2017 7th International Conference on Communication Systems and Network Technologies (CSNT)最新文献

筛选
英文 中文
Performance analysis of cloud applications using cloud analyst 使用云分析工具对云应用程序进行性能分析
A. Dubey, Vimal Mishra
{"title":"Performance analysis of cloud applications using cloud analyst","authors":"A. Dubey, Vimal Mishra","doi":"10.1109/CSNT.2017.8418515","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418515","url":null,"abstract":"Advancements in the cloud computing is initiating the new opportunities for cloud applications. Now people, devices and networks are constantly generating huge data. There exist several tools that can be used to model such environment and to study the behavior of large scale applications or services. Cloud Analyst is the one of the best visual modeler and analyzing tool for cloud environment. The Cloud Analyst tool is having global visualization modeling capability. In this tool, we can model geographically distributed computing servers and user workloads. It provides easy to use visual tool so that a modeler can fully concentrate on the simulation parameters rather than the complexities of programming. In this paper, we review the feature and simulation screens of Cloud Analyst and analytical study of different simulation configuration setup. We have explored various simulation scenarios and analyze the result of different scenarios.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116948741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The design and implementation of the front end of the art play library system 美术游戏库系统前端的设计与实现
N. Yi, Xin Feng, Chunfang Li
{"title":"The design and implementation of the front end of the art play library system","authors":"N. Yi, Xin Feng, Chunfang Li","doi":"10.1109/CSNT.2017.8418553","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418553","url":null,"abstract":"With the continuous enrichment of film and television, the script management system came into being. At the same time, the arrival of the Web2.0 era has made people become stricter about the usability and interactive experience of the website. Well designed and well featured web sites can increase user experience and increase user retention, while poorly designed and slow acting sites make users feel bad and churn out a large number of users. Therefore, the front-end design and interaction of web applications is becoming more important. The first chapter introduces the background and significance of the development of art play library system, the second chapter introduces the three basic front-end technologies and the common framework, the third chapter introduces the overall structure of the system and the specific design and implementation of front end, the fourth chapter summarizes.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126262054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of smart home communication protocol's and security & privacy aspects 智能家居通信协议和安全隐私方面的研究
A. K. Ray, A. Bagwari
{"title":"Study of smart home communication protocol's and security & privacy aspects","authors":"A. K. Ray, A. Bagwari","doi":"10.1109/CSNT.2017.8418545","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418545","url":null,"abstract":"The IoT (Internet-of-Things) make possible the physical things or home appliances or hand held devices or objects (e.g., smart phones, TVs, cars) can be interconnected by means of suitable communication protocols and information technology infrastructure to share the data to each other and access a range of applications and services like data storage, analytics. In current scenario, application of IoT & its supporting tools and techniques in smart home implementation is one of the major area where many big companies like Google, Amazon etc are investing huge amount of money and initiated the research for better comfort security & safety at home. This paper will discuss about smart homes and its components, application of Internet of Things in smart homes, communication protocol details applicable for smart home devices communication, security flaws in existing protocols of communication for IoT enabled hardware and proposed secure protocol with desirable attributes for secure communication protocol for smart homes using IoT and it can interoperate and compatible with existing protocols.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124419313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An LMI approach for robust LQR control of PWM buck converter with parasitics 带有寄生的PWM降压变换器鲁棒LQR控制的LMI方法
Deepali Doliya, M. Bhandari
{"title":"An LMI approach for robust LQR control of PWM buck converter with parasitics","authors":"Deepali Doliya, M. Bhandari","doi":"10.1109/CSNT.2017.8418519","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418519","url":null,"abstract":"In this paper, a polytopic model of an uncertain buck converter with parasitic resistances is obtained in continuous conduction mode. Although linear quadratic regulators (LQRs) provide good stability and are optimal but they do not ensure robustness for the highly uncertain system. Therefore, A robust LQR designing method for power converters is presented using linear matrix inequalities (LMIs) to ensure robust stability of highly uncertain systems and the output is analyzed in the presence of line and load perturbations. In addition, an input voltage feedforward gain is included in this closed loop converter system to achieve a good line regulation. It is shown that with feedforward, there is no transient due to the line voltage perturbations. The results of the proposed approach are verified through simulation.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125824588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and implementation of an efficient tool to verify integrity of files uploaded to cloud storage 设计和实现一个有效的工具来验证上传到云存储的文件的完整性
Priyansi Parida, Snehalata Konhar, Bharati Mishra, Debsish Jena
{"title":"Design and implementation of an efficient tool to verify integrity of files uploaded to cloud storage","authors":"Priyansi Parida, Snehalata Konhar, Bharati Mishra, Debsish Jena","doi":"10.1109/CSNT.2017.8418512","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418512","url":null,"abstract":"Cloud storage system (CSS) provides storage service through which users can upload their files for getting several benefits like ease of access, less cost and robustness. The uploaded files must be encrypted to achieve confidentiality. These files are replicated across multiple nodes distributed over various geographical boundaries by the CSS provider to ensure robust-ness. But these files may get corrupted unintentionally during transmission or intentionally by malicious users. To ensure the integrity of the uploaded file, an efficient integrity verifier tool is essential. In this paper, the design and implementation of an integrity verifier tool for files uploaded to cloud has been presented. Merkle Hash Tree (MHT) and digital signatures have been used to verify the integrity. The tool has been integrated with Dropbox Cloud Storage Provider and its performance results have been presented.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130486780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection of attacks in IoT based on ontology using SPARQL 基于SPARQL本体的物联网攻击检测
Mohit Mittal, Shafalika Vijayal
{"title":"Detection of attacks in IoT based on ontology using SPARQL","authors":"Mohit Mittal, Shafalika Vijayal","doi":"10.1109/CSNT.2017.8418538","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418538","url":null,"abstract":"Nowadays, the concept of Internet of Things (IoT) has been manifested into reality with the help of latest developments or transformations in hardware circuitry, devices and protocols. IoT is such a diversified field in which a lot of challenges are faced during implementations of IoT applications including smart cities, smart homes, industrial sectors etc. The current scenario is highly demanding for deployment of smart sensors into existing applications to deliver a fully automated system. The major issue faced by IoT's existing system is security issue. In this paper, various attacks in IoT systems has discussed and focuses on ontology based model to deal with various attacks.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A multilevel encryption technique in cloud security 云安全中的多级加密技术
Bappaditya Jana, Jayanta Poray, Tamoghna Mandal, Malay Kule
{"title":"A multilevel encryption technique in cloud security","authors":"Bappaditya Jana, Jayanta Poray, Tamoghna Mandal, Malay Kule","doi":"10.1109/CSNT.2017.8418541","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418541","url":null,"abstract":"Today ensuring security is one of the major concern in cloud environment. Cloud privacy is a one of the tentative issue in cloud computing. As the entire cloud user do not have same demands regarding cloud privacy. Some of the clients are satisfied with current policy where as others are quite concerned about the corresponding privacy. As per the fundamental cloud architecture it is generally deployed via three core service models, namely software as a service, platform as service and infrastructure as a service. But unfortunately these entire delivery services model are vulnerable to a range of security attacks by intelligent intruder. Although government as well as major of the organizations are moving fast towards a secure cloud cryptography offers a wide range of algorithms for cloud security but all these algorithms provide single level encryption. To enhance the security level we have proposed a multilevel security scheme which is more secure than any type of single level encryption. Particularly our technique shows that only authorized user can able to access the cloud data. Our algorithm is fast and safe in both direction such as upload and download of a file. As decryption technique is multilevel so if some data is lost then it is very difficult to decrypt the data.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123228260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Smart input: Provide mouse and keyboard input to a PC from android devices 智能输入:从android设备向PC提供鼠标和键盘输入
Abhisek Maiti, Sayantan Majumdar, S. Bhattacharjee, A. Nath
{"title":"Smart input: Provide mouse and keyboard input to a PC from android devices","authors":"Abhisek Maiti, Sayantan Majumdar, S. Bhattacharjee, A. Nath","doi":"10.1109/CSNT.2017.8418558","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418558","url":null,"abstract":"Most Android smartphones have numerous built-in sensors. These sensors are capable of providing raw data with high precision and accuracy. However, the applicability of these sensors is not limited to the host device. This paper focuses on the application of inertial sensors (Accelerometer and Gyroscope) to monitor three-dimensional device movement and orientation and emulate the mobile device as a virtual multi-purpose input device by making appropriate use of these data in realtime. Predictive text and auto-correct are useful features of smartphones that traditional PCs generally do not offer. The paper also focuses on incorporating these features while emulating the mobile device as a text input device capable of inputting together a sequence of characters. Strong end to end encryption is enforced on these data for obvious security reasons.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114030896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and synthesis of two step coupled gap resonator and its application as a bandpass filter 两阶耦合间隙谐振器的分析与合成及其作为带通滤波器的应用
P. Mondal, S. K. Parui
{"title":"Analysis and synthesis of two step coupled gap resonator and its application as a bandpass filter","authors":"P. Mondal, S. K. Parui","doi":"10.1109/CSNT.2017.8418501","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418501","url":null,"abstract":"In this manuscript, a two step gap coupled resonator is modelled for designing a bandpass filter. The proposed structure is viewed simultaneously as edge coupled section and parallel coupled section. A detailed nodal analysis of the proposed coupled gap sections using different current and voltage equations are described, which is further derived to obtain different admittance parameter equations. Finally comparing those equations with normal two port network, even and odd mode impedance difference (Z0o-Z0e) equations are obtained in terms of parallel coupled admittance inverter (Jg1) and shunt susceptance (Bg1) at the edge coupled section. This equation is further used for designing the resonator with bandaccepted characteristics. A three pole wideband bandpass filter is demonstrated by series arrangement of four such coupled resonator unit. The proposed bandpass filter exhibits FBW of 53.5%. All the results are well verified by numerical simulation and validated through experiments.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122808899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A compact wideband staircase-shaped four-element MIMO antenna for WLAN, L-band and S-band applications 一种紧凑型宽带阶梯状四元MIMO天线,适用于WLAN, l波段和s波段应用
Aastha Gupta, Vipin Choudhary, M. Tripathy, P. Ranjan
{"title":"A compact wideband staircase-shaped four-element MIMO antenna for WLAN, L-band and S-band applications","authors":"Aastha Gupta, Vipin Choudhary, M. Tripathy, P. Ranjan","doi":"10.1109/CSNT.2017.8418503","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418503","url":null,"abstract":"In this paper, a compact quad-port four-element multiple input multiple output (MIMO) antenna operating at 2.4 GHz is reported. The frequency bandwidth is obtained as 1.1–5.3 GHz and is suitable for WLAN/WiMAX and IoT applications. The overall dimension of the substrate is 30×70×1.6 mm3. The area covered by antenna elements and the coplanar ground plane are 30×20 mm2 and 30×50 mm2 respectively. To reduce mutual coupling between the elements and achieve good isolation, parasitic element is used at the back of the antenna. The maximum isolation obtained is −20 dB at 2GHz. The peak gain is obtained as 4.1 dB at operating frequency 2.4 GHz. The proposed compact and planar four element MIMO antenna is designed and simulated by using HFSS 14.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134144601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信