2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)最新文献

筛选
英文 中文
Comparing the Access Control Mechanism in Database, Cloud and Femtocells 数据库、云和基站访问控制机制的比较
Harshita R. Jhurani, P. Chandana, Yarram Vijay Kumar Reddy, M. Sharada
{"title":"Comparing the Access Control Mechanism in Database, Cloud and Femtocells","authors":"Harshita R. Jhurani, P. Chandana, Yarram Vijay Kumar Reddy, M. Sharada","doi":"10.1109/ICECA.2018.8474933","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474933","url":null,"abstract":"Security has been a major issue since the evolution of mankind. Access control refers to providing access to data only to specified users. In the present time, various mechanisms are used and many policies have been implemented to secure the confidential data. These mechanisms are not always easy to be implemented. Many challenges are met during the execution and various devices have been designed in an ad-hoc fashion to meet the present day requirements. The deployment of these devices and methods in various fields has solved the protection issue to a large extent. This paper represents the SQLIA and XSS attacks, the techniques that are compared to few mechanisms used to restrict unethical access to database, cloud and femtocells that followed in day-to-day life, and the challenges met to obtain them.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130791059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Petite Guide to Programming in 64bit X86 Assembly Language for Linux Linux 64位X86汇编语言编程指南
Vidya Pokale, Madhuri Chavan
{"title":"A Petite Guide to Programming in 64bit X86 Assembly Language for Linux","authors":"Vidya Pokale, Madhuri Chavan","doi":"10.1109/ICECA.2018.8474886","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474886","url":null,"abstract":"since the invention of the personal computers, programmers have used assembly language to create innovative solution for a wide variety of algorithmic challenges. This paper introduces a subset of X64, including NASM (Netwide Assembler), LD-GNU linker, Linux system calls.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130293579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure boot of Embedded Applications - A Review 嵌入式应用程序的安全启动综述
R. Rashmi, A. Karthikeyan
{"title":"Secure boot of Embedded Applications - A Review","authors":"R. Rashmi, A. Karthikeyan","doi":"10.1109/ICECA.2018.8474730","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474730","url":null,"abstract":"Trusted Computing focusses on the security of systems by using hardware-software combination to guarantee security. Although there are various techniques to enhance security, new technological advancements bring in new ways for attackers also to inject their malicious software and infections. The modern world uses all smart devices and systems which includes a network with embedded Operating System, sensors and so on. So security becomes a serious issue not only to system Operating System in personal computers but to all these smart devices. Secure boot is a technique which ensures the only the right Operating System gets booted. This paper analyses the process of secure boot done in each of the applications to protect OS kernel from attackers.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127898026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Transitions Between Amorphous and Crystalline States Using Electrical Pulse in Tellurium-Based Semiconductor 利用电脉冲在碲基半导体中实现非晶态和晶态的转换
T. Chakraborty
{"title":"Transitions Between Amorphous and Crystalline States Using Electrical Pulse in Tellurium-Based Semiconductor","authors":"T. Chakraborty","doi":"10.1109/ICECA.2018.8474622","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474622","url":null,"abstract":"The phase transitions between amorphous and crystalline states by applying electrical pulses in tellurium-based semiconductor at room temperature has been studied in this paper. The memory device was fabricated by a semiconductor thin film of composition GelO Te90 sandwiched between two metal electrodes. Binary states ‘0’ and ‘1’ may be assigned to the high resistive amorphous state and the low resistive crystalline state, respectively. High-speed write and erase operations in the memory device were induced by applying short and long electrical pulses. It was found that for the given write and erase conditions, about 3500 write-erase cycles were attained by the application of electrical pulses. It is observed that the write and erase operations can not be performed for the given write and erase pulses after 3500 number of cycles. The resistivity drop of the amorphous state of the memory device after a number of write-erase cycles is also discussed in this paper.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125610013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Distance Based Reactive Routing Clustering Protocol for Heterogeneous Wireless Sensor Networks 异构无线传感器网络中基于距离的响应路由聚类协议设计
P. Shailaja, A. Karthikeyan
{"title":"Design of Distance Based Reactive Routing Clustering Protocol for Heterogeneous Wireless Sensor Networks","authors":"P. Shailaja, A. Karthikeyan","doi":"10.1109/ICECA.2018.8474795","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474795","url":null,"abstract":"A Wireless Sensor Network consists of sensor nodes which sense, accumulate data and transmit those to the base station. Since these remote sensor nodes in the network are battery constrained, it is important to choose a suitable energy efficient routing protocol to prolong the network lifetime. In this paper we propose a heterogeneous sensitive routing protocol with distance based efficient clustering. We assess the performance of our protocol using MATLAB and compare the results with other protocols namely SEP, ZSEP, TSEP and ETSEP. The simulation outcomes show that the suggested protocol is better than the existing ones as far as the lifetime of the network is concerned.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126436421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Maximum Power Point Algorithms for PV System 光伏系统最大功率点算法研究进展
V. Baghel
{"title":"A Survey on Maximum Power Point Algorithms for PV System","authors":"V. Baghel","doi":"10.1109/ICECA.2018.8474644","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474644","url":null,"abstract":"To extract the maximum power out of PV array, a low-cost maximum power point tracker (MPPT) introduced at MIT Lincoln Laboratory in 1980. Since then many MPPT algorithms, with many variants on implementation, have been reported. In addition to presenting a comprehensive review on the various MPPT techniques employed for different PV systems, this paper is also envisioned to act as a quick reference for a few popular MPPT algorithms.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122277869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Overview of VM Live Migration Strategies and Technologies 虚拟机热迁移策略和技术概述
Krushi Damania, Shraddha Holmukhe, Videet Singhai, P. Bhavathankar
{"title":"An Overview of VM Live Migration Strategies and Technologies","authors":"Krushi Damania, Shraddha Holmukhe, Videet Singhai, P. Bhavathankar","doi":"10.1109/ICECA.2018.8474910","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474910","url":null,"abstract":"Cloud computing is an effective technology in handling computation with dynamically scalable resources. With the growth of multimedia applications, mobile applications have become resource-intensive. To provide better connectivity with the cloud, cloudlets have been introduced, which in turns provide low latency and high bandwidth. Cloudlets also enable us to optimize Virtual Machine Migration amongst them. In this paper, we discuss the Live migration of Virtual machines, various types of live migration with respect to strategies supplemented with storage technologies; NFS and GlusterFS. An overview of migration in cloudlets and Fog computing architecture are elucidated.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116130460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Code Generator for Model- Driven Software Development Using UML Models 使用UML模型的模型驱动软件开发代码生成器
Molla Kindie Shiferaw, A. Jena
{"title":"Code Generator for Model- Driven Software Development Using UML Models","authors":"Molla Kindie Shiferaw, A. Jena","doi":"10.1109/ICECA.2018.8474690","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474690","url":null,"abstract":"Models are the most important core of Science, Technology and Designing. Display based ways to deal with software advancement and system building utilize technology to incorporate graphical demonstrating languages. Model driven software development is an approach of using models to automatically create the source code implementation of a software structure. The Model Driven Architecture (MDA) approach has been getting position as the Model Driven Approach of an option since its use of Unified Modeling Language(UML). The MDA solution is to produce all code of a system from models and give attention to maintaining models merely in the software development. But, due to shortage of code production tools and the UML language itself, an accurate MDA does not understand by developers. The critical proposal is to identify system functionality with a Platform Independent Model and next to convert this model into Platform Specific Models and completely generate executable source code from model. Model conversion creates the most important component of MDA approach. Generating models and source code from other models by using MDA technology tools is the key standard of MDA approach. Therefore, manual conversion is an extremely time and other resource consuming work in software development. This paper describes not only generating code from model but also generates model from code or it also describes reverse engineering(Code-Model conversion). Keywords: Model-Driven, Code Generator, Model, Software Development, UML, MDA, platform, Model Transformation.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116646379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A New Approach for Segmentation and Detection of Brain Tumor in 3D Brain MR Imaging 三维脑磁共振成像中脑肿瘤分割与检测的新方法
Dr. A. Jagan
{"title":"A New Approach for Segmentation and Detection of Brain Tumor in 3D Brain MR Imaging","authors":"Dr. A. Jagan","doi":"10.1109/ICECA.2018.8474874","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474874","url":null,"abstract":"Segmentation of brain MR Images plays prime role for measuring and visualizing the brain anatomical structures, analyzing brain tumors, and surgical planning. In the comparable research, outcomes were demonstrated the segmentation and detection of tumor in 2D Brain MR Images by amalgamation of diverse methods and techniques. Conversely, the precise outcomes were not been exhibited in the related researches works for the segmentation and detection of tumor in 3D Brain MR Images. As a result, this proposed work focused on development of an automatic integrated segmentation Frameworkfor detection of tumor in brain 3D MR Images which incorporate the most established improved EM (Expectation Maximization) method and Fuzzy C Means Clustering method. The proposed framework optimally merges the segmentation results of most established method and it exhibits the improvement in brain MR image segmentation. The most popular an anisotropic filter is employed to the improved EM (Expectation Maximization), Fuzzy C Means Clustering Method and Proposed Augmentation Method to improve the quality brain MR image and to produce better segmentation and detection of tumor. The performance results of proposed framework is evaluated on simulated brain Fluid-Attenuated Inversion Recovery MRI images and real brain dataset. The performance results of the proposed research work present superior results than the state-of-the-art methods and the proposed work is quantified with segmentation accuracy, sensitivity and specificity.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124897000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Discover Cross-Modal Human Behavior Analysis 发现跨模式人类行为分析
Pravin Tripathi, Pratik P. Watwani, S. Thakur, A. Shaw, S. Sengupta
{"title":"Discover Cross-Modal Human Behavior Analysis","authors":"Pravin Tripathi, Pratik P. Watwani, S. Thakur, A. Shaw, S. Sengupta","doi":"10.1109/ICECA.2018.8474611","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474611","url":null,"abstract":"Job interviews are a predominant part of any hiring process to evaluate applicants. It is used to evaluate applicant's knowledge, skills, abilities, and behavior in order to select the most suited person for the job. Recruiters make their opinion, on the basis of both verbal and nonverbal communication of an interviewee. Our behavior and communication in daily life are cross-modal in nature. Facial expression, hand gestures and body postures are closely linked to speech and hence enrich the vocal content. Nonverbal communication plays an important role in what we are saying and what we actually mean to say. It carries relevant information that can reveal social construct of a person as diverse as his personality, state of mind, or job interview outcome; they convey information in parallel to our speech. In this paper, we present an automated, predictive expert system framework for the computational analysis of HR Job interviews. The system includes analysis of facial expression, language and prosodic details of the interviewees and thereby quantifies their verbal and nonverbal behavior. The system predicts the rating on the overall performance of the interviewee and on each behavior traits and hence predict their personality and hireability.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116563931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信