2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)最新文献

筛选
英文 中文
A wireless device for patient ECG monitoring and motion activity recording for medical applications 一种用于医疗应用的患者心电图监测和运动活动记录的无线设备
S. A. Hussain, A. Singh, Chandrashekar Ramaiah, S. Hussain
{"title":"A wireless device for patient ECG monitoring and motion activity recording for medical applications","authors":"S. A. Hussain, A. Singh, Chandrashekar Ramaiah, S. Hussain","doi":"10.1109/ICRITO.2016.7785032","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785032","url":null,"abstract":"For Good Mental health and strength of any human life the basic activity regularly to be practiced is a Physical Exercise. The chronic diseases such as Heart attack, Arthritis, Cancer and Diabetes can be easily prevented with regular exercise which also helps to maintain the weight and reduces cholesterol. The researchers have been attracted with this area and its situations for real time monitoring. As GPS have developed to large extent this capability also helps to work in a real time manner. The basic idea is to develop a user-friendly mobile wireless ECG and motion activity recording device. This paper describes a complete remote monitoring solution where Bluetooth electrocardiogram sensor transmits the patient's data related to health immediately on a phone. This Information is displayed and stored in a memory of a mobile phone. The GPRS network connected to the system will provide up to date status of the patient's heart disease. It is designed in such a way to keep the status or monitoring of the patient data to a mobile phone and it is defined as a secure tool for transferring the data from different measuring devices to a mobile platform, this solution ensures that the results displayed on mobile phone are accurate with respect to time and cost. In simple words it provides the best communication between patient and doctor. For achieving disease management and critical success in getting patient data with real time feedback is possible by this activity recording application. This yields in to better result and better treatment for a patient.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116089964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Study on white-box cryptography: Key whitening and entropy attacks 白盒密码的研究:密钥白化和熵攻击
Kratika Bhatia, S. Som
{"title":"Study on white-box cryptography: Key whitening and entropy attacks","authors":"Kratika Bhatia, S. Som","doi":"10.1109/ICRITO.2016.7784974","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784974","url":null,"abstract":"White-box cryptography is intended on saving software completions of algorithms based on cryptography against the recovery of key. They are mainly applied in applications based on Digital Rights Managements (DRM) as a cost effective substitute. This paper explains White-Box Cryptograph trends and some important problems, also focuses on two most popular cryptographic techniques-key whitening and entropy technique as well as the attacks imposed on them.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116229505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancement in RED algorithm for isolation of DDOS attack in wired network 有线网络中DDOS攻击隔离RED算法的改进
I. Gupta, Sukhbeer Singh
{"title":"Enhancement in RED algorithm for isolation of DDOS attack in wired network","authors":"I. Gupta, Sukhbeer Singh","doi":"10.1109/ICRITO.2016.7784982","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784982","url":null,"abstract":"Security is one of the critical issue in any network, in order to have better performance and efficiency, better security parameters must be imposed on it. In this research security model of the network has been explained, further it is analyzed that various attacks are possible in the network that gives threat to security and one of such attack is DDoS attack, framework of DDoS attack is discussed in detail. Also AQM technique like RED has been analyzed. RED queue has been implemented to detect and isolate DDoS attack. To achieve malicious node detection, Min and Max threshold values are used. Results show that network performance has been improved to a great extent in terms of metrics such as packet loss, jitter and throughput.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124856666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applications and usage of visual cryptography: A review 视觉密码学的应用与使用综述
Anjney Pandey, S. Som
{"title":"Applications and usage of visual cryptography: A review","authors":"Anjney Pandey, S. Som","doi":"10.1109/ICRITO.2016.7784984","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784984","url":null,"abstract":"Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. In this paper, we intend to study the different application areas of Visual Cryptography. Visual Cryptography is a wide area of research used in data hiding, securing images, color imaging, multimedia and other such fields. Visual Cryptography comes in the field of data hiding used in cybercrime, file formats etc. This paper focuses on the application areas of visual cryptography from four different research papers/journals which talk about the most important application areas of visual cryptography.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124961364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Fruit defect detection based on speeded up robust feature technique 基于加速鲁棒特征技术的水果缺陷检测
Yogesh, Ashwani Kumar Dubey
{"title":"Fruit defect detection based on speeded up robust feature technique","authors":"Yogesh, Ashwani Kumar Dubey","doi":"10.1109/ICRITO.2016.7785023","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785023","url":null,"abstract":"This paper elaborated the fruit quality detection technique which was based on external properties of fruits such as shape, size and color. Due to large demand, manual monitoring of fruits are ineffectual for agriculture industry. So, it requires a competent technique which will help agriculture industry to full fill the demand of consumer. The proposed method is based on the use of speeded up robust feature. The method extracts the local feature of the segmented image and describes the object recognition. The objective is to design the defect detection algorithm which will be used for feature extraction and descriptor having less processing time.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130292282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
MEACSRA: Mobility and energy-aware cross-layer searching routing algorithm for wireless sensor network MEACSRA:无线传感器网络的移动性和能量感知跨层搜索路由算法
Vinamrata, Rajeev Paulus, A. Jaiswal, Mukesh Kumar
{"title":"MEACSRA: Mobility and energy-aware cross-layer searching routing algorithm for wireless sensor network","authors":"Vinamrata, Rajeev Paulus, A. Jaiswal, Mukesh Kumar","doi":"10.1109/ICRITO.2016.7785016","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785016","url":null,"abstract":"WSNs with randomly deployed nodes, to reduce energy consumption while ensuring the connectivity and power of entire network is an important issue of research. A mobility and energy-aware cross-layer searching routing algorithm works in stationary and mobile scenario with the satisfactory performance in addition to mobility handling, provides route to nodes which forward data between each other directly in a single hop, or indirectly through multiple hops via neighbouring nodes and considers the channel assessing mechanism as well. This algorithm performs better in both CFP and CAP. Markov model analysis shows the state of each step. Cross-layer design considering MAC and PHY layer yields better performance. Simulated result shows energy consumption is efficient in both stationary and mobile scenario for larger scale network.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128877862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analyzing and shrinking network inaccessibility in ZIGBEE wireless communication by comparing it with TDMA-MAC protocol 通过与TDMA-MAC协议的比较,分析和缩小ZIGBEE无线通信中的网络不可达性
Mohammad Mushaib, Rajeev Paulus, A. K. Jaiswal, Aditi Agarwal
{"title":"Analyzing and shrinking network inaccessibility in ZIGBEE wireless communication by comparing it with TDMA-MAC protocol","authors":"Mohammad Mushaib, Rajeev Paulus, A. K. Jaiswal, Aditi Agarwal","doi":"10.1109/ICRITO.2016.7785018","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785018","url":null,"abstract":"The ZIGBEE standard is one of the basal elucidation protocol proposed for wireless sensor networks. The protocol describes a flexible MAC layer layout to meet a variety of applications. Since WSN is pertinence-specific it is very termitable to provide a generic explication for all type of applications and topologies. Network inaccessibility is a sensual affair derived from the subsistence of fault stirring the elucidation services bestowed by the Medium Access Control (MAC) sub-layer. Network inaccessibility is the cause of communication black-out. This cause prevention in communication and may create disruption of network operation. For network inaccessibility a diagnostic miniature is passed-down in Wireless Sensor network to present ZIGBEE as a case study. In this paper network accessibility is reduced by using star and tree topology and implementing TDMA-MAC protocol and ZIGBEE MAC protocol in WSN network and comparing through-put, end-to end delay and packet delivery ration in two scenarios. A Network Simulator (NS-2) is used to check the effectiveness of different topologies.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127840260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study on big data analytics research domains 大数据分析研究领域研究
S. Malgaonkar, Sanchi Soral, S. Sumeet, Tanay Parekhji
{"title":"Study on big data analytics research domains","authors":"S. Malgaonkar, Sanchi Soral, S. Sumeet, Tanay Parekhji","doi":"10.1109/ICRITO.2016.7784952","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784952","url":null,"abstract":"Data Analytics is the trending domain that analyses data to observe patterns and predict future outcomes. The outcomes are based upon analysis of past and current trends and behaviors. Data analytics deals with both descriptive and predictive analyses of data. Descriptive Data Analytics summarizes the data, it's behavior and draws useful conclusion from it. Predictive Data Analytics is the branch of data analytics that predicts future outcomes based on the current and historical data. These future predictions are drawn by observing patterns followed for past data and outcomes for the past events for similar scenarios. In this paper, various branches of data analytics have been discussed. Big data analytics architecture gives an overview of the various tools and system structure involved in big data analytics. Big data analytics is closely related to data mining and hence, implements data mining algorithms. Latter part of the paper covers machine learning algorithms and neural networks for training the dataset to recognize patterns for the modeled data and predict outcomes based on the training and pattern recognition. Modeling of data using neural networks helps in generating accurate and exhaustive outcomes.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131705427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Comparative study of cluster and tree based data aggregation techniques in Vehicular Ad-Hoc Networks 车载Ad-Hoc网络中基于簇和树的数据聚合技术的比较研究
Shaurya Gupta, R. Poonia
{"title":"Comparative study of cluster and tree based data aggregation techniques in Vehicular Ad-Hoc Networks","authors":"Shaurya Gupta, R. Poonia","doi":"10.1109/ICRITO.2016.7784994","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784994","url":null,"abstract":"Vehicular Ad-hoc Networks (VANETs) allows nodes or vehicles to intercommunicate with each other on a particular path. Some of the examples of its applications include enhancing road safety and supporting drivers and offer information facility like junction collision warning and intelligent traffic administration. The purpose of this paper is to study the components of data aggregation, data flow model for Vehicular Ad-hoc Networks along with data aggregation techniques. Later, we find out the best technique for VANET.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Novel approach for cache memory simulation at approximately-timed TLM abstraction level for SMP system SMP系统在近似时间TLM抽象层的缓存模拟新方法
Nishit Gupta, Sunil Alag
{"title":"Novel approach for cache memory simulation at approximately-timed TLM abstraction level for SMP system","authors":"Nishit Gupta, Sunil Alag","doi":"10.1109/ICRITO.2016.7785002","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785002","url":null,"abstract":"To meet the ever increasing high speed computing requirements of complex System on Chips (SoC), there has been an increasing trend towards adopting Symmetric Multiprocessing (SMP) Systems encapsulating multiple processing cores each having multi-level cache memory for faster accesses. At an early design phase, estimating the requirement of - cache memory size and levels, prefetching strategy, snooping mechanism and coherency protocol to be adopted may save a lot of RTL simulation time and SoC area. Also, optimized cache parameters facilitate better SoC performance in terms of Bandwidth, latency, FIFO depth, arbitration policies etc. of various IP cores. In this work, keeping above in view, a novel approach is proposed to simulate coherent (Multi-Level) Cache Memory based on MESI protocol for Multi-Core Symmetric Multiprocessing (SMP) System deploying the benefits of Timed TLM simulations at an early design phase. The proposed Cache Memory system is provided with the memory reference traces extracted from earlier SoC simulation. Based on the user requirement, a memory hierarchy is dynamically generated which produces various cache memory access statistics which can be appropriately used for optimizing Cache Memory parameters.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122406240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信