Pratik Kanani, Kriti Srivastava, Janan Gandhi, Disha H. Parekh, Meeth Gala
{"title":"Obfuscation: Maze of code","authors":"Pratik Kanani, Kriti Srivastava, Janan Gandhi, Disha H. Parekh, Meeth Gala","doi":"10.1109/CSCITA.2017.8066544","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066544","url":null,"abstract":"Software Reverse Engineering scenario would involve software that has been worked upon for years and carries several modules of a business in its lines of code. Unfortunately the source code of the application has been lost, what remains is “native” or “binary” code. Traditional obfuscators work on binary code but they are tedious and do not provide us with a specific obfuscation depending upon the code. A way is provided in which the code can be obfuscated depending upon lines of code and variables. The application of this data confers to the additional information developers need to better understand, maintain and develop software in large team settings. The solution is provided in order to encourage software piracy and impede malware analysis. This paper introduces MAZE-OF-CODE, reveals the results of our evaluation and proposes directions for future research in this area. MAZE-OF-CODE will increase size of code and compilation time is also satisfactory and makes software reverse engineering difficult.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122091985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role of genetic algorithm in performance improvement of image steganography combined with transform and its hybrid wavelet","authors":"Shweta Joshi, Kavita Sonawane, S. Khan","doi":"10.1109/CSCITA.2017.8066539","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066539","url":null,"abstract":"This paper proposes an image steganography for hiding secret images. The objective of the proposed work is to increase the embedding capacity while ensuring the security of the image. This has been addressed using two levels of processing. First is the application of Genetic Algorithm (GA) as ‘before embedding hiding technique’ which tries to identify suitable places in cover image where embedding of secret image will not lead to much distortion in the image. Second process is improvement using Discrete Cosine Transform (DCT) and its wavelet (DCWT) to gain the advantage of their energy compaction property. The secret image is embedded in the lower energy transformed regions of the cover image. The paper makes a comparison between DCT and DCWT (with and without using GA). The experimental results are evaluated using various performance evaluation parameters such as Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and Correlation. The overall comparison proves that both DCT and DCWT perform better when combined with genetic algorithm. This work also proves that the proposed two level processing contributes in improvement of both security as well as embedding capacity for the image steganography.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122004002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Spencer Lawrence Kinny, Kalpita Wagaskar, A. Tripathy
{"title":"Endorse your brand: Self development tool for agile employment","authors":"Spencer Lawrence Kinny, Kalpita Wagaskar, A. Tripathy","doi":"10.1109/CSCITA.2017.8066552","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066552","url":null,"abstract":"In today's high paced world where time management stands next to God, it becomes very essential to manage all our roles as well as goals, in order to complete the given task on time. The inability of an individual to do so might lead to serious consequences. At times one might feel extreme pressure and cannot stop worrying about tomorrow's job and pending deadlines. Along with this one has to also acquire skills that make him stand out from the rest of the crowd, which means he has to learn new technologies and keep himself abreast and up-to-date. In order to keep moving on and continue to live in this competitive world, one has to nurture themselves in the right way so that they can cope up with the ever increasing work pressure and at the same time keep oneself ready for competition. In this paper we are proposing a solution to manage all the activities by creating a goal oriented approach to scheduling activities at hand. This dynamic timetable will provide reminders on regular basis, and ensure that you complete each and every task on time without pressure and chaos.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127729024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synthesis and classification of LC oscillators","authors":"T. Rathore","doi":"10.1109/CSCITA.2017.8066570","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066570","url":null,"abstract":"A systematic synthesis procedure is given for realizing a class of oscillators. An oscillator basically consists of an amplifier and a passive network N in its feedback path. When gain A of the amplifier is negative real one additional buffer amplifier is required. It is shown that if OA-based amplifier is used for realizing A, the synthesized oscillators are such that their performance is not influenced by the input and output impedances of the OA. In all we have first derived a set of 6 oscillators when N is a π-network and then another set of 6 oscillators, when N is a T-network, is obtained by L-C transformation. Within these 12 of oscillators, some can be derived from some other by network transformations. Finally classification of the derived oscillators based on various factors is given.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115976580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heuristic approach for association rule hiding using ECLAT","authors":"Melissa Femandes, Joanne Gomes","doi":"10.1109/CSCITA.2017.8066557","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066557","url":null,"abstract":"In many organizations huge amount of data is generated. Organizations use this data for their own benefit. Data mining extracts useful knowledge from huge data. Association rule mining is a powerful technique to find hidden patterns in large database. The limitation of mining association rules is that some sensitive patterns are revealed from sensitive rules. It is necessary to hide sensitive rules due to privacy concerns. The technique used to hide sensitive rules in order to get sanitized data is called Association rule hiding. The paper aims at proposing a methodology which includes blend of equivalent class transformation (ECLAT) algorithm used to find frequent item sets and heuristic approach which is one of the methods of association rule hiding. The proposed hybrid approach is evaluated on the basis of execution time, dissimilarity, lost rules, hiding failure and number of transactions modified.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132513624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blind speech separation using canonical correlation and performance analysis","authors":"V. A. Kumar, C. V. R. Rao, Anirban Dutta","doi":"10.1109/CSCITA.2017.8066572","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066572","url":null,"abstract":"Several methods have been explained for blind source separation (BSS) in the literature. Those methods fail when considered for separation of speech signals. This paper mainly focuses on blind speech signal separation from the observations using canonical correlation. The performance of the proposed method is evaluated in terms of signal to interference ratio (SIR) and time domain waveforms of separated speech signals. It is found that proposed technique will improve the SIR values compared with principal component analysis (PCA) and independent component analysis (ICA) based algorithms.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131094662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Rose, N. Gunther, Md A. Sattar, Mahmudur Rahman
{"title":"A variational thermodynamic methodology applied to model critical smart grid electronic devices","authors":"J. Rose, N. Gunther, Md A. Sattar, Mahmudur Rahman","doi":"10.1109/CSCITA.2017.8066536","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066536","url":null,"abstract":"The performance of the Trench Insulated Gate Bipolar Transistor is of special concern to the Smart Grid community. Here, a novel methodology for the quasi-static behavior of the device is introduced which is based on a firmly established law of classical thermodynamics, viz., the minimization of the Helmholtz Free Energy as a function of the internal fields, potential, and charge. The analysis begins with the expression of free energy density given by Landau. Then the ‘trial’ functions of the potential which are indexed to the parameter ‘interface potential’ and the parameter ‘penetration distance of interface potential’ into the doped silicon are introduced. Next, the minimum condition for Helmholtz Energy using these parameters by standard methods is found. Results of this analysis produce analytic closed-form expressions for ‘penetration distance of interface potential’ vs. ‘interface potential’ and ‘interface potential’ vs. ‘gate potential’ for both p-base and n-drift regions.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130604023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-pairing attribute based encryption scheme based on quadratic residuosity","authors":"P. Gupta, R. K. Banyal","doi":"10.1109/CSCITA.2017.8066535","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066535","url":null,"abstract":"The conventional private and public key cryptosystems suffer from issues of key exchange and key distribution respectively. A better alternative is to use identity of a user as the public key. Identity-based encryption is well accepted worldwide but its key revocation issue makes it insecure. Attribute Based Encryption, using attributes of a user instead of identity combats these issues. Though many mathematical methods are used to achieve IBE and ABE, research for efficient ones is still ongoing. This paper proposes a non-pairing based Attribute Based Encryption scheme based on the concepts of RSA cryptosystem and Quadratic Residuosity.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125336594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dipti Malaye, Kalpesh Dange, Tejas Barhate, Sanket Narwade, R. D. Kulkarni, K. Vadirajacharya, Swapnil Thorat
{"title":"Current trends of implementing smart grid for enhancing the reliability of power utility network","authors":"Dipti Malaye, Kalpesh Dange, Tejas Barhate, Sanket Narwade, R. D. Kulkarni, K. Vadirajacharya, Swapnil Thorat","doi":"10.1109/CSCITA.2017.8066569","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066569","url":null,"abstract":"Electrical energy is now the biggest driving force on earth. The dependence and widespread use of electricity has its equivalent pros and cons. Thus modernization of the traditional grid system in order to overcome the major setbacks is the need of hour. Making use of advanced tools and development of various applications for evolution of conventional system is the major lead for smart grid. Demand responses, optimization of grid usage, reduction of affected users in case of a fault are some of the major contributors in the implementation of smart grid. The several features of smart grid include induction of the renewable energy, best utilization of system resources reducing costs, effective generation and demand balance, highest system reliability, consumer participation in energy management, onsite generation, use of electric vehicle reducing the harmful pollution, minimum down time, boost in energy security and quality power to users. It provides high quality and reliable energy supply to critical loads and provides easy integration with existing grid system. It provides support to the main grid in the form of export of real power and reactive power. Besides, the consumer supplier two-way communication, data transport and utilization of networking techniques like Field Area Networking helps in maintaining transparency and improving reliability and availability of the power system. The smart metering using Advanced Metering Infrastructure sustains the bidirectional data transfer and also reduction in the environmental effects. With this resilience and reliability of power utility network can be enhanced effectively. This paper describes the current development and technology advancement in smart grid infrastructure. The present issues and concerns related to smart grid need to be taken into account to help improvise the system efficiency. Case studies are involved to understand the real time analysis to address few concerns in smart grid implementation.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114130561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sub-optimal user scheduling for MU-MIMO system using channel quantization with two-stage feedback","authors":"Deepika Choudhary, S. Mishra","doi":"10.1109/CSCITA.2017.8066547","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066547","url":null,"abstract":"We considered a multi-user MIMO broadcast (BC) system with multiple antennas at both transmitter and receiver sides. A scheduling scheme using semi-orthogonal user selection (SUS) with zero-forcing beamforming (ZFBF) is implemented. The total feedback load required in ZFBF systems is reduced by implementing a two stage feedback scheme by restricting the number of users to participate in each stage of scheduling. The minimal number of users participated in the scheduling process, the total channel state information (CSI) feedback from user side decreases drastically. Each user calculates its expected signal-to-interference-plus-noise ratio (SINR) and quantizes its channel direction information (CDI) vector. For this we use a codebook to generate the quantize CDI. A receiver combining strategy called the maximum expected SINR combiner (MESC) is used at the receiver side. In our approach we use the expectation of SINR rather than actual SINR of each user. The achieved sum-rate capacity of the proposed system is simulated and compared with existing ZFBF-SUS system. The effect of codebook size on the system performance is also investigated.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117134209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}