{"title":"A review of security of the cloud computing over business with implementation","authors":"Vimal Bibhu, Pradeep Kushwaha, B. P. Lohani","doi":"10.1109/ICICCS.2016.7542342","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542342","url":null,"abstract":"The organization productivity and employee prosperity depends upon the business outcome. Now a day, there is tough competition in the business world for more business outcomes. The key players or decision makers of any organization are always seeking the best path to do to achieve the desired goal of business outcomes. The business firms are also dedicated with the different technology to reduce the time of initiation for business activities. The cloud computing implementation requirements are mandatory with respect to its functions. The security and privacy is also a concern. The advantages of cloud system are very much deliberative. So all the facts suggest the management to properly developed and then consider the adoption of cloud system with relative advantages. Cloud computing interfaces require cost in its primary phase of implementation. In case of public cloud all the systems used for cloud under organization can be rented through the public cloud service provider. The Service License Agreement (SLA) is committed between service provider and organization by considering the applications and performance requirements. As the SLA is self explanatory and also maintains the service and performance conditions.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126504492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of OFDM and analysis of BER using inter carrier interfernce technique","authors":"Ankit Tripathi, V. Anand, A. Jain","doi":"10.1109/ICICCS.2016.7542299","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542299","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is a digital transmission method is used to increasing higher data rates in communications which can be used in both wired and wireless system. In this paper the issue of the Peak to Average Power Ratio (PAPR) in OFDM which is a major drawback, and presents new and variations to existing algorithms to reduce it. The analysis of the PAPR in OFDM is shown through theoretical analysis and simulation that the occurrence of large peaks in OFDM is actually quite rare [4]. The effect on system performance in terms of the Bit Error Rate (BER) and Power Spectral Density (PSD) is simulated for an OFDM transceiver with a saturated High Power Amplifier. Here in this we will study about OFDM using Complementary cumulative distribution function (CCDF) through MATLAB and analysis of BER using Inter carrier Interference technique (ICI).","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122832966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review on using soft computing techniques in disaster management and risk assessment","authors":"Swati Sharma, Vineet Sharma","doi":"10.1109/ICICCS.2016.7542346","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542346","url":null,"abstract":"Disaster management is extremely important in today's world. It is defined as the organization and management of resources and responsibilities for dealing with all humanitarian aspects of emergencies. For dealing with disaster strong and effective strategies of handling them is required. This paper gives a review of various disaster management and risk assessment methods which uses soft computing approach. The results of such reviews of various methodologies are to get an efficient analogy to create a robust model using existing computing techniques and applying them in various disasters.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127127049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An emerging trend of big data analytics with health insurance in India","authors":"Shalu Gupta, P. Tripathi","doi":"10.1109/ICICCS.2016.7542360","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542360","url":null,"abstract":"For the last century, the healthcare services and delivery including financing in India has been shrouded by life insurance challenges and importantly, shares key landmarks with general insurance. Many experts, practitioners and policy makers including researchers identified that, there is a big gap in the knowledge about innovations in public and private health financing and delivery. Apparent entails the necessity to alter the prevailing structure of the present health care services by applying “Big Data Analytics”. In this paper we'll discuss the various assorted implications, characteristics beside decrease in healthcare costs and how this new era of advanced and improved Data management is helping in Insurance Sector, more even we have to pay specific attention to the use cases which leads and drive new technology and eventually lead towards economic progress.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126585573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selecting appropriate cloud solution for managing big data projects using hybrid AHP-entropy based assessment","authors":"Nitin Sachdeva, P. K. Kapur, Gurinder Singh","doi":"10.1109/ICICCS.2016.7542351","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542351","url":null,"abstract":"Today technology that learns from data to forecast future behavior of individuals, organizations, government and country as a whole, is playing a crucial role in the advancement of human race. In fact, the strategic advantage most of the companies today strive for are use of new available technologies like cloud computing and big data. However, today's dynamic business environment poses severe challenges in front of companies as to how to make use of the power of big data with the technical flexibility that cloud computing provides? Therefore, evaluating, ranking and selecting the most appropriate cloud solution to manage big data project is a complex concern which requires multi criteria decision environment. In this paper we propose a hybrid entropy method combined with Analytical Hierarchical Process (AHP) to select appropriate cloud solution to manage big data projects in group decision making environment. In order to collate individual opinions of decision makers for rating the importance of various criteria and alternatives, we employed usability analysis using the proposed hybrid AHP-Entropy method.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134056508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing the physical web using Bluetooth low energy based beacons and a mobile app","authors":"Subhadra Rajpoot, Sachin Kumar, Preeti Singh","doi":"10.1109/ICICCS.2016.7542300","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542300","url":null,"abstract":"It looks amazing as we are approaching the next big tech revolution of Internet of things, where billions of devices (sensors) would be connected to internet. But it seems unrealistic that to interact with each smart device, user would have to download a separate mobile/tablet application. In this paper we have come with an approach to deal with this issue using beacons.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131851465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gaurav Negi, Eldo P. Elias, Rashi Kohli, Vimal Bibhu
{"title":"Reliability analysis of test cases for program slicing","authors":"Gaurav Negi, Eldo P. Elias, Rashi Kohli, Vimal Bibhu","doi":"10.1109/ICICCS.2016.7542336","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542336","url":null,"abstract":"The concept used in the research paper includes program slicing which is referred as the process of computing the chosen set of instructions of the program. The slicing criterion refers to the slice that is likely to affect the values at some point while executing the program. The paper highlights the different test cases and comparative analysis of program slicing methods which corresponds to the applications which are usually utilized in software modification activities i.e. Debugging process, testing analysis and its phases, calculating complexity and program understanding etc. In the approach used in the paper the “slicing” method of the program focus on precise & defined sub-components of a program; which can further be used to produce the instructions needed for the program, relevant to an explicit method of computation. Applying slicing techniques to software's using slicing tools, we can determine which components can be facilitated and reused. The process of designing phase of and the reused patterns are likely to suggest improvement in the respective code.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116408910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review of cyber threats to saftey crucial, space-based framework","authors":"Smita Sharma, Akanksha Singh, S. Kumar, S. Yadav","doi":"10.1109/ICICCS.2016.7542323","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542323","url":null,"abstract":"A space-based system plays a vital role within national critical infrastructures. They are being incorporated into energy distribution software, advanced air-traffic management applications, rail signalling systems, etc. These infrastructures are susceptible to a broad range of security threats thus unfortunately; the end users of communications, location sensing and timing applications often fail to understand these infrastructures. This paper focus on concerns related with potential cyber-attacks. These are very important because future attacks may overthrow many of the safety assumptions that support the condition of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. The main motive of this research work is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our flexibility against security threats.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115358286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unit commitment of thermal units in integration with wind and solar energy considering ancillary service management using priority list(IC) based genetic algorithm","authors":"Md Sajid Alam, M. S. Kumari","doi":"10.1109/ICICCS.2016.7542330","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542330","url":null,"abstract":"Demand for electricity is gradually increasing in India and use of more thermal power generation is leading to increased emissions. The effect of emission of thermal power plant is adverse to the environment; we cannot largely depend on thermal power plant for power generation. So, this work considered the integration of thermal units with the renewable sources like solar and wind, while accounting for ancillary service management and renewable energy uncertainties. Unit Commitment (UC) and Economic load dispatch (ELD) have significant research applications in power systems and optimize the total production cost for the forecasted load demand of particular hour. UC decides the turn ON/ turn OFF decision of particular unit/units according to the forecasted load of particular hour optimally while satisfying all constraints of the unit like minimum up and down time, startup and shut down cost constraints. ELD optimizes the operation cost for all scheduled generating units with respect to the forecasted load demands of customers in particular hour. UC and ELD are performed to reduce the total production cost to as minimum as possible, so that customer will get electricity at minimum cost. This paper presents a Genetic algorithm and priority list approach for wind and solar integrated system having thermal generators, for solving UC problem. The dynamic programming approach is used for the UC and ELD and production cost of each hour is calculated for comparison purpose.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115278505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emerging threats in mobile communication system","authors":"Swati Vashisht, Shubhi Gupta, Divya Singh, Ankush Mudgal","doi":"10.1109/ICICCS.2016.7542341","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542341","url":null,"abstract":"In present scenario only computer system is not a medium of cyber crime, smart phones and tablets also have become targets for cyber criminals to attack. With the growing use of mobile devices, new mobile applications are developing daily and user download these apps onto their mobile devices from different sites. Attacker may utilize these sites by injecting malicious codes to mobile devices without making people realize that they could have some security risks even though downloading apps from their official sites. Mobile cyber security can be gained by avoiding third party sites to download apps for users. Using verified official tools and platforms is a better way to avoid risks and threats when downloading mobile apps.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126748094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}