{"title":"Message Authentication System for Mobile Messaging Applications","authors":"Ankur Gupta, Purnendu Prabhat, Rishi Gupta, Sumant Pangotra, Suave Bajaj","doi":"10.1109/ICNGCIS.2017.32","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.32","url":null,"abstract":"Mobile message sharing applications such as WhatsApp, Hike messenger etc. have facilitated the exchange of text and multimedia messages at an unprecedented scale. However, these applications also facilitate the sharing of incorrect or even malicious information which can cause widespread panic or manipulate public opinion. This paper proposes a system enabling users to verify the authenticity of messages received through message sharing applications. The Message Authentication System (MAS) builds a hierarchical database of authentic information through mining a multitude of trusted sources on the internet and social media feeds. An authenticity index is then computed for the message under consideration and returned to the user. The user can choose to forward the authenticated message to her contacts with the appended authenticity index thereby helping prevent the spread of misinformation.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jasmeet Kaur, Jaiteg Singh, Sukhjit Singh Sehra, H. Rai
{"title":"Systematic Literature Review of Data Quality Within OpenStreetMap","authors":"Jasmeet Kaur, Jaiteg Singh, Sukhjit Singh Sehra, H. Rai","doi":"10.1109/ICNGCIS.2017.35","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.35","url":null,"abstract":"This paper conducts a systematic literature review aims to identify current research and directions in terms of quality of OpenStreetMap data. OpenStreetMap is a valuable source of geographical data. Worldwide several people with different mapping experience and skills are contributing data to the free geo-database by using different mapping gadgets. This makes the OpenStreetMap data more vulnerable to errors and gaps. So we have performed a systematic literature review to find existing literature which is focused upon various quality issues in crowd-sourced data. The results are analyzed that addresses different formulated research questions. After performing systematic analysis, we have found that major focus of researchers is on assessment of positional accuracy of OpenStreetMap data. Many types of errors are still unexplored. The results of our study also showed that most of the researchers have assessed OpenStreetMap data by comparing it with other datasets. These methods are not suitable in absence of authoritative datasets. Hence assessment through intrinsic indicators would be more preferable.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129284180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology Based Informational Retrieval System on the Semantic Web: Semantic Web Mining","authors":"Sunny Sharma, Arjun Kumar, V. Rana","doi":"10.1109/ICNGCIS.2017.21","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.21","url":null,"abstract":"In this manuscript we are presenting an efficient framework for retrieving the information from the Semantic Web using an Ontology-based approach. The present web is comprised of unstructured information which is extremely difficult to be retrieved by the search engine. The semantic web covers up this bug by exploiting the ontologies on the web and making the information machine understandable to be effectively retrieved by the search engine.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125839721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opportunities and Challenges of MOOCS: Perspectives from India","authors":"Tariq Hussain Sheikh, Rachna Gupta","doi":"10.1109/ICNGCIS.2017.44","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.44","url":null,"abstract":"The recent progress of Massive Open Online Courses (MOOCs) has led to debates of technology-based instruction revolutionizing traditional higher-education teaching and Learning process. Here we analyze the foundation of MOOCs, as well as trends in education initiated by these courses. Precisely, this paper discusses the opportunities and challenges due to MOOCs, from the perspective of India.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123115205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ankur Gupta, Purnendu Prabhat, Rishi Gupta, Suhail Gulzar, D. Kumari
{"title":"GNOSIS: Towards Automated Knowledge Management","authors":"Ankur Gupta, Purnendu Prabhat, Rishi Gupta, Suhail Gulzar, D. Kumari","doi":"10.1109/ICNGCIS.2017.31","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.31","url":null,"abstract":"Knowledge management is a critical component for the next-generation learning organizations, which can assimilate, comprehend and utilize the rapidly changing knowledge landscape and ensure value creation for their customers. The core challenge for devising effective knowledge management strategy for any organization is to ensure that each individual stakeholder receives high-quality and customized information. This paper proposes a cloud-based system for facilitating knowledge enhancement of individuals by automatically collating information from credible sources and delivering them in a personalized manner to the end user. High quality content inputs are provided through automated web-based mashup tools and human domain experts to a cloud-based knowledge management system, which distributes domain/skill specific content streams to registered individuals via mobile devices and social media platforms. The collated content is classified and delivered to users based on their interests and preferences and auto-curated based upon the responses of end-user and the larger community. Early results from the implementation of Gnosis in an academic setting are presented.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121659544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Probabilistic Analysis on Crypto-Currencies Based on Blockchain","authors":"M. Bhat, Shafalika Vijayal","doi":"10.1109/ICNGCIS.2017.37","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.37","url":null,"abstract":"The blockchain is a perceptive invention - the discovery of a person or group of people. But since its invention, it has evolved into something greater and present opportunities for tempestuous innovation. Blockchain has tried to allure evreryone across different domains like industrial sector, banking, healthcare, land holdings and even the public and private sector. The blockchain is an imperishable digital log of financial transactions that can be scheduled to record not just efficient transactions but practically everything that holds a price. It enables global business transactions with less conflict and more trust. Blockchain has invented an era into technology in which the digital information can be distributed without being imitated. Bitcoin blockchain is the most popular public blockchain network, with around 10K nodes. The other big cryptocurrency blockchain project is Ethereum. Ethereum however wasn't designed to be a form of currency but instead it is intended to enable \"smart contracts\". Many cryptocurrencies are built on the top of blockchain, with the most popular being Bitcoin. In this paper we are going to present an overview of the blockchain technology with focus on two most widely used cryptocurrencies and their comparative analysis.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124087633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Service Level Agreements – Issues and Development","authors":"I. Odun-Ayo, Olasupo O. Ajayi, N. Omoregbe","doi":"10.1109/ICNGCIS.2017.18","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.18","url":null,"abstract":"Cloud computing is a broad paradigm that has influence across major fields of human endeavour. The unique services it offers makes organisations curious about understanding the cloud and its likely benefits. The cloud offers services such as custom built applications deployed on remote systems and ready to use platforms which reduce the efforts needed to develop and deploy applications for cloud users. In addition to these, there are other services such as storage and infrastructural resources which the cloud also avails to its users. These services are usually provided to users on a pay-per-use bases, thus necessitating the need to have documented agreements in place to ensure a smooth relationship between the providers and the users. These documented agreements are referred to as Service Level Agreements (SLAs). SLAs detail the terms, conditions and service expectation of the users from their service provider in terms of availability, redundancy, uptime, cost and penalties for violations. These ensures users' confidence in the services being offered. In this paper, the state of the art with respect to cloud SLAs is presented. The paper seeks to answer questions related of what the current trends and developments in terms of cloud SLA are and it does so by means of a review of existing literature available. This paper therefore is a survey of cloud SLAs, their issues and developmental challenges. It provides a guide for future research and is expected to benefit prospective cloud users and cloud providers alike.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125466223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review Of D2D Communication With Game-Theoretic Resource Allocation Models","authors":"Roopsi Rathi, N. Gupta","doi":"10.1109/ICNGCIS.2017.41","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.41","url":null,"abstract":"D2D communication was at first proposed in cell organize as another new standard to improve network performance. It is usually categorized as an in-band and out-band on the basis of spectrum sharing. Now that the huge increase in heterogeneous devices, an impartial resource allocation is obligatory to achieve maximum spectral efficiency and mend the system throughput. Resource allocation can be handling as games. Game theory models offer optimal solutions to the resource allocation problems for the device-to-device communication. Here, we illustrate the idea of D2D communication, foremost technical challenges and the appliances of game theory models to analyze the resource allocation downside of D2D communication.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128092764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Analysis of Different QOS Strategies in OFDM Wireless Network","authors":"S. Rawat, Praveena Chaturvedi","doi":"10.1109/ICNGCIS.2017.15","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.15","url":null,"abstract":"Data strong networks have appeared as a new call in the field of wireless networks. To facilitate data users with the uprising need of high data transfer rate is a prime concern to the network provider community. Quality of service (Qos) in terms of network is to provide network resources and services to users so that it satisfies their needs and manages the network resources efficiently altogether. In this paper, we have studied different Qos approaches which have been applied in the past for achieving QoS for various kinds of applications. The kind of network we are using for communication changes the QoS dynamics substantially as providing Qos in a wireless network is way more intriguing, for many complexities being involved in a wireless channel. This paper surveys various Qos strategies and methods that have been implemented in past. To achieve Qos several scheduling and resource allocation schemes are devised by researchers as Network resources must be distributed in such a manner that bandwidth, power allocation, energy efficiency, and throughput is optimized. These QoS approaches have been analysed and compared on account of their methodology, advantages and disadvantages. The performance evaluation is done on all the strategies over some significant key metrics.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133216340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive Survey on Petya Ransomware Attack","authors":"Jagmeet Singh Aidan, H. Verma, L. Awasthi","doi":"10.1109/ICNGCIS.2017.30","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.30","url":null,"abstract":"In the recent past, there has been an exponential increase in the cyber-attack. One of the most dangerous attacks in this cyber-attack is the ransomware attack which not only corrupt and encrypts the data but also steals the information from the system which can be very dangerous. One of the major ransomware attacks in recent past is the Petya ransomware attack. Methodology and threats due to Petya ransomware are discussed. Awareness and Mitigation for this are also discussed.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129083263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}