2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)最新文献

筛选
英文 中文
Analysis and clustering of PingER network data PingER网络数据的分析与聚类
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508127
Anwesha Mal, A. Sabitha, Abhay Bansal, B. White, L. Cottrell
{"title":"Analysis and clustering of PingER network data","authors":"Anwesha Mal, A. Sabitha, Abhay Bansal, B. White, L. Cottrell","doi":"10.1109/CONFLUENCE.2016.7508127","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508127","url":null,"abstract":"The PingER project was started by the SLAC National Accelerator Laboratory, Stanford, California for the purpose of monitoring end to end network performance. For the last eighteen years PingER has generated an enormous amount of data that has been stored in space separated files. However due to the difficulties faced in retrieving data efficiently, it has been proposed that all the data be put into the form of RDF triples. Interpreting and analyzing such large volumes of data becomes a primary concern. By making using of clustering algorithms new and interesting patterns can be observed in the data sets. Outlier analysis can be performed giving insight to the exceptions occurring in the dataset and analyzing the probable causes of such. Patterns could be observed based on the country to which the data belongs and comparisons can be drawn between the patterns between the different countries.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126108374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A constrained re-growing concept for object separation in sea images 海洋图像中目标分离的约束再生概念
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508156
P. Sengar, Surabhi Singh, Naman Garg
{"title":"A constrained re-growing concept for object separation in sea images","authors":"P. Sengar, Surabhi Singh, Naman Garg","doi":"10.1109/CONFLUENCE.2016.7508156","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508156","url":null,"abstract":"In this paper, we present a technique to separate touching objects. This technique is divided into two stages; first separation of objects is achieved by successive threshold slicing, in this process most objects are reduced in size. Then, in order to regain the approximate size and shape the separated objects are re-grown to their original forms under the guidelines of a set of rules. Pixels having the potential for re-growth are identified. The pixel is re-grown only if its re-growth does-not disturb the established separation. We therefore allow separated objects to approximately regain their shape and size by constrained re-growing while maintaining the established separation. In this paper, we apply this algorithm to Synthetic Aperture Radar (SAR) images of sea ice floes.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"56 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114133023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study on various methods used in automatic video surveillance 对自动视频监控中使用的各种方法进行了研究
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508154
Surbhi Kapoor, Pushpendra Kumar Pateriya
{"title":"A study on various methods used in automatic video surveillance","authors":"Surbhi Kapoor, Pushpendra Kumar Pateriya","doi":"10.1109/CONFLUENCE.2016.7508154","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508154","url":null,"abstract":"Video surveillance is the most important issue in today's world as crime is increasing at an alarming rate. Moving object detection is first step in video surveillance. Analyzing video scenes is a challenging task for humans. So, efficient algorithms are deployed to do so. Detection and tracking of objects in videos is critical for wide solicitation fields such as crime detection, fight detection, person identification etc. Many methods exist to analyze the object behavior which includes background subtraction, foreground detection, cross scene abnormal detection etc. This work presents a review on available techniques for analyzing the behavior along with comparative study among various methods.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125632990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A trust based secure routing scheme for MANETS 基于信任的MANETS安全路由方案
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508183
V. Bhargavi, M. Seetha, S. Viswanadharaju
{"title":"A trust based secure routing scheme for MANETS","authors":"V. Bhargavi, M. Seetha, S. Viswanadharaju","doi":"10.1109/CONFLUENCE.2016.7508183","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508183","url":null,"abstract":"A MANET is a kind of wireless mobile network that can be easily established with the help of few infrastructure less connections. In such networks, every node is independent of its own and hence can act as a router and performs the job of routing as well. All the nodes in a MANET are dynamic in nature, in that the nodes can change their location from time to time due to their mobility feature, and any node is free to join and leave the network as and when needed and hence we can say that the topology changes dynamically. In recent days, security in MANET's has been the prime focus within the research community. There are many different attacks aimed at MANET's but solutions to these have been not paid much attention in literature. There are several methods that can deal with security issues in wired networks but the same cannot be used for wireless networks. There are many routing protocols proposed for MANET's but most of them exhibit poor performance in the presence of malicious nodes. This paper focuses on a new hybrid secure routing protocol S-DSR that establishes a secure communication path across the nodes in the network which can improve the packet delivery ratio and throughput etc. This protocol helps in finding the best path for secure file transmission based on the trust information from the neighbouring nodes. The proposed protocol has been implemented on NS-2. This protocol achieves better packet delivery ratio and reduced delay when compared with protocols like AODV, AOMDV etc.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Group based analysis of AODV related protocols in MANET 基于分组的MANET中AODV相关协议分析
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508180
Mamata Rath
{"title":"Group based analysis of AODV related protocols in MANET","authors":"Mamata Rath","doi":"10.1109/CONFLUENCE.2016.7508180","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508180","url":null,"abstract":"With an objective of study and analysis of power efficient routing protocols in Mobile Adhoc Network(MANET), this paper presents a report on performance of Adhoc On Demand Distant Vector (AODV) oriented MANET routing protocols which are founded on power aware techniques and also support quality of service parameters and resource reservation strategies. The comparison is based on the type and extent of delay management techniques, Quality of service conditions and resource reservation methods used by these important protocols while minimizing the end to end delay during transmission. Secondly the paper also presents a complete analysis on the mechanism of routing , advantages and scope for further improvement for research in these protocols which will provide sufficient information and scope for further research in this magnificent area of MANET.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132562818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Correlation analysis on real-time tab-delimited network monitoring data 实时标签分隔网络监测数据的相关性分析
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508126
Aditya Pan, Jahin Majumdar, Abhay Bansal, B. White, R. Cottrell
{"title":"Correlation analysis on real-time tab-delimited network monitoring data","authors":"Aditya Pan, Jahin Majumdar, Abhay Bansal, B. White, R. Cottrell","doi":"10.1109/CONFLUENCE.2016.7508126","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508126","url":null,"abstract":"The PingER End-End performance monitoring of the Internet, is led by the SLAC National Accelerator Laboratory. It was created to answer the growing need to monitor the network both to analyze current performance and to designate resources to optimize execution between research centers, and the universities and institutes co-operating on present and future operations. The monitoring support reflects the broad geographical area of the collaborations and requires a comprehensive number of research and resources. The data architecture retrieval and methodology of the interpretation have emerged over numerous years. Analyzing this data is the main challenge due to its high volume. By using correlation analysis, we can make crucial conclusions about how the network data affects the performance of the hosts and how it depends from countries to countries.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133423174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wormhole attacks in MANET MANET中的虫洞攻击
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508120
Nitika Gupta, Shailendra Narayan Singh
{"title":"Wormhole attacks in MANET","authors":"Nitika Gupta, Shailendra Narayan Singh","doi":"10.1109/CONFLUENCE.2016.7508120","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508120","url":null,"abstract":"A mobile ad hoc network or MANET are those wireless networks which posses no infrastructure which are connected by the wireless nodes. And these nodes are generally mobile and the connectionless links are used basically to connect these nodes and these nodes have the capability to self organize and self configure and self arrangement capability. They are not having uniform structure. Because of their mobility and their dynamic nature they are prone to many kinds of malicious attacks by the malicious users because in this every node acts as a sender receiver and the router so no node can be able to understand whether the data has been sent by the malicious sender or the true sender or the receiving node is the true node. Hence by this the data can be lost as well as can be dropped by the malicious user and it can send the fake data to the receiver as well. So there are actually many kinds of attacks at the network layer. MANETS are generally more prone to cyber attacks rather than the wired networks because of their mobile nature. So these attacks like wormhole attacks are a very big issue in the case of networks. As the demand of wireless networks is increasing day by day. So it is a big concern of about how to prevent these kinds of attacks. So that they may not affect the network layer further. So in this paper we are focusing upon these attacks and also about how by using hardware rather than software we can solve the wormhole attacks by using cryptography and the digital signature method.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132234034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Performance evaluation of spectrum Sensing techniques under Noise 噪声下频谱传感技术的性能评价
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508123
S. Dhanda, Mayank Gupta, Achyut Sharma, R. Roy
{"title":"Performance evaluation of spectrum Sensing techniques under Noise","authors":"S. Dhanda, Mayank Gupta, Achyut Sharma, R. Roy","doi":"10.1109/CONFLUENCE.2016.7508123","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508123","url":null,"abstract":"Noise has always been the most important constraint upon the sensing of Primary User in the frequency spectrum. Evaluation of various spectrum sensing schemes under noise gives us a fair idea about their robustness. Energy detection is fast but other Sensing techniques are better when it comes to the performing under Noise. Simulations are done for the three techniques at different noise levels. Detection result at different SNR levels are plotted. Response of the Eigen detection is the least effected with change in SNR(20 dB) and a change of 13.74% in case of matched filter detection is observed and it has been found that Cyclostationary is less affected by noise as compare to Matched Filter detection. Eigen value detection it remained almost constant.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134377364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICT and internet of things for creating smart learning environment for students at education institutes in India 信息通信技术和物联网为印度教育机构的学生创造智能学习环境
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508209
Munib ur Rahman, Himanshi, V. Deep, S. Rahman
{"title":"ICT and internet of things for creating smart learning environment for students at education institutes in India","authors":"Munib ur Rahman, Himanshi, V. Deep, S. Rahman","doi":"10.1109/CONFLUENCE.2016.7508209","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508209","url":null,"abstract":"Educational institutes have gone beyond the traditional way of learning by accepting the latest technologies and modern trends, making learning more innovative. The interactive technologies and Instant communication services have transformed the methods adopted for education into a more interactive, visualizable and accessible means. Education institutes in India, are in a process of adopting innovative techniques for creating a smart learning environment to nurture young talent. But according to National Survey findings, 13 out of every 100 Indians between 5-29 years drop out or refrain from going to school, as they do not consider education “necessary”. In this paper, we will discuss about how academic learning can be made reachable and motivating for the students using ICT and IoT, besides introducing them to their core subjects with interactive ways of Smart learning. Information Communication Technology promises a wide range of applications and devices for learning environments, whereas Internet of things is all about connecting devices, making them smart and self-controllable.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133840792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Improvement of lifetime duty cycle using genetic algorithm and network coding in wireless sensor networks 利用遗传算法和网络编码改进无线传感器网络的寿命占空比
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence) Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508192
Paurush Bhulania, Nikhil Gaur, Keithellakpam Poirei Federick
{"title":"Improvement of lifetime duty cycle using genetic algorithm and network coding in wireless sensor networks","authors":"Paurush Bhulania, Nikhil Gaur, Keithellakpam Poirei Federick","doi":"10.1109/CONFLUENCE.2016.7508192","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508192","url":null,"abstract":"The process of a sensor network is to control by a big number of parameters, such as the wireless duty cycle, the frequency of neighbor discovery inspirations, and the rate of sample sensors. In this paper we propose a reduced-complexity Genetic Algorithm (GA) for optimization of multi-hop sensor networks in two stages such as randomized and circular bottleneck network node scheduling. The goal of the system is to generate optimal number of sensor clusters with Cluster-Heads (CHs). The GA is used to adaptively create various components such as cluster-members; Performance improvement by using GA namely; packet delivery ratio and average latency have also been investigated. A full theoretical analysis and simulation results have been providing to display the efficacy of the proposed approach improved x-OR using GA showing efficiency better as compare to basic XOR method and producing maximum packet delivery ratio.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115232587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信