2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)最新文献

筛选
英文 中文
Object oriented approach to SQL injection preventer 面向对象方法的SQL注入防护器
D. Giri, S. P. Kumar, L. Prasannakumar, R. Murthy
{"title":"Object oriented approach to SQL injection preventer","authors":"D. Giri, S. P. Kumar, L. Prasannakumar, R. Murthy","doi":"10.1109/ICCCNT.2012.6395979","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395979","url":null,"abstract":"Many web applications can be exposed to a variety of Web-based attacks. One of these attacks is SQL injection, which can give attackers unrestricted access to the databases and has become increasingly frequent and serious. This paper presents a new highly automated approach for protecting Web applications against SQL injection that has both theoretical and practical advantages over most existing techniques. From a theoretical view, the approach is based on the idea of positive tainting and on the concept of syntax-aware evaluation. From a practical view, our technique is efficient, has minimal deployment requirements, and has a negligible performance overhead in most cases. We have implemented our techniques in the Web Application SQL-injection Preventer (WASP) tool, where a wide range of Web applications were subjected to a large and varied set of attacks and legal accesses. We considered login validation of user in an online banking system. WASP was able to stop all of these attacks and did not generate any false positives.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel approach to predict diabetes by Cascading Clustering and Classification 基于级联聚类和分类的糖尿病预测新方法
P. Hemant, T. Pushpavathi
{"title":"A novel approach to predict diabetes by Cascading Clustering and Classification","authors":"P. Hemant, T. Pushpavathi","doi":"10.1109/ICCCNT.2012.6396069","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396069","url":null,"abstract":"Knowledge of incidence and prevalence of a disease is vital in Community Medicine to control a disease. It is important in Internal Medicine for clinical diagnosis and presumptive treatment on a probability model. Prevalence informs the total case load at a given time. Incidence yields a pointer to extent of attention required and choice of measures. Initially K-means clustering is used to group the disease related data into clusters and assigns classes to clusters. Subsequently multiple different classification algorithms are trained on the result set to build the final classifier model based on K-fold cross validation method. This methodology is evaluated using 768 raw diabetes data obtained from a city hospital. The best accuracy for the given dataset is achieved in bagging algorithm compared to other classifiers. The proposed approach helps doctors in their diagnosis decisions and also in their treatment planning procedures for different categories.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127764577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Performance analysis of OFDMA in LTE LTE中OFDMA的性能分析
S. Prasad, C. Shukla, R. F. Chisab
{"title":"Performance analysis of OFDMA in LTE","authors":"S. Prasad, C. Shukla, R. F. Chisab","doi":"10.1109/ICCCNT.2012.6395933","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395933","url":null,"abstract":"The Long Term Evolution (LTE) takes the Orthogonal Frequency Division Multiple Access (OFDMA) as the multiple access technique for downlink to transmit data from base station to the Mobile Users (MUs) because of its ability to improve the spectrum efficiency, it has flexible user resource allocation, it can overcome the problems of Inter Symbol Interchange (ISI) and Inter Carrier Interchange (ICI). This paper introduces the properties of orthogonal frequency division multiplexing, discusses the strength, weakness of OFDMA, and highlights the factor that leverages the performance of OFDMA in LTE. The graphical result shows the relation between SNR, BER, Pe with the type of modulation used in LTE.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128621785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Novel algorithm for segmentation and automatic identification of pests on plants using image processing 基于图像处理的植物害虫分割与自动识别新算法
S. Huddar, S. Gowri, K. Keerthana, S. Vasanthi, S. R. Rupanagudi
{"title":"Novel algorithm for segmentation and automatic identification of pests on plants using image processing","authors":"S. Huddar, S. Gowri, K. Keerthana, S. Vasanthi, S. R. Rupanagudi","doi":"10.1109/ICCCNT.2012.6396012","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396012","url":null,"abstract":"Enormous agricultural yield is lost every year, due to rapid infestation by pests and insects. A lot of research is being carried out worldwide to identify scientific methodologies for early detection/identification of these bio-aggressors. In the recent past, several approaches based on automation and image processing have come to light to address this issue. Most of the algorithms concentrate on pest identification and detection, limited to a greenhouse environment. Also, they involve several complex calculations to achieve the same. In this paper, we propose a novel and unique algorithm to segregate and detect pests using image processing. The proposed methodology involves reduced computational complexity and aims at pest detection not only in a greenhouse environment but also in a farm environment as well. The whitefly, a bio-aggressor which poses a threat to a multitude of crops, was chosen as the pest of interest in this paper. The algorithm was tested for several whiteflies affecting different leaves and an accuracy of 96% of whitefly detection was achieved. The algorithm was developed and implemented using MATLAB programming language on MATLAB 7.1 build 2011a.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128737300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
SAPM: ANFIS based prediction of student academic performance metric SAPM:基于ANFIS的学生学习成绩指标预测
N. M. Zuviria, S. L. Mary, V. Kuppammal
{"title":"SAPM: ANFIS based prediction of student academic performance metric","authors":"N. M. Zuviria, S. L. Mary, V. Kuppammal","doi":"10.1109/ICCCNT.2012.6396065","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396065","url":null,"abstract":"A methodology for evaluating the academic performance metric of students is proposed in this paper based on their performance in periodic assessment tests, attendance and complexity of the question set. These are the major features determining the students learning efficiency evaluation. The impact of these metrics plays a major role in predicting the final grade of a student. The application of adaptive neuro fuzzy inference system helps to model the frame work for evaluating Student Academic Performance Metric(SAPM). The outcome of this methodology can be used to classify the students based on their academic skill and helpful in predicting the probability of their success in the final examinations.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114293290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Smart bank simulation using Context awareness 使用上下文感知的智能银行模拟
J. Madhusudanan, V. Prasanna Venkatesan, P. Karthikeyan, S. Shilpa Devi
{"title":"Smart bank simulation using Context awareness","authors":"J. Madhusudanan, V. Prasanna Venkatesan, P. Karthikeyan, S. Shilpa Devi","doi":"10.1109/ICCCNT.2012.6395892","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395892","url":null,"abstract":"Ubiquitous computing provides access to information and computing resources for the users in the place where they are, anywhere and anytime. In Ubiquitous Computing, every applications uses Context awareness as the most important properties. In particular, for smart bank, context awareness attempts to bring the best services to the bank customers. Since bank is the place where most of the people have to access the service, Smart Bank aims to provide the best services it can to the bank customer. In this paper, we propose ISBS, an Interactive Smart Bank Simulator system which aims at scheduling and simulating the behavior of an intelligent banking activity. This system aims at understanding the needs of the customers and provides the best service to the customers using an interactive simulation system. In reality it is hard to implement those systems in real time bank systems. Hence a simulation bank environment is used with virtual sensors instead of physical devices. In this research, the smart bank is considered as an environment made up of independent and distributed devices interacting to support customer services. Therefore, by using ISBS, the developer can realize the relationship among virtual device, surrounded environment, its use and bank appliances.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127436726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on performance, reliability and future proposal of Cognitive Radio under wireless computing 无线计算下认知无线电的性能、可靠性及未来建议综述
A. Umamaheswari, V. Subashini, P. Subhapriya
{"title":"Survey on performance, reliability and future proposal of Cognitive Radio under wireless computing","authors":"A. Umamaheswari, V. Subashini, P. Subhapriya","doi":"10.1109/ICCCNT.2012.6395960","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395960","url":null,"abstract":"In daily life internet plays a vital role in every aspects of web usage by the end users. Its essential purpose is information retrieval, packet transmission, communication between networks via wired and wireless mode. Subsequently wireless data networks and transmission are renowned by a fixed spectrum obligation policy and therefore that spectrum utilization becomes very significant one, in which new communication techniques are keep on increasing and the spectrum bandwidth remains limited because of unlicensed users. Cognitive radio is an innovatory technology to make use of the limited spectrum more successful. Cognitive Radio (CR) aspires to look up for the spectrum utilization by taking improvement of licensed user or primary user, which are so-called unused spectrum. Cognitive Radio has extensive applications together with dynamic spectrum access allocation and interference management, which will largely blow the NeXt Generation Network (xG) for wireless devices and networks. This new networking model is referred to as NeXt Generation (xG) Network as well as known as Dynamic Spectrum Access (DSA) and Cognitive Radio Networks. Eventually the performance and reliability of CR can be increased through the cross-layer design approach in the (xG) networks. In this paper, we carry out a survey on CR networks from various portions such as waveform, spectrum management and sensing, similarities between intelligent antenna and CR, performance and reliability evaluations etc.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125839102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A complete mobile security architecture using client and server driven protocols (WMN) 使用客户端和服务器驱动协议(WMN)的完整移动安全架构
N. Suresh Kumar, S. Selvakani
{"title":"A complete mobile security architecture using client and server driven protocols (WMN)","authors":"N. Suresh Kumar, S. Selvakani","doi":"10.1109/ICCCNT.2012.6395905","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395905","url":null,"abstract":"Wireless mesh networks are fast becoming the preferred way to deliver voice, video and data in outdoor environments. A wireless mesh can deliver the same network capacity, reliability and security that were once reserved for wired networks - but with the flexibility of wireless. With today's state-of-the-art solutions, municipalities, public safety agencies, port authorities, and industrial organizations can rely on mesh networks to provide essential connectivity to their workers and constituents. However, many technical issues still exist in this field. In order to provide a better understanding of the research challenges of WMNs, this article presents a detailed investigation of current state-of-the-art protocols and algorithms for WMNs. In this paper we propose MobiSEC, a complete security architecture that provides both access controls for mesh users and routers as well as a key distribution schemes that supports layer-2 encryption to ensure security and data confidentiality of all communications that occur in the WMN.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124910380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach for evaluation of changes in web services business logic 一种评估web服务业务逻辑更改的新方法
M. Thirumaran, P. Dhavachelvan, G. Naga Venkata Kiran
{"title":"A novel approach for evaluation of changes in web services business logic","authors":"M. Thirumaran, P. Dhavachelvan, G. Naga Venkata Kiran","doi":"10.1109/ICCCNT.2012.6395877","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395877","url":null,"abstract":"In today's ever-changing Business world, increasing market demand and meeting it through service technology has made change management an inevitable one. Although there are many change management issues and solutions, there is no proper support for efficient change evaluation and monitoring. In this paper, we propose a dependency analysis approach for evaluating the changes specified by the analyst in an effective manner. This measure of change evaluation ensures that the business analyst has a direct control over the changes he makes and provides a sophistic environment which notifies the analyst about the outcome of change progress in a meaningful way. We propose a set of change factors based on which the dependency relation existing between the business rules, functions and parameters are analyzed. These change factors evaluated as part of the change evaluation leads the change management process in efficient and controlled manner. We develop a prototype system of the proposed model to demonstrate its effectiveness. We also conduct an experimental study to assess the performance of the change management along with the change measure as an output.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced LSB technique for audio steganography 用于音频隐写的增强LSB技术
H. Kumar, Anuradha
{"title":"Enhanced LSB technique for audio steganography","authors":"H. Kumar, Anuradha","doi":"10.1109/ICCCNT.2012.6395978","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395978","url":null,"abstract":"The idea of this paper is to invent a new strategy in Steganography to get the minimum effect in audio which is used to hide data into it. “Progress always involves risk” Fredrick Wilcox observed that technological progress of computer science and the Internet altered the way we lived, and will continue to cast our life[1] . In this paper we have presented a Steganography method of embedding text data in an audio file. The basic approach behind this paper is to provide a good, well-organized method for hiding the data and sent to the destination in safer manner. In the proposed technique first the audio file is sampled and then appropriate bit is modified. In selected sample one bit is modified at least significant bit .The remaining bits may be used but it may be cause noise. We have attempted to provide an overview, theoretical framework about audio Steganography techniques and a novel approach to hide data in an audio using least significant bit (LSB).","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125531104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信