, the slope varies thus changing the time interval measurement range. The time in this case is programmable due to the incorporation of 16- bit multiplying DAC. The digital code provided to the digital-to-analog converter is through a graphical user interface developed using python 3.7 software. A teensy 3.6 board is used for PC interface and to generate required input code to digital- to-analog converter.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115458498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Magnetic Resonance Images Based Brain Tumor Segmentation- A critical survey 基于磁共振图像的脑肿瘤分割——一项重要研究
2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) Pub Date : 2020-06-01 DOI: 10.1109/ICOEI48184.2020.9143045
V. Sravan, K. Swaraja, K. Meenakshi, Padmavathi Kora, M. Samson
{"title":"Magnetic Resonance Images Based Brain Tumor Segmentation- A critical survey","authors":"V. Sravan, K. Swaraja, K. Meenakshi, Padmavathi Kora, M. Samson","doi":"10.1109/ICOEI48184.2020.9143045","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143045","url":null,"abstract":"In medical image anatomy, brain tumor extraction occupies an important role. This is used for medical diagnosis and thus leading towards the treatment of disease. The objective of the paper is to present various MR brain image segmentation techniques ranging from elementary threshold methods to complicated methods such as deformable methods, hybrid methods. The motivation of this study is early detection and identification of the brain tumor. In this paper, the main focus is on gliomas tumor which is the most recurrent type of malignant brain tumors. This work presents various research studies in brain tumor segmentation along with deep learning techniques such as Convolutional Neural Network.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127238927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Construction of Audit Internal Control Intelligent System Based on Blockchain and Cloud Storage 基于区块链和云存储的审计内控智能系统构建
2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) Pub Date : 2020-06-01 DOI: 10.1109/ICOEI48184.2020.9143061
Ying Wang, Yong Gou, Yinjuan Guo, H. Wang
{"title":"Construction of Audit Internal Control Intelligent System Based on Blockchain and Cloud Storage","authors":"Ying Wang, Yong Gou, Yinjuan Guo, H. Wang","doi":"10.1109/ICOEI48184.2020.9143061","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143061","url":null,"abstract":"Construction of audit internal control intelligent system based on Blockchain and cloud storage is conducted in this paper. At present, the development of artificial intelligence in various fields is getting better and better, and the artificial intelligence information technology is slowly beginning to converge towards the auditing field. The blockchain storage application system requires each node to store a complete data, causing waste of the storage resources; at the same time, it does not make full use of the network routing traffic resources. Based on this background, this paper proposes the novel AI and BC based intelligent system for the audit internal control. The system is designed and validated through the simulation. The proposed intelligent system can improve the overall efficiency.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127334760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Circularly Polarized Cylindrical Slot Antenna With and Without DGS 带和不带DGS的圆极化圆柱槽天线
2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) Pub Date : 2020-06-01 DOI: 10.1109/ICOEI48184.2020.9142893
S. Khade, Aditya Chinchole, Pooja Pandey, Shweta Umredkar, Vaidehi Magare, Mrummayee Sonkusale
{"title":"Circularly Polarized Cylindrical Slot Antenna With and Without DGS","authors":"S. Khade, Aditya Chinchole, Pooja Pandey, Shweta Umredkar, Vaidehi Magare, Mrummayee Sonkusale","doi":"10.1109/ICOEI48184.2020.9142893","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142893","url":null,"abstract":"A cylindrical slot antenna having circular cavity with and without DGS has been proposed in this paper. It has two circular slots and main radiating rectangular slot. A wide comparison in results of DGS and without DGS design of the given antenna is stated. The various simulation results mainly consisting of s-parameter, impedance, VSWR, gain, radiation pattern, Ludwig 3 left and Ludwig 3 right measurements are discussed. This structure also attains circular polarization. In DGS design, operating frequency range from 2.16 GHz to 4.57 GHz is covered with resonance at 3.99 GHz and 2.4 GHz. Moreover, 8.7 GHz to 9.5 GHz frequency band is achieved. When antenna structure without DGS is considered then frequency band range from 2 GHz to 2.77 GHz and wideband frequency from 4.3 GHz to 7.26 GHz is attained. So, this antenna design can be used in various applications like RLAN, WLAN, Wi-Fi, Wi-MAX, 3G, 4G, 5G and others.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114390752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
User Request Emotion Prediction Approach in a Crowdsourcing Platform 众包平台中的用户请求情感预测方法
2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) Pub Date : 2020-06-01 DOI: 10.1109/ICOEI48184.2020.9143021
K. Priyanga, M. Alamelu
{"title":"User Request Emotion Prediction Approach in a Crowdsourcing Platform","authors":"K. Priyanga, M. Alamelu","doi":"10.1109/ICOEI48184.2020.9143021","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143021","url":null,"abstract":"Sentiment analysis manages to recognize and arranging opinions or conclusions communicated in the source content. The far-reaching of the World Wide Web has brought another method for communicating the assumptions of people. Web-based social networking is creating an immense measure of estimation rich information as tweets, status updates, blog entries, and so on. Sentiment analysis of this user-generated information is extremely helpful in knowing the opinion of the group. Twitter sentiment analysis is troublesome contrasted with general sentiment analysis because of the existence of slang words and incorrect spellings. It is additionally a medium with a tremendous measure of data where clients can see the opinion of different clients that are categorized into various sentiment classes and are progressively developing as a key factor in dynamic. In this paper, the Emotion Prediction approach has been established by collecting the real-time twitter data from the Twitter API, pre-processing the data and to predict the emotions using various Machine Learning algorithms. The proposed user emotion prediction approach can be used to predict the emotions of the user and the user emotion approach has been compared with the machine learning and sentiment classification algorithms. With the comparative study of the algorithm, the best accuracy can be analyzed for the user emotion analysis. The crowdsourcing system can be used for the Business systems to predict the popularity of their brands and to make changes in their brand according to the feedback received. This proposed Emotion Prediction approach is mainly focusing on working with a real-time Twitter dataset. With the evaluated accuracy measure the end-user can make a quick prediction in the usage of the crowdsourcing system.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"294 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120838542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation and Cryptanalysis of Lightweight Block Ciphers 轻量级分组密码的实现与密码分析
2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) Pub Date : 2020-06-01 DOI: 10.1109/ICOEI48184.2020.9143027
Ms P. AiswaryaMeenakshi, Ms R. VeeraSanthya, Ms R.Sherine Jenny, R. Sudhakar
{"title":"Implementation and Cryptanalysis of Lightweight Block Ciphers","authors":"Ms P. AiswaryaMeenakshi, Ms R. VeeraSanthya, Ms R.Sherine Jenny, R. Sudhakar","doi":"10.1109/ICOEI48184.2020.9143027","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143027","url":null,"abstract":"Encryption has become an important need for each and every data transmission. Large amount of delicate data is transferred regularly through different computer networks such as e-banking, email applications and file exchange. Cryptanalysis is study of analyzing the hidden information in the system. The process of cryptanalysis could be done by various features such as power, sound, electromagnetic radiation etc. Lightweight cryptography plays an important role in the IoT devices. It includes various appliances, vehicles, smart sensors and RFID-tags (RFID). PRESENT is one such algorithm, designed for resource constrained devices. This requires less memory and consumes less power. The project propounds a model in which the cryptographic keys are analyzed by the trace of power.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124187688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on Steganography using Least Significant bit (LSB) Embedding Approach 基于最小有效位(LSB)嵌入方法的隐写技术综述
2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) Pub Date : 2020-06-01 DOI: 10.1109/ICOEI48184.2020.9142896
Kriti Bansal, A. Agrawal, Nency Bansal
{"title":"A Survey on Steganography using Least Significant bit (LSB) Embedding Approach","authors":"Kriti Bansal, A. Agrawal, Nency Bansal","doi":"10.1109/ICOEI48184.2020.9142896","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142896","url":null,"abstract":"The way of keeping the existence of the message secret is known as steganography. It is the process of hiding secret information inside a data source. It has many applications in different platforms such as medical, online transactions, defence and many more. It is utilized in circumstances where the secrecy of data is required in communication. In steganography, data can be covered up in content arrangement, images, audio and video. It depends on the quality of a steganographic procedure that lies in its ability to keep the message, as secret as could reasonably be expected and furthermore the measure of information that can be covered up, as enormous as could be allowed. This paper gives a survey on the LSB approach used in this area. Here, LSB technique is used for image, audio as well as video steganography.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115606932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Audio Forgery Detection Techniques: Present and Past Review 音频伪造检测技术:现在和过去的回顾
2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) Pub Date : 2020-06-01 DOI: 10.1109/ICOEI48184.2020.9143014
Prabhu R. Bevinamarad, M.S. Shirldonkar
{"title":"Audio Forgery Detection Techniques: Present and Past Review","authors":"Prabhu R. Bevinamarad, M.S. Shirldonkar","doi":"10.1109/ICOEI48184.2020.9143014","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143014","url":null,"abstract":"The increase in low cost digital audio recorders, mobile applications and accelerating growth of the audio-based Internet of Things (IoT) has initiated ease in obtaining speech and audio data which will be later used for the purpose of identifying human traits, implementing voice authentication system and development of voice based embedded systems. On the other hand, the availability of free advanced mobile applications and audio editing software like Adobe, Audition CC, etc. enabling people to edit easily the meaningful content of audio recordings data for getting benefit from e-services or producing it in a courtroom for the purpose digital proof. Perhaps, most of the people do it for fun as well as the strong intention of hiding reality present. Moreover, the audio recording captured in a real-life today does not contain digital watermarking and signature content for authentication because of expensive procedure. Therefore, in recent years the researches focused more on developing active audio forgery detection techniques for copy-move and audio splicing forgeries to authenticate and verify for its genuineness. In this paper, put an effort to describe past and present developments in audio copy-move and audio splicing forgery techniques. The paper also presents an overview of audio forgeries, its classification, various post-processing operations used and available audio dataset for forgery sample preparation for benchmark testing.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"376 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122862435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信