2015 International Conference on Computing, Communication and Security (ICCCS)最新文献

筛选
英文 中文
Comparison of different antenna arrays for the channel capacity 不同天线阵列对信道容量的比较
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374139
Shu-Han Liao, Chien-Hung Chen, C. Chiu, Min-Hui Ho
{"title":"Comparison of different antenna arrays for the channel capacity","authors":"Shu-Han Liao, Chien-Hung Chen, C. Chiu, Min-Hui Ho","doi":"10.1109/CCCS.2015.7374139","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374139","url":null,"abstract":"Three types of antenna arrays such as uniform linear, uniform rectangular arrays and uniform cube arrays are used in the transmitter and their corresponding channel capacity on several paths in the indoor environment are calculated. Numerical results show that uniform linear arrays is better than that for uniform rectangular arrays and uniform cube arrays system with and without interference.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130646068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm performance indexing through parallelism 通过并行性建立算法性能索引
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374169
P. Manyere, A. L. Nel
{"title":"Algorithm performance indexing through parallelism","authors":"P. Manyere, A. L. Nel","doi":"10.1109/CCCS.2015.7374169","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374169","url":null,"abstract":"Image processing of Spotlight Synthetic Aperture Radar (SSAR) involves large amount of data to be processed and the time required to handle such data is relatively large. Evaluation of an algorithm in terms of processing speed (run time) and space (data structures) is therefore a critical step in ascertaining suitability of an algorithm for a particular application. Major limitation in physical processing speed is principally associated with the complex computations required to provide solutions to large size problems (Jaja, 1992). With an increase in massive parallelism of processors, the overall processor operational speed has drastically improved especially in image processing. The best choice of an algorithm on a particular processor and for a particular task is based on the understanding of the performance of the algorithm and hardware at hand. In this paper, we address this problem by providing a means to know the characteristics of a given algorithm by evaluating its performance. Two segmentation based SSAR algorithms, namely the 1-D and 2-D data segmentation are evaluated and algorithm performance indexes drawn. In both cases, image data was split into segments and parallel processed by individual asynchronous processors. Based on the relationship between the non-overlapping data segment size and execution time, the performance index of an algorithm was determined.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130783963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware implementation of ultralightweight cryptographic protocols 超轻量级加密协议的硬件实现
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374119
Qurat Ul Ain, U. Mujahid, M. Najam-ul-Islam
{"title":"Hardware implementation of ultralightweight cryptographic protocols","authors":"Qurat Ul Ain, U. Mujahid, M. Najam-ul-Islam","doi":"10.1109/CCCS.2015.7374119","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374119","url":null,"abstract":"RFID (Radio Frequency Identification) is among the most emerging and tremendously growing technologies in the field of automatic identification. The technology is far better than its other contending systems such as Barcodes and magnetic tapes as it provides optimal communication link with non line of sight capability. Several researchers have proposed various ultralightweight RFID authentication protocols to provide cost effective security solutions. However, the proper hardware implementation of these ultralightweight authentication protocols has been neglected long which develops a chaos of their practical feasibility. In this paper, we have addressed this problem and proposed generic hardware architecture for EPC-C1G2 tags. We have also simulated four ultralightweight authentication protocols (SASI, LMAP, David-Prasad and RAPP) using ModelSim PE and synthesized using Xilinx Design Suite 14.5. Algorithm has been successfully implemented in hardware using Spartan 6 (Low Power) and Vertex 7 Field Programmable Gate Array (FPGA). We believe that the proposed architecture and simulated results will act as the stepping stone for the future implementation of these low cost RFID tags for ASIC.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132088788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A quantum-inspired cuckoo search algorithm for the travelling salesman problem 旅行商问题的量子布谷鸟搜索算法
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374201
Sumit Laha
{"title":"A quantum-inspired cuckoo search algorithm for the travelling salesman problem","authors":"Sumit Laha","doi":"10.1109/CCCS.2015.7374201","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374201","url":null,"abstract":"The quantum algorithm and the cuckoos search algorithm as emerging novel evolutionary techniques has recently drawn a lot of research interest due to their capability to search globally as well as locally by exploring the search space more efficiently in various applications of engineering and management. To the best of our knowledge, this paper first considers the application of quantum-inspired cuckoo search algorithm to solve the classic travelling salesman problems. In this paper, we present a quantum embedded cuckoo search algorithm for the travelling salesman problem. To accelerate the search process for better solution quality, some neighborhood search based construction and stochastic heuristic approaches is utilized in the simulated annealing algorithm. The proposed method is tested with several benchmark test problem instances taken from the TSP library in the literature. The computational results demonstrate that the proposed hybrid method is very competitive with the state-of-the-art procedures in the literature.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126384121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Ameliorate pursuance of TCP in CR-MANET utilizing accessible resources 利用可访问资源改进CR-MANET中TCP的追求
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374156
A. Selvan, K. Selvaradjou
{"title":"Ameliorate pursuance of TCP in CR-MANET utilizing accessible resources","authors":"A. Selvan, K. Selvaradjou","doi":"10.1109/CCCS.2015.7374156","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374156","url":null,"abstract":"Cognitive Radio (CR) networks is well-known for its expertness in solving the problem of spectrum scarcity that reside with wireless resources where unlicensed users can opportunistically perform transmission without impacting the operations of licensed users. Channel switching is inherently necessary to make unlicensed and licensed users to appropriate propagation in the channel. All through the progression, communication characteristics such as bottleneck bandwidth and Round-trip time (RTT) have to be modified. However this change has to adaptively update by TCP in its congestion window (CWND) to make an efficient use of the available resources. TCP CRAHN is well-known mechanism which generates spectrum alertness by retrieving explicit feedback from relay and destination nodes. In this paper we proposed TCP CR-MANET and it is evaluated with respect to bottleneck bandwidth and RTT varying characteristics. This protocol updates its CWND based upon the available buffer space of the relay node. TCP CRMANET system is implemented in NS2 simulator and analyzed with various characteristics of the network. Experimentally, it has been proved that our proposed TCP CR-MANET provides better throughput with respect to TCP CRAHN.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121139924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation and analysis of layer 3 tunneling between OpenSSH and OpenVPN in a wide area network environment 广域网环境下OpenSSH与OpenVPN之间的三层隧道性能评估与分析
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374130
Irfaan Coonjah, P. C. Catherine, M. S. Soyjaudah
{"title":"Performance evaluation and analysis of layer 3 tunneling between OpenSSH and OpenVPN in a wide area network environment","authors":"Irfaan Coonjah, P. C. Catherine, M. S. Soyjaudah","doi":"10.1109/CCCS.2015.7374130","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374130","url":null,"abstract":"Virtual Private Networks (VPNs) provide a secure encrypted communication between remote networks worldwide by using Internet Protocol(IP) tunnels and a shared medium like the Internet. End-to-end connectivity is established by tunneling. OpenVPN and OpenSSH are cross-platform, secure, highly configurable VPN solutions. The performance comparison however between OpenVPN and OpenSSH VPN has not yet been undertaken. This paper focuses on such comparison and evaluates the efficiency of these VPNs over Wide Area Network (WAN) connections. The same conditions are maintained for a fair comparison. To the best knowledge of the authors, this is the first reported test results of these two commonly used VPN technologies. Three parameters, namely speed, latency and jitter are evaluated. Using a real life scenario with deployment over the Linux Operating System, a comprehensive in-depth comparative analysis of the VPN mechanisms is provided. Results of the analysis between OpenSSH and OpenVPN show that OpenSSH utilizes better the link and significantly improves transfer times.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127712479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Visualising and analysing online social networks 可视化和分析在线社交网络
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374121
K. Muhongya, M. Maharaj
{"title":"Visualising and analysing online social networks","authors":"K. Muhongya, M. Maharaj","doi":"10.1109/CCCS.2015.7374121","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374121","url":null,"abstract":"The immense popularity of online social networks generates sufficient data, that when carefully analysed, can reveal unexpected realities. People are using them to establish relationships in the form of friendships. Based on data collected, students' networks were extracted, visualized and analysed to reflect the connections among South African communities using Gephi. The analysis revealed a slow progress in terms of connections among communities from different ethnic groups in South Africa. This was facilitated through analysis of data collected through Netvizz as well as by using Gephi to visualize social media network structures.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124928470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Customer engagement manifestations on Facebook pages of Tesco and Walmart 乐购和沃尔玛在Facebook页面上的客户参与表现
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374166
Swaleha Peeroo, M. Samy, Brian Jones
{"title":"Customer engagement manifestations on Facebook pages of Tesco and Walmart","authors":"Swaleha Peeroo, M. Samy, Brian Jones","doi":"10.1109/CCCS.2015.7374166","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374166","url":null,"abstract":"Social media have transformed the world in which we live. Although several studies have uncovered forms of customer engagement on social media, there is a scarcity of academic research on customer engagement within the grocery sector. This study therefore aims to address this gap in the literature and shed light on the various ways customers engage with grocery stores on Facebook. Netnography is used to gain an understanding of the behaviour of customers on the Facebook page of Tesco and Walmart. The findings of this study reveal that cognitive, emotional and behavioural customer engagement are manifested and that customers can both create and destroy value for the firm. This study contributes to knowledge by uncovering the various forms of customer engagement on Facebook pages of Tesco and Walmart.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124805795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Face recognition techniques, their advantages, disadvantages and performance evaluation 人脸识别技术,其优点,缺点和性能评价
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374154
Lerato Masupha, T. Zuva, S. Ngwira, O. Esan
{"title":"Face recognition techniques, their advantages, disadvantages and performance evaluation","authors":"Lerato Masupha, T. Zuva, S. Ngwira, O. Esan","doi":"10.1109/CCCS.2015.7374154","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374154","url":null,"abstract":"A human brain can store and remember thousands of faces in a person's life time, however it is very difficult for an automated system to reproduce the same results. Faces are complex and multidimensional which makes extraction of facial features to be very challenging, yet it is imperative for our face recognition systems to be better than our brain's capabilities. The face like many physiological biometrics that include fingerprint, hand geometry, retina, iris and ear uniquely identifies each individual. In this paper we focus mainly on the face recognition techniques. This review looks at three types of recognition approaches namely holistic, feature based (geometric) and the hybrid approach. We also look at the challenges that are face by the approaches.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121978433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Experiencing game-based learning through Mobile Devices 通过移动设备体验基于游戏的学习
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374159
R. Sungkur, U. Singh, A. Adaya
{"title":"Experiencing game-based learning through Mobile Devices","authors":"R. Sungkur, U. Singh, A. Adaya","doi":"10.1109/CCCS.2015.7374159","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374159","url":null,"abstract":"The introduction of game-based learning (GBL) into the pedagogical processes and curriculum design can increase student engagement in the learning process. There are a range of game based learning approaches available, but, so far, limited adoption of serious games has been recorded. The digital habits of learners should be studied carefully, to better understand the way current technology-savvy students learn, and integrate socially. With the wide-spread use of Mobile Devices today, GBL has a vital role to play in the educational landscape. This research analyses the potential usage of Mobile Devices to enhance the learning process, through Game-Based Learning.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116451744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信