{"title":"Relevant hex patterns for malcode detection","authors":"Smita Naval, Y. Meena, V. Laxmi, P. Vinod","doi":"10.1109/ISSP.2013.6526930","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526930","url":null,"abstract":"Malware poses a big threat to computer systems now a days. Malware authors often use encryption/compression methods to conceal their malicious executables data and code. These methods that transform some or all of the original bytes into a series of random looking data bytes appear in 80 to 90% of malware samples. This fact creates special challenges for anti-virus scanners who use static and dynamic methods to analyze large malware collections. In this paper we propose a method to identify malware executables by reading initial 2500 byte patterns of the sample. Our method reduces overall scanner execution time by considering 2500 bytes instead of whole file. Experimental results are evaluated using different classification algorithms (Random Forest, Ada-Boost, IBK, J48, Naïve-Bayes) followed by a feature selection method.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131162931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis of web security in open source content management system","authors":"S. K. Patel, V. R. Rathod, J. Prajapati","doi":"10.1109/ISSP.2013.6526932","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526932","url":null,"abstract":"Internet has become priceless tool that enables corporate world to show their capabilities. While Web applications have gained importance on the Internet, security is the only thing to worry. Business data is very critical that floats on the cloud and that's why Web Application Security is rapidly becoming a growing concern for all enterprises. In this paper we tried to show what is Hacking and its symptoms. In web development Content Management System (CMS) is gaining so much popularity as it uses to make easy editing and publishing process for novice even if he doesn't know web programming. There are over thousand of open source CMS available in the market. When we just talk about content management concept two or three names like Joomla, Drupal and WordPress strike in mind. As these are the one of the best CMSs in the market and their community provides nice basic security still we want to compare these CMS and want to know which CMS provides best security. To do the comparison we have done two case studies. In case 1 we have developed one common page in all CMS and host it then after we have applied different web attacks like SQLi, XSS, CSRF etc. and derived their hacking results. In case 2 we used Acunetix WVS Reporter v6.0 to find out the strength of security in different CMS. Apart from this we also try to find out Broken links in all listed CMSs.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133500839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Carrier frequency offset estimation & compensation in AMC OFDM","authors":"V. Patel, H. Shah, H. Soni, K. Dasgupta","doi":"10.1109/ISSP.2013.6526923","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526923","url":null,"abstract":"Sensitivity to Carrier Frequency Offset (CFO) is a well known issue in Orthogonal Frequency Division Multiplexing (OFDM). The recent wireless standards, which propose OFDM as modulation technique, prefer to use it with Adaptive Modulation and Coding (AMC). Inter carrier interference (ICI) created by CFO disturbs the selection of modulation order and channel coding rate in AMC. Effect of CFO on OFDM with AMC is studied in this work. The survey of Fractional CFO (FCFO) estimation techniques is presented in this paper. The optimal but complex to implement method for CFO estimation-the ML estimation is applied to OFDM with AMC. Efforts are made to reduce its complexity while actual implementation. Performance comparison of original and reduced complexity methods are presented based on accuracy and complexity.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127251237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real time edge detected advanced image acquisition system using RGB analysis","authors":"R. Dutta, K. Mitra, S. Mukherjee, P. Sharma","doi":"10.1109/ISSP.2013.6526880","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526880","url":null,"abstract":"In modern era the real time edge detection of moving elements in image sequences is the most important step in many image & video acquisition systems including automated visual surveillance. In this paper, we present an advanced framework for detecting some very important issues, like people identification and people flow count in restricted organizations for security measures. The objectives is to constant monitor activities at restricted regions for detecting unwanted congestions and predict the people flow which assists in regulating the crowd density at the target place. This unique approach help us as the system can sense the frame of target object, detect instantly the edges of the target, automatically process the captured footage and provides the filtered version of the target image/video. In addition with, our proposed system can also track the motion of the target object (people). Also color histograms (RGB) help us to make prompt decisions while capturing the total range of existing digital image/video. In this paper the proposed system with such modern features combined is designed using MAT Lab/SIMULINK V.7.10.0 and simulated. The related experimental results are shown and evaluated successfully.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126526419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Memory access stage removal technique for dynamic power reduction in embedded CPUs","authors":"K. Bhatt, A. I. Trivedi","doi":"10.1109/ISSP.2013.6526924","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526924","url":null,"abstract":"There are several reasons why power efficiency is becoming increasingly important for portable systems powered by batteries. At the same time these systems are becoming physically smaller and battery weight is becoming more significant. Users demand longer battery life and this can only be obtained either by increasing the capacity of the battery or by increasing the efficiency of the logic. The rate of progress in battery technology is slow, so the focus is on the digital designer to improve efficiency. This paper discusses the power budget for the 32 - bit conventional processor and then suggests a technique which is implemented at design level for power optimization along with the comparison of power results for standard and the modified structures of the system. The proposed work is simulated, synthesized, tested and verified by using tools such as Xilinx ISE - 13.1, Xilinx XPower and ModelSim SE PLUS-6.5 for waveform generation and XPowerAnalyzer for power analysis.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122047374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptive novel feature based approach for automatic video shot boundary detection","authors":"V. Thakar, S. Hadia","doi":"10.1109/ISSP.2013.6526891","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526891","url":null,"abstract":"The video shot boundary detection is an area, where many techniques and methods have been suggested and have claimed to perform consistently on the videos like television broadcasting of different sports events, talk shows & news telecast. The movies contain a large amount of visual information varying in arbitrary manner; it requires a highly vigorous procedure for automatic shot boundary detection. The main goal of this research is to develop an adaptive & robust algorithm for segmentation & classification of movie videos. In this paper, we described a novel approach for shot boundary detection which is totally adaptive & changes the threshold value as per the information change. We have defined the novel feature which can uniquely define color as well as edge & frequency details of a frame. It is able to detect not only abrupt transitions like hard cuts but also special effects like wipes, fades, and dissolves as well in different movies.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123183650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Innovative algorithms for vision defect identification system","authors":"Vishal Dahiya, Mr. Jeegar A Trivedi, P. Sajja","doi":"10.1109/ISSP.2013.6526904","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526904","url":null,"abstract":"In this paper, application of fuzzy logic and rendering in vision defect identification system fo r eye disease has been investigated. The real procedure of eye defect diagnosis which usually is employed by physicians was analyzed and converted to a machine implementable format. After acquisition of symptoms of different diseases, a data set contains the information of a few cases was configured. The defect has been analyzed with the help of fuzzy logic rule base and image processing rendering mechanism. Results of the experiments along with the advantages of using a fuzzy and rendering approach were discussed as well. Outcomes reflect the role of effective symptoms selection and the advantages of data fuzzification and fast rendering.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131867144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling performance appraisal using soft computing techniques: Designing neuro-fuzzy application","authors":"Ms Nisha Macwan, Srinivas Priti, Sajja","doi":"10.1109/ISSP.2013.6526943","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526943","url":null,"abstract":"Soft computing refers to a collection of computational techniques which study, model, and analyze very complex phenomena: those for which more conventional methods have not yielded low cost, analytic, and complete solutions. Soft Computing provides flexible information processing capability for representation and evaluation of various real life ambiguous and uncertain situations. The paper discusses how soft computing is a pertinent for Performance Appraisal. Performance Appraisal can be Objective as well as Subjective. Performance Appraisal is vague, uncertain and imprecise which may not result into fair decision. The paper proposes neuro-fuzzy approach for performance appraisal that removes any psychological elements that may have a negative bearing on unbiased evaluation. Fuzzy logic handles the vagueness and uncertainty that is observed in evaluation parameters and artificial neural network learns decision making from available data and experience to provide unbiased decision.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130809754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Growth methodology for nanowires","authors":"N. Kapadia, R. Solanki","doi":"10.1109/ISSP.2013.6526919","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526919","url":null,"abstract":"ZnO, as an important semiconducting material, has a wide range of applications in optics, optoelectronics, sensors, actuators, energy, biomedical sciences and spintronics [1]. ZnO exhibit the most splendid and abundant configurations of nanostructures that one material can form. ZnO is one of the few dominant nanomaterials for nanotechnology. There are a few existing excellent reviews related to nanowire growth and characterization especially about ZnO [3, 4, 5, 6, 7, 8, 9]. As for the purpose of this paper, we will mainly focus on the synthesis of nanowires especially aligned arrays via a vapor-liquid-solid (VLS) or vapor-solid-solid growth process.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132177876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptation of heading angle for continuous visibility of tracks in geographical track following applications","authors":"V. K. Reddy, G. Kadambi, S. R. Shankapal","doi":"10.1109/ISSP.2013.6526881","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526881","url":null,"abstract":"Vision-based autonomous following of geographical tracks such as rivers and pipelines is a potential solution in applications denied by GPS. Vision-based track-following algorithms require two parameters to determine the aircraft heading namely, orientation of the track and the displacement of the track from an appropriate reference. Track visibility is a prime factor for effective mission. Despite clear visibility, tracks limited to corners of the image tend to be lost in future images after heading change. In this paper, we propose a post-processing technique to ensure continuous visibility of tracks. Experiments reveal an improvement in track followed by the existing algorithms.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133331642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}