Ashutosh Pandey, Rijwan Khan, Akhilesh Kumar Srivastava
{"title":"Challenges in Automation of Test Cases for Mobile Payment Apps","authors":"Ashutosh Pandey, Rijwan Khan, Akhilesh Kumar Srivastava","doi":"10.1109/CIACT.2018.8480303","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480303","url":null,"abstract":"Software Engineering is a field of new challenges every day. With every passing day, new technologies emerge. There was an era of web Applications, but the time has changed and most of the web Applications are available as Mobile Applications as well. The Mobile Applications are either android based or iOS based. To deliver error free, secure and reliable Application, it is necessary to test the Applications properly. Software testing is a phase of software development life cycle, where we test an Application in all aspects. Nowadays different type of tools are available for testing an Application automatically but still we have too many challenges for applying test cases on a given Application. In this paper the authors will discuss the challenges of automation of test cases for a Mobile based payment Application.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115816453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Low Cost Polarized Navigation Sensor Design","authors":"Yang Yang, Chen Hao, Chen Nannan, Yan Yong-zheng","doi":"10.1109/CIACT.2018.8480242","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480242","url":null,"abstract":"In this paper, a low-cost bionic polarized light collection sensor is designed based on the sand ant navigation mechanism. The paper presents the basic theory and hardware implementation plan. At the same time, the algorithm and principle of polarization angle acquisition are introduced, which describe the calculation method in detail. At the end of the paper, the causes of the polarization angle error are analyzed and the error compensation method is given. The result of experiment shows that the sensor can collect the information of polarized light and the azimuth angle can be gotten effectively. Its error is about 2° and cost is low.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114412664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Blind Watermarking Algorithm for Audio Signals in Multi-Resolution and Singular Value Decomposition","authors":"A. Kaur, M. Dutta","doi":"10.1109/CIACT.2018.8480367","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480367","url":null,"abstract":"The copyright protection of multimedia now-a-days is a big challenge due to advancement in information technology. The issue of protecting copyright of audio signals has been addressed in this paper by designing an audio watermarking algorithm using DWT-SVD domain. This paper proposes a blind, secure and robust audio watermarking algorithm which is focused on hiding data using SVD transformation of audio signal in DWT domain. In this paper, each bit of watermark is hidden in the audio signal using mean quantization so that more bits can be hidden while maintaining good audible quality of the signal. This proposed technique is robust to numerous audio attacks and the efficiency of the proposed algorithm has been proved by simulation results. The comparison of the proposed audio watermarking algorithm and the existing audio watermarking algorithms is an indication of goo performance of proposed algorithm in terms of imperceptibility and robustness at a very large payload of 6553.6 bps","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116806736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of seamless handover between APs based on traffic load in SDWN","authors":"Chi Ya-ping, Li Xiao, Xu Ping, Yang Jianxi","doi":"10.1109/CIACT.2018.8480218","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480218","url":null,"abstract":"Software Defined Network(SDN) decouples control plane and data plane as a new type of network architecture. Centralized control is beneficial to obtain global network topology quickly and provides greater convenience for seamless handover between AP. In view of the handover between AP in Software Defined Wireless Network (SDWN, this article mainly researched in SDWN client’s seamless handover between AP. Considering the influence of traffic load for the AP performance, this paper proposed a design of Inter-AP handover scheme based on traffic load perception and a seamless handover algorithm between AP based on traffic load perception in SDWN. The design by considering the wireless client received signal strength (RSSI) and traffic load on the AP can effectively solve the problem of load imbalance between AP. Finally, applying the scheme on a small test platform, and shows that the scheme is feasible. By compared with the traditional handover algorithm based on RSSI, the handover algorithm is proved that it can effectively enhance the network throughput.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123022706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spatial Mining of Web-Log to observe reachability of Website","authors":"Kamakshi, D. Mehrotra, V. Deep","doi":"10.1109/CIACT.2018.8480173","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480173","url":null,"abstract":"The web sites are the virtual interface of an organization. the object of designing a web site is to reach to the maximum public. To evaluate the reachability of web site organization wants to look for the spread of the visitors reaching to the website the weblog contains. The IP address through which the location of the visitor can be trace the data mining techniques helps to visualize the patters in the system. in this paper k means clustering techniques is used to find the clusters of people, using the NASA website.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashmita Gupta, Ashish Issac, Malay Kishore Duttal, K. Říha
{"title":"An Imaging Method for Automated SkinLesion Segmentation using Statistical Analysis and Bit Plane Slicing","authors":"Ashmita Gupta, Ashish Issac, Malay Kishore Duttal, K. Říha","doi":"10.1109/CIACT.2018.8480175","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480175","url":null,"abstract":"Melanoma can prove fatal if not diagnosed at early stage. Computer aided identification of diseases can equip normal people in performing a screening test of diseases. The accurate lesion segmentation plays a crucial role in correct diagnosis of skin diseases. This work proposes a skin lesion segmentation method using statistical analysis and bit plane slicing. Hole filling operation is competent enough to sufficiently reject the noisy pixels from the finally segmented image. The results of skin lesion segmentation obtained from the proposed algorithm has been compared with the annotated images available with the database. The results arepresented in form of overlapping score and correlation coefficient. An average overlapping score and correlation coefficient of 91.59% and 92.07%, respectively, is obtained from the proposed algorithm. Also, an image based performance analysis of segmented lesion has been done and an average sensitivity of 94.33% has been achieved. The results are convincing and suggests that the proposed work can be used for some real-time application.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128001279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jialu Hao, Ming Xian, Huimei Wang, Fengyi Tang, Pu Xiao
{"title":"Mobile Cloud Computing: the State of Art, Application Scenarios and Challenges","authors":"Jialu Hao, Ming Xian, Huimei Wang, Fengyi Tang, Pu Xiao","doi":"10.1109/CIACT.2018.8480365","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480365","url":null,"abstract":"With the wide use of mobile devices and the development of cloud computing and wireless network technology, mobile cloud computing has become a primary research direction in the field of mobile applications. Mobile cloud computing allows mobile devices to take advantage of the abundant cloud resources to complete computation-intensive tasks, thus improving performance and saving energy. On the basis of presenting the concept of mobile cloud computing, this paper analyzes the state of art of mobile cloud computing architecture, describes the application scenarios, and points out the main problems existing during the applying process of mobile cloud computing. Finally, the research and development direction in the future are prospected.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123176712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CEP Support for Detection of Application Layer Attacks","authors":"Balarengadurai Chinnaiah","doi":"10.1109/CIACT.2018.8480165","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480165","url":null,"abstract":"Application Layer attacks are continuously targeted by new techniques of distributed denial of service attacks (DDoS) causing service disruption and considerable financial damage. While some of the DDoS attacks exploit sof tware vulnerabilities, most take advantage of the openness of the Internet and its ability to deliver packets of data from nearly any source to any destination. The aim of the research work is an overview of detection of application layer attacks for the support of Cardinality Estimation Problem (CEP) to propose new solutions, which take advantage of early detection of attacks.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125279569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Algorithm for Heart Attack Detection using Fuzzy C-means and Alert using IoT","authors":"Kriti Gupta, P. Kaul, A. Kaur","doi":"10.1109/CIACT.2018.8480157","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480157","url":null,"abstract":"This paper presents a mathematical model forheart attack detection and alert system based on a list of factors using Internet of Things IoT devices namely, sensors, Arduino UNO board and GSM (Global System for Mobile Communications)module. This robust mathematical model helps in preventing a patient from getting sudden heart attack by sending anotificationontheirmobileintheformofmessageoremail. This paper gives a brief study about the parameters on which heart attack depends and the values that are recommended by a doctor for a healthy body. The comparative analysis with the existing technique indicates that the proposed algorithm outperforms in terms of accurate detection of heart attack in human beings. Results obtained show that the proposed algorithm is competent enough yielding an accuracy of 82%.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116861304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keyboard Invariant Biometric Authentication","authors":"P. Smriti, Swapnita Srivastava, Saurabh Singh","doi":"10.1109/CIACT.2018.8480337","DOIUrl":"https://doi.org/10.1109/CIACT.2018.8480337","url":null,"abstract":"Biometric authentication over internet is challenging due to the requirement of additional hardware devices to capture the required biometric data. Keystroke dynamics based approaches may be a good choice for numerous internet applications. However, keystroke data varies significantly across different types of keyboards for a given user (within user variability) which lowers the authentication accuracy, it becomes challenging to use keystroke dynamics in internet applications for authentication. In this paper, we present a unique approach for Keyboard Invariant Biometric Authentication System, which models the biometric data for one type of keyboard using the data from another type of keyboard (laptop). The experimental setup involves a desktop and a laptop computer in heterogeneous environment. Total 98 subjects have been participated in this research. We have compared the flight time of different users using desktop and laptop with the help of key pair. Regression technique is used to map the data for the two types of keyboard.","PeriodicalId":358555,"journal":{"name":"2018 4th International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117097604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}