{"title":"The RFM-based ubiquitous framework for secure and efficient banking","authors":"Yashwant Singh Patel, Divyanshi Agrawal, Laxmi Soumya Josyula","doi":"10.1109/ICICCS.2016.7542333","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542333","url":null,"abstract":"In recent years, the RFM model has been broadly referred to analyze the behavior of customers based on recency, transaction frequency and monetary background. With this perspective, this study proposes a new RFM-based Ubiquitous methodology for customer segmentation based on the given transaction driven parameters and then the MCDM techniques can be used for proper ranking of customers. Then the bank can plan their marketing strategy and can not only attract but also make them satisfy by offering proper policies to them. The main of this paper is to use this scoring model and to propose the alternative strategies for efficient use of security resources so that security cost while maintaining the bank accounts can be reduced at a major extent. This study also gives a case study with real banking data so that a proper methodology and results can be represented.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122070758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Filtering unwanted messages from OSN walls","authors":"Priyanka Salunkhe, Smita Bharne, Puja Padiya","doi":"10.1109/ICICCS.2016.7542319","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542319","url":null,"abstract":"Online Social Networking sites (OSNs) helps to connect people easily. There are various online social sites that are available like Facebook, Twitter etc. which brought world closer. In OSN, user creates an account on social sites after which they are able to perform various actions like adding friends, sharing videos and images. OSN sites provide some space or area to post the status such a space is called Wall. But sometimes people post offensive messages on a particulars wall which may cause a serious problem to user's reputation. To avoid such kind of serious problem we can apply Information Filtering (IF) technique. Information filtering can be used for formless data in contrast to database application in which data required is in ordered manner. There are various types of Information Filtering methods namely Content-based filtering method, Policy-based filtering method and Collaboration filtering method. This paper focuses on analyzing methodology Information Filtering on social networks.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116470157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on elastic resource allocation algorithm for cloud infrastructure","authors":"Kshitiza Vasudewa, Punit Gupta","doi":"10.1109/ICICCS.2016.7542344","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542344","url":null,"abstract":"Elasticity is an asset of cloud computing which makes it better or may be best over the other conventional grid and cluster computing. Cloud elasticity is the ability of the cloud infrastructure to rapidly change the amount of resources allocated to a service during runtime in order to meet the actual varying demands on the service while enforcing SLAs. Initially, elasticity being a key feature of clouds is classified based on Scope, Policy, Purpose and Method of elasticity. This completely explains where, how and why elasticity is crucial. Secondly, diversified related work to elasticity is reviewed and discussed in order to define the state of the art of elasticity in clouds. In this paper we have compared various proposed algorithm based on Quality of service and whether they support elasticity of not.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127702186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved particle swarm optimization for multi-robot path planning","authors":"P. K. Das, B. Sahoo, H. Behera, S. Vashisht","doi":"10.1109/ICICCS.2016.7542324","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542324","url":null,"abstract":"This paper proposes a new methodology to optimize trajectory of the path for multi-robots using Improved particle swarm optimization Algorithm (IPSO) in clutter Environment. IPSO technique is incorporated into the multi-robot system in a dynamic framework, which will provide robust performance, self-deterministic cooperation, and coping with an inhospitable environment. The robots on the team make independent decisions, coordinate, and cooperate with each other to accomplish a common goal using the developed IPSO. A path planning scheme has been developed using IPSO to optimally obtain the succeeding positions of the robots from the existing position in the proposed environment. Finally, the analytical and experimental result of the multi-robot path planning were compared with those obtained by IPSO, PSO and DE (Differential Evolution) in a similar environment. The simulation and the Khepera environment result show outperforms of IPSO as compared to PSO and DE with respect to the average total trajectory path deviation and average uncovered trajectory target distance.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134087746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An anatomization of noise removal techniques on medical images","authors":"Madhulika Pandey, Madhulika Bhatia, Abhay Bansal","doi":"10.1109/ICICCS.2016.7542308","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542308","url":null,"abstract":"In applications of signal processing such as medicine, communications and satellites, preprocessing is considered as a vital step which focuses on reduction or removal of the level of the noise contained in the image. The process of denoising helps in preserving the finer details and useful information. Medical images like MRI, CT and X-ray contain very fine details that need to be correct and free from noise so that the information and features of interests are not lost during the diagnosis. In this paper, various noise reduction techniques such as wavelet transform, Neural Network, PCA, ICA and mean and median filters over medical images has been discussed. In this paper we tried to highlight the strength and weakness of various noise removal techniques over processing of the medical images.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114785619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. K. Sahu, A. Anand, Aseem Sharma, Nidhi Nautiyal
{"title":"A review: Outrageous cyber warfare","authors":"S. K. Sahu, A. Anand, Aseem Sharma, Nidhi Nautiyal","doi":"10.1109/ICICCS.2016.7542306","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542306","url":null,"abstract":"Looking at cyber war, cyber threat becomes the pitfall as the threats are what that results in a war at a level so big that can shake the political activities. Often the threats are misunderstood or not looked carefully at. Cyber-attacks extracts confidential data at macro and micro level. It's about the advanced threats that are emerging now days in the form of codes and we focus upon the future of this war. Knowingly that the cyber-attacks have become more lethal the first priority is building up a stronger defense mechanism. Cyber war is a result of insecurity or disturbance due to any person, association & system dealt by spying, stealing, and breaching to keep a track of competitors. It is sometimes an unnecessary advertisement of force. Ultra sophisticated malware “Stuxnet” which ceased one-fifth of Iran's nuclear enrichment plant gave us an outlook of how disastrous cyber-attacks are. It's not all about bombs or missiles causing losses, bytes and codes also do possess a threat equivalent or even more than them. Above all, governments do try to breach our privacy by using cyber tools and to stalk rivals.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127048984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IRIS based human identification: Analogizing and exploiting PSNR and MSE techniques using MATLAB","authors":"Madhulika Pandey, Madhulika Bhatia, Abhay Bansal","doi":"10.1109/ICICCS.2016.7542309","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542309","url":null,"abstract":"In today's reality, security has gotten to be paramount. Many biometrics methods like facial expression recognition system, Iris recognition system is a standout amongst the most dependable leading technologies for user authentication. It is steady for the duration of the life, it can serve as a living visa or a living secret word that one need not recall however is always present. Iris biometry helps in identifying an individual in a more intuitive and natural manner. Iris recognition focuses on recognizing the identity of individuals using the textural based characteristics of the muscular patterns of the iris. Irises assure long period stability and also infrequent requirements for the enrollment process. Accuracy, higher information content, real timeliness, performance, stability, low circumvention and uniqueness makes iris technology as the one of the most suitable candidate to be deployed in the field of the security. The study attempted to highlight the performance of various preprocessing techniques used in iris recognition in terms of their PSNR values and MSE values.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126639632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abhishek Gupta, Narendra Pal Singh Chauhan, R. Saxena
{"title":"Real time I-V and P-V curve tracer using LabVIEW","authors":"Abhishek Gupta, Narendra Pal Singh Chauhan, R. Saxena","doi":"10.1109/ICICCS.2016.7542320","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542320","url":null,"abstract":"This paper presents and discusses a low-cost and simple technique of monitoring and processing I-V and P-V curve of photovoltaic module. This curve is to be traced using Laboratory Virtual Instrument Engineering Workbench (LabVIEW) interface capability. The constructed LabVIEW software displays the electrical variables (voltage, current and power) on dedicated graph windows in a real time manner. The current versus voltage (I-V) and power versus voltage (P-V) characteristics are taken for any chosen panel, displayed and stored accurately. The proposed technique holds extra function of a digital multimeter (DMM) interfacing it with LabVIEW and its integration in to an application type of data acquisition and processing. User has possibility to observe and record data in the form of chart, table and file (.lvm) in real time. This whole system consists of personal computer with LabVIEW software, two DMMs, solar module, a variable resistive load. This paper can also be discussed further research plan in the area of load analysis of PV system.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130149653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shifali Gupta, Vineet Kumar, K. Rana, P. Mishra, J. Kumar
{"title":"Development of Ant Lion Optimizer toolkit in LabVIEW™","authors":"Shifali Gupta, Vineet Kumar, K. Rana, P. Mishra, J. Kumar","doi":"10.1109/ICICCS.2016.7542295","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542295","url":null,"abstract":"Metaheuristic or nature inspired optimization have evolved over time towards development of a general purpose optimizer. In this paper, a novel nature inspired algorithm, based on hunting mechanism of antlions, Ant Lion Optimizer toolkit is developed in LabVIEWTM environment. This paper provides an orderly procedure for development of toolkit including random walk of ants, building of traps, catching of prey and finally rebuilding of traps. LabVIEWTM is a highly productive development environment used largely in measurement and control applications. The only standard optimizer toolkit available in LabVIEW™ is Differential Evolution (DE) and therefore a need was felt to have an efficient optimizer. The toolkit so evolved in this paper when tested on different benchmark functions has performed adequately well over the DE toolkit. The results so obtained clearly prove that the submitted toolkit is able to provide superior results in terms of improved exploration, local optima avoidance, exploitation, and convergence.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133660026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pradeep Kushwaha, Vimal Bibhu, B. P. Lohani, Divya Singh
{"title":"Review on information security, laws and ethical issues with online financial system","authors":"Pradeep Kushwaha, Vimal Bibhu, B. P. Lohani, Divya Singh","doi":"10.1109/ICICCS.2016.7542350","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542350","url":null,"abstract":"Information security for banking application of online services is mandatory aspects to protect the information and information system assets of the bank. Protection depends upon the mechanism and aligned tools and technologies with the assets such as networking components and software applications. Online functionalities of banking system is more prone to be attacked due to use of open public network for remote customers and employees to perform the basic functions of banking services. The major security concerns are confidentiality, integrity, availability, accuracy etc. These security concerns are analyzed with domain of functions and proper and effective mechanisms are devised to mitigate such type of event to happen with assets. Laws and regulation proposed by legislature in this area is also effective to prevent the attackers and hackers to do such violation with the information assets of the bank. The proactive security mechanism is considered as better mechanism to protect the application integrity along with the application. The ethics related with the functional domain of the banking services. The work ethics must be positive with the domain of the role of the system with electronic platform.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128404403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}