2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)最新文献

筛选
英文 中文
Message Authentication System for Mobile Messaging Applications 移动消息应用程序的消息认证系统
Ankur Gupta, Purnendu Prabhat, Rishi Gupta, Sumant Pangotra, Suave Bajaj
{"title":"Message Authentication System for Mobile Messaging Applications","authors":"Ankur Gupta, Purnendu Prabhat, Rishi Gupta, Sumant Pangotra, Suave Bajaj","doi":"10.1109/ICNGCIS.2017.32","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.32","url":null,"abstract":"Mobile message sharing applications such as WhatsApp, Hike messenger etc. have facilitated the exchange of text and multimedia messages at an unprecedented scale. However, these applications also facilitate the sharing of incorrect or even malicious information which can cause widespread panic or manipulate public opinion. This paper proposes a system enabling users to verify the authenticity of messages received through message sharing applications. The Message Authentication System (MAS) builds a hierarchical database of authentic information through mining a multitude of trusted sources on the internet and social media feeds. An authenticity index is then computed for the message under consideration and returned to the user. The user can choose to forward the authenticated message to her contacts with the appended authenticity index thereby helping prevent the spread of misinformation.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Literature Review of Data Quality Within OpenStreetMap OpenStreetMap数据质量的系统文献综述
Jasmeet Kaur, Jaiteg Singh, Sukhjit Singh Sehra, H. Rai
{"title":"Systematic Literature Review of Data Quality Within OpenStreetMap","authors":"Jasmeet Kaur, Jaiteg Singh, Sukhjit Singh Sehra, H. Rai","doi":"10.1109/ICNGCIS.2017.35","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.35","url":null,"abstract":"This paper conducts a systematic literature review aims to identify current research and directions in terms of quality of OpenStreetMap data. OpenStreetMap is a valuable source of geographical data. Worldwide several people with different mapping experience and skills are contributing data to the free geo-database by using different mapping gadgets. This makes the OpenStreetMap data more vulnerable to errors and gaps. So we have performed a systematic literature review to find existing literature which is focused upon various quality issues in crowd-sourced data. The results are analyzed that addresses different formulated research questions. After performing systematic analysis, we have found that major focus of researchers is on assessment of positional accuracy of OpenStreetMap data. Many types of errors are still unexplored. The results of our study also showed that most of the researchers have assessed OpenStreetMap data by comparing it with other datasets. These methods are not suitable in absence of authoritative datasets. Hence assessment through intrinsic indicators would be more preferable.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129284180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Ontology Based Informational Retrieval System on the Semantic Web: Semantic Web Mining 基于本体的语义Web信息检索系统:语义Web挖掘
Sunny Sharma, Arjun Kumar, V. Rana
{"title":"Ontology Based Informational Retrieval System on the Semantic Web: Semantic Web Mining","authors":"Sunny Sharma, Arjun Kumar, V. Rana","doi":"10.1109/ICNGCIS.2017.21","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.21","url":null,"abstract":"In this manuscript we are presenting an efficient framework for retrieving the information from the Semantic Web using an Ontology-based approach. The present web is comprised of unstructured information which is extremely difficult to be retrieved by the search engine. The semantic web covers up this bug by exploiting the ontologies on the web and making the information machine understandable to be effectively retrieved by the search engine.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125839721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Opportunities and Challenges of MOOCS: Perspectives from India mooc的机遇与挑战:来自印度的视角
Tariq Hussain Sheikh, Rachna Gupta
{"title":"Opportunities and Challenges of MOOCS: Perspectives from India","authors":"Tariq Hussain Sheikh, Rachna Gupta","doi":"10.1109/ICNGCIS.2017.44","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.44","url":null,"abstract":"The recent progress of Massive Open Online Courses (MOOCs) has led to debates of technology-based instruction revolutionizing traditional higher-education teaching and Learning process. Here we analyze the foundation of MOOCs, as well as trends in education initiated by these courses. Precisely, this paper discusses the opportunities and challenges due to MOOCs, from the perspective of India.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123115205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GNOSIS: Towards Automated Knowledge Management GNOSIS:迈向自动化知识管理
Ankur Gupta, Purnendu Prabhat, Rishi Gupta, Suhail Gulzar, D. Kumari
{"title":"GNOSIS: Towards Automated Knowledge Management","authors":"Ankur Gupta, Purnendu Prabhat, Rishi Gupta, Suhail Gulzar, D. Kumari","doi":"10.1109/ICNGCIS.2017.31","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.31","url":null,"abstract":"Knowledge management is a critical component for the next-generation learning organizations, which can assimilate, comprehend and utilize the rapidly changing knowledge landscape and ensure value creation for their customers. The core challenge for devising effective knowledge management strategy for any organization is to ensure that each individual stakeholder receives high-quality and customized information. This paper proposes a cloud-based system for facilitating knowledge enhancement of individuals by automatically collating information from credible sources and delivering them in a personalized manner to the end user. High quality content inputs are provided through automated web-based mashup tools and human domain experts to a cloud-based knowledge management system, which distributes domain/skill specific content streams to registered individuals via mobile devices and social media platforms. The collated content is classified and delivered to users based on their interests and preferences and auto-curated based upon the responses of end-user and the larger community. Early results from the implementation of Gnosis in an academic setting are presented.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121659544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Probabilistic Analysis on Crypto-Currencies Based on Blockchain 基于区块链的加密货币概率分析
M. Bhat, Shafalika Vijayal
{"title":"A Probabilistic Analysis on Crypto-Currencies Based on Blockchain","authors":"M. Bhat, Shafalika Vijayal","doi":"10.1109/ICNGCIS.2017.37","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.37","url":null,"abstract":"The blockchain is a perceptive invention - the discovery of a person or group of people. But since its invention, it has evolved into something greater and present opportunities for tempestuous innovation. Blockchain has tried to allure evreryone across different domains like industrial sector, banking, healthcare, land holdings and even the public and private sector. The blockchain is an imperishable digital log of financial transactions that can be scheduled to record not just efficient transactions but practically everything that holds a price. It enables global business transactions with less conflict and more trust. Blockchain has invented an era into technology in which the digital information can be distributed without being imitated. Bitcoin blockchain is the most popular public blockchain network, with around 10K nodes. The other big cryptocurrency blockchain project is Ethereum. Ethereum however wasn't designed to be a form of currency but instead it is intended to enable \"smart contracts\". Many cryptocurrencies are built on the top of blockchain, with the most popular being Bitcoin. In this paper we are going to present an overview of the blockchain technology with focus on two most widely used cryptocurrencies and their comparative analysis.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124087633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cloud Service Level Agreements – Issues and Development 云服务水平协议-问题和发展
I. Odun-Ayo, Olasupo O. Ajayi, N. Omoregbe
{"title":"Cloud Service Level Agreements – Issues and Development","authors":"I. Odun-Ayo, Olasupo O. Ajayi, N. Omoregbe","doi":"10.1109/ICNGCIS.2017.18","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.18","url":null,"abstract":"Cloud computing is a broad paradigm that has influence across major fields of human endeavour. The unique services it offers makes organisations curious about understanding the cloud and its likely benefits. The cloud offers services such as custom built applications deployed on remote systems and ready to use platforms which reduce the efforts needed to develop and deploy applications for cloud users. In addition to these, there are other services such as storage and infrastructural resources which the cloud also avails to its users. These services are usually provided to users on a pay-per-use bases, thus necessitating the need to have documented agreements in place to ensure a smooth relationship between the providers and the users. These documented agreements are referred to as Service Level Agreements (SLAs). SLAs detail the terms, conditions and service expectation of the users from their service provider in terms of availability, redundancy, uptime, cost and penalties for violations. These ensures users' confidence in the services being offered. In this paper, the state of the art with respect to cloud SLAs is presented. The paper seeks to answer questions related of what the current trends and developments in terms of cloud SLA are and it does so by means of a review of existing literature available. This paper therefore is a survey of cloud SLAs, their issues and developmental challenges. It provides a guide for future research and is expected to benefit prospective cloud users and cloud providers alike.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125466223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Review Of D2D Communication With Game-Theoretic Resource Allocation Models 基于博弈论资源分配模型的D2D通信研究综述
Roopsi Rathi, N. Gupta
{"title":"A Review Of D2D Communication With Game-Theoretic Resource Allocation Models","authors":"Roopsi Rathi, N. Gupta","doi":"10.1109/ICNGCIS.2017.41","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.41","url":null,"abstract":"D2D communication was at first proposed in cell organize as another new standard to improve network performance. It is usually categorized as an in-band and out-band on the basis of spectrum sharing. Now that the huge increase in heterogeneous devices, an impartial resource allocation is obligatory to achieve maximum spectral efficiency and mend the system throughput. Resource allocation can be handling as games. Game theory models offer optimal solutions to the resource allocation problems for the device-to-device communication. Here, we illustrate the idea of D2D communication, foremost technical challenges and the appliances of game theory models to analyze the resource allocation downside of D2D communication.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128092764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comparative Analysis of Different QOS Strategies in OFDM Wireless Network OFDM无线网络中不同QOS策略的比较分析
S. Rawat, Praveena Chaturvedi
{"title":"A Comparative Analysis of Different QOS Strategies in OFDM Wireless Network","authors":"S. Rawat, Praveena Chaturvedi","doi":"10.1109/ICNGCIS.2017.15","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.15","url":null,"abstract":"Data strong networks have appeared as a new call in the field of wireless networks. To facilitate data users with the uprising need of high data transfer rate is a prime concern to the network provider community. Quality of service (Qos) in terms of network is to provide network resources and services to users so that it satisfies their needs and manages the network resources efficiently altogether. In this paper, we have studied different Qos approaches which have been applied in the past for achieving QoS for various kinds of applications. The kind of network we are using for communication changes the QoS dynamics substantially as providing Qos in a wireless network is way more intriguing, for many complexities being involved in a wireless channel. This paper surveys various Qos strategies and methods that have been implemented in past. To achieve Qos several scheduling and resource allocation schemes are devised by researchers as Network resources must be distributed in such a manner that bandwidth, power allocation, energy efficiency, and throughput is optimized. These QoS approaches have been analysed and compared on account of their methodology, advantages and disadvantages. The performance evaluation is done on all the strategies over some significant key metrics.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133216340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comprehensive Survey on Petya Ransomware Attack Petya勒索软件攻击综合调查
Jagmeet Singh Aidan, H. Verma, L. Awasthi
{"title":"Comprehensive Survey on Petya Ransomware Attack","authors":"Jagmeet Singh Aidan, H. Verma, L. Awasthi","doi":"10.1109/ICNGCIS.2017.30","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.30","url":null,"abstract":"In the recent past, there has been an exponential increase in the cyber-attack. One of the most dangerous attacks in this cyber-attack is the ransomware attack which not only corrupt and encrypts the data but also steals the information from the system which can be very dangerous. One of the major ransomware attacks in recent past is the Petya ransomware attack. Methodology and threats due to Petya ransomware are discussed. Awareness and Mitigation for this are also discussed.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129083263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信