2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)最新文献

筛选
英文 中文
Challenges in Automation of Test Cases for Mobile Payment Apps 移动支付应用测试用例自动化的挑战
Ashutosh Pandey, Rijwan Khan, Akhilesh Kumar Srivastava
{"title":"Challenges in Automation of Test Cases for Mobile Payment Apps","authors":"Ashutosh Pandey, Rijwan Khan, Akhilesh Kumar Srivastava","doi":"10.1109/CIACT.2018.8480303","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480303","url":null,"abstract":"Software Engineering is a field of new challenges every day. With every passing day, new technologies emerge. There was an era of web Applications, but the time has changed and most of the web Applications are available as Mobile Applications as well. The Mobile Applications are either android based or iOS based. To deliver error free, secure and reliable Application, it is necessary to test the Applications properly. Software testing is a phase of software development life cycle, where we test an Application in all aspects. Nowadays different type of tools are available for testing an Application automatically but still we have too many challenges for applying test cases on a given Application. In this paper the authors will discuss the challenges of automation of test cases for a Mobile based payment Application.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115816453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Low Cost Polarized Navigation Sensor Design 一种低成本极化导航传感器设计
Yang Yang, Chen Hao, Chen Nannan, Yan Yong-zheng
{"title":"A Low Cost Polarized Navigation Sensor Design","authors":"Yang Yang, Chen Hao, Chen Nannan, Yan Yong-zheng","doi":"10.1109/CIACT.2018.8480242","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480242","url":null,"abstract":"In this paper, a low-cost bionic polarized light collection sensor is designed based on the sand ant navigation mechanism. The paper presents the basic theory and hardware implementation plan. At the same time, the algorithm and principle of polarization angle acquisition are introduced, which describe the calculation method in detail. At the end of the paper, the causes of the polarization angle error are analyzed and the error compensation method is given. The result of experiment shows that the sensor can collect the information of polarized light and the azimuth angle can be gotten effectively. Its error is about 2° and cost is low.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114412664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blind Watermarking Algorithm for Audio Signals in Multi-Resolution and Singular Value Decomposition 基于奇异值分解的多分辨率音频信号盲水印算法
A. Kaur, M. Dutta
{"title":"A Blind Watermarking Algorithm for Audio Signals in Multi-Resolution and Singular Value Decomposition","authors":"A. Kaur, M. Dutta","doi":"10.1109/CIACT.2018.8480367","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480367","url":null,"abstract":"The copyright protection of multimedia now-a-days is a big challenge due to advancement in information technology. The issue of protecting copyright of audio signals has been addressed in this paper by designing an audio watermarking algorithm using DWT-SVD domain. This paper proposes a blind, secure and robust audio watermarking algorithm which is focused on hiding data using SVD transformation of audio signal in DWT domain. In this paper, each bit of watermark is hidden in the audio signal using mean quantization so that more bits can be hidden while maintaining good audible quality of the signal. This proposed technique is robust to numerous audio attacks and the efficiency of the proposed algorithm has been proved by simulation results. The comparison of the proposed audio watermarking algorithm and the existing audio watermarking algorithms is an indication of goo performance of proposed algorithm in terms of imperceptibility and robustness at a very large payload of 6553.6 bps","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116806736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of seamless handover between APs based on traffic load in SDWN SDWN中基于业务负载的ap间无缝切换设计
Chi Ya-ping, Li Xiao, Xu Ping, Yang Jianxi
{"title":"Design of seamless handover between APs based on traffic load in SDWN","authors":"Chi Ya-ping, Li Xiao, Xu Ping, Yang Jianxi","doi":"10.1109/CIACT.2018.8480218","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480218","url":null,"abstract":"Software Defined Network(SDN) decouples control plane and data plane as a new type of network architecture. Centralized control is beneficial to obtain global network topology quickly and provides greater convenience for seamless handover between AP. In view of the handover between AP in Software Defined Wireless Network (SDWN, this article mainly researched in SDWN client’s seamless handover between AP. Considering the influence of traffic load for the AP performance, this paper proposed a design of Inter-AP handover scheme based on traffic load perception and a seamless handover algorithm between AP based on traffic load perception in SDWN. The design by considering the wireless client received signal strength (RSSI) and traffic load on the AP can effectively solve the problem of load imbalance between AP. Finally, applying the scheme on a small test platform, and shows that the scheme is feasible. By compared with the traditional handover algorithm based on RSSI, the handover algorithm is proved that it can effectively enhance the network throughput.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123022706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial Mining of Web-Log to observe reachability of Website web日志的空间挖掘,观察网站的可达性
Kamakshi, D. Mehrotra, V. Deep
{"title":"Spatial Mining of Web-Log to observe reachability of Website","authors":"Kamakshi, D. Mehrotra, V. Deep","doi":"10.1109/CIACT.2018.8480173","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480173","url":null,"abstract":"The web sites are the virtual interface of an organization. the object of designing a web site is to reach to the maximum public. To evaluate the reachability of web site organization wants to look for the spread of the visitors reaching to the website the weblog contains. The IP address through which the location of the visitor can be trace the data mining techniques helps to visualize the patters in the system. in this paper k means clustering techniques is used to find the clusters of people, using the NASA website.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Imaging Method for Automated SkinLesion Segmentation using Statistical Analysis and Bit Plane Slicing 基于统计分析和位平面切片的皮肤病灶自动分割成像方法
Ashmita Gupta, Ashish Issac, Malay Kishore Duttal, K. Říha
{"title":"An Imaging Method for Automated SkinLesion Segmentation using Statistical Analysis and Bit Plane Slicing","authors":"Ashmita Gupta, Ashish Issac, Malay Kishore Duttal, K. Říha","doi":"10.1109/CIACT.2018.8480175","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480175","url":null,"abstract":"Melanoma can prove fatal if not diagnosed at early stage. Computer aided identification of diseases can equip normal people in performing a screening test of diseases. The accurate lesion segmentation plays a crucial role in correct diagnosis of skin diseases. This work proposes a skin lesion segmentation method using statistical analysis and bit plane slicing. Hole filling operation is competent enough to sufficiently reject the noisy pixels from the finally segmented image. The results of skin lesion segmentation obtained from the proposed algorithm has been compared with the annotated images available with the database. The results arepresented in form of overlapping score and correlation coefficient. An average overlapping score and correlation coefficient of 91.59% and 92.07%, respectively, is obtained from the proposed algorithm. Also, an image based performance analysis of segmented lesion has been done and an average sensitivity of 94.33% has been achieved. The results are convincing and suggests that the proposed work can be used for some real-time application.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128001279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Cloud Computing: the State of Art, Application Scenarios and Challenges 移动云计算:现状、应用场景和挑战
Jialu Hao, Ming Xian, Huimei Wang, Fengyi Tang, Pu Xiao
{"title":"Mobile Cloud Computing: the State of Art, Application Scenarios and Challenges","authors":"Jialu Hao, Ming Xian, Huimei Wang, Fengyi Tang, Pu Xiao","doi":"10.1109/CIACT.2018.8480365","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480365","url":null,"abstract":"With the wide use of mobile devices and the development of cloud computing and wireless network technology, mobile cloud computing has become a primary research direction in the field of mobile applications. Mobile cloud computing allows mobile devices to take advantage of the abundant cloud resources to complete computation-intensive tasks, thus improving performance and saving energy. On the basis of presenting the concept of mobile cloud computing, this paper analyzes the state of art of mobile cloud computing architecture, describes the application scenarios, and points out the main problems existing during the applying process of mobile cloud computing. Finally, the research and development direction in the future are prospected.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123176712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CEP Support for Detection of Application Layer Attacks 支持CEP检测应用层攻击
Balarengadurai Chinnaiah
{"title":"CEP Support for Detection of Application Layer Attacks","authors":"Balarengadurai Chinnaiah","doi":"10.1109/CIACT.2018.8480165","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480165","url":null,"abstract":"Application Layer attacks are continuously targeted by new techniques of distributed denial of service attacks (DDoS) causing service disruption and considerable financial damage. While some of the DDoS attacks exploit sof tware vulnerabilities, most take advantage of the openness of the Internet and its ability to deliver packets of data from nearly any source to any destination. The aim of the research work is an overview of detection of application layer attacks for the support of Cardinality Estimation Problem (CEP) to propose new solutions, which take advantage of early detection of attacks.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125279569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Algorithm for Heart Attack Detection using Fuzzy C-means and Alert using IoT 一种基于模糊c均值和物联网报警的心脏病检测算法
Kriti Gupta, P. Kaul, A. Kaur
{"title":"An Efficient Algorithm for Heart Attack Detection using Fuzzy C-means and Alert using IoT","authors":"Kriti Gupta, P. Kaul, A. Kaur","doi":"10.1109/CIACT.2018.8480157","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480157","url":null,"abstract":"This paper presents a mathematical model forheart attack detection and alert system based on a list of factors using Internet of Things IoT devices namely, sensors, Arduino UNO board and GSM (Global System for Mobile Communications)module. This robust mathematical model helps in preventing a patient from getting sudden heart attack by sending anotificationontheirmobileintheformofmessageoremail. This paper gives a brief study about the parameters on which heart attack depends and the values that are recommended by a doctor for a healthy body. The comparative analysis with the existing technique indicates that the proposed algorithm outperforms in terms of accurate detection of heart attack in human beings. Results obtained show that the proposed algorithm is competent enough yielding an accuracy of 82%.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116861304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Keyboard Invariant Biometric Authentication 键盘不变生物识别认证
P. Smriti, Swapnita Srivastava, Saurabh Singh
{"title":"Keyboard Invariant Biometric Authentication","authors":"P. Smriti, Swapnita Srivastava, Saurabh Singh","doi":"10.1109/CIACT.2018.8480337","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480337","url":null,"abstract":"Biometric authentication over internet is challenging due to the requirement of additional hardware devices to capture the required biometric data. Keystroke dynamics based approaches may be a good choice for numerous internet applications. However, keystroke data varies significantly across different types of keyboards for a given user (within user variability) which lowers the authentication accuracy, it becomes challenging to use keystroke dynamics in internet applications for authentication. In this paper, we present a unique approach for Keyboard Invariant Biometric Authentication System, which models the biometric data for one type of keyboard using the data from another type of keyboard (laptop). The experimental setup involves a desktop and a laptop computer in heterogeneous environment. Total 98 subjects have been participated in this research. We have compared the flight time of different users using desktop and laptop with the help of key pair. Regression technique is used to map the data for the two types of keyboard.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117097604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信