{"title":"Design an intelligent controller for a process control system","authors":"Meenakshi Sharma, P. Verma, L. Mathew","doi":"10.1109/ICICCS.2016.7542302","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542302","url":null,"abstract":"Process control is one of the important problems in today industries. Precise control of level, temperature, pressure and flow is important in many process applications. Now a day's PID controllers have found wide acceptance and applications in the industries. The main objective of this work is to improve the performance of PID controller of water tank system consists of various sensors /transducers used for measurement of process variables such as level, flow, pressure and temperature. These systems normally found in food and drink manufacturing, petrochemical production, water purification, sewage processing and many other area of industry. The Performance of the PID controller can be improved using various soft computing techniques such as Genetic Algorithm (GA), Artificial Neural Network (ANN), Particle Swarm optimizations (PSO), Fuzzy logic controller (FLC), In this paper GA and PSO used to improve the performance of the water tank system using gain optimization.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125083945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solving traffic congestion — An application of VANET","authors":"Abhishek Srivastava, Gaurav Kapoor, Aman Gupta","doi":"10.1109/ICICCS.2016.7542307","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542307","url":null,"abstract":"Vehicular Ad Hoc Network (VANET) is an evolving technology of today's world and is expected to be all pervasive in the near future. The vehicles in VANET possess mobility as well as computational processing power. The vehicles collaboratively form the ad-hoc network and are peers of each other. This paper discusses solving Traffic Congestion as an application of VANET. We have simulated the work of mobility on Network Simulator Tool(NS2), in which we have simulated the traffic roads with the help of SUMO(Simulation of urban mobility) using routing protocol AODV.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123247821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. K. Kapur, Prabhanjan Mishra, A. Shrivastava, S. Khatri
{"title":"Multi release modeling of a software with testing effort and fault reduction factor","authors":"P. K. Kapur, Prabhanjan Mishra, A. Shrivastava, S. Khatri","doi":"10.1109/ICICCS.2016.7542352","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542352","url":null,"abstract":"In today's fast moving day to day life almost everything is more or less dependent on software. This dependence on software has increased the demand of reliable software in no time. Hence software firms are now a days releasing multiple versions of the software instead of providing a software with less number of bugs and removing the bugs of the previous version in the next up-gradation Firms remove the bugs of the previous version in the next up-gradation or by updating the software. But removal of bugs is not a simple task and at the time of removal it may be possible that testing team may introduce some new bugs to it. In the existing software reliability literature numerous models are proposed incorporating effort spent on removing the bugs. In this paper we have incorporated one more attribute of fault reduction factor in the effort based multi release modelling of a software. Fault reduction factors (FRFs) play an important role in software reliability and are generally defined as the ratio of the total number of reduced faults to the total number of failures experienced. FRFs are not fixed and it is affected by many factors, e.g., imperfect debugging, resource allocations, and debugging time lag. Taking this into consideration we propose two effort based multi up-gradation software reliability growth models incorporating time dependent FRF. Numerical illustration of the proposed model is done on a real life data set of tandem computers for four release.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131677309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multipath routing protocols in MANETs: A study","authors":"Prasanta Kumar Manohari, N. Ray","doi":"10.1109/ICICCS.2016.7542318","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542318","url":null,"abstract":"In the recent times many routing protocols have been proposed in MANET. Some of them prefers single path and forward the entire packets over that path. However, single path routing protocols fails to perform in many environments. In the same time, multipath routing selects multiple routes between the same source-destination pair to forward the entire traffic. It has so many advantages as compared to the single path. It gives better network lifetime, energy efficiency, and lower end-to-end delay. They have also some challenges in terms of data packet ordering, path maintenance etc. In this paper, an attempt has been made to discuss issues and challenges of multipath routing in MANETs. We analysis and discuss them briefly in this study.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133337863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big data lakes can support better population health for rural India — Swastha Bharat","authors":"Shalu Gupta, P. Tripathi","doi":"10.1109/ICICCS.2016.7542361","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542361","url":null,"abstract":"As India seeks to become a world power, there's maybe nothing additional vital than the health and well-being of its citizens. Better population health is one among the vital considerations in India. While, those living in cities and massive cities have access to high finish health services, the ample folks living in rural India, notably within the remote elements of the country face issues of inadequate facilities and poor access to attention. The inefficiencies and inequities within the public health care access in India have pushed forward the necessity for power and innovative solutions to strengthen a similar. Paper identifies the large shortage of correct health care facilities and addresses a way to give bigger access to primary health care services in rural India. any this paper, it conjointly addresses the important computing and analytical ability of Big Data in process huge volumes of transactional information in real time things to show the dream of Swastha Bharat (Healthy India) into reality. Furthur the target of this paper is to suggest the reforms within the health care sector and boosts the discussions on how government will harness innovations within the big data analytics to boost the health care system.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132275490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shilpi Ghosh, Ankesh Yadav, Snigdha Sharma, S. Urooj, V. Bhadoria
{"title":"Computational analysis of composite layered structure using ABAQUS software for engineering applications","authors":"Shilpi Ghosh, Ankesh Yadav, Snigdha Sharma, S. Urooj, V. Bhadoria","doi":"10.1109/ICICCS.2016.7542310","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542310","url":null,"abstract":"This paper describes the analysis of constituent materials of a composite layered structure using the platform of ABAQUS software. Unlike in composite materials, the constituent materials when used individually have various adverse effects on their structure. The simulation results signify the variation in the different sections of the composite structure due to the effect of load. Depending upon these facilitated simulation results, various engineering applications of this composite material structure has been explored.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125697673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A systematic review of applications of Bee Colony Optimization","authors":"Sherry Chalotra, S. Sehra, Sukhjit Singh Sehra","doi":"10.1109/ICICCS.2016.7542297","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542297","url":null,"abstract":"In this paper an overview of Bee Colony Optimization and area of its application where it has been used is given. Bee Colony Optimization is based on concept of Swarm Intelligence (SI), the artificial intelligence (AI) which is based on decentralized and self-organizing systems that can either be natural or artificial. Bee Colony Optimization is a meta-heuristic algorithm which uses the swarm behavior of bees to interact locally with one another in their environment that simulates the foraging behavior of honey bees and combines the global explorative search with local explorative search. The Bees Algorithms hunts synchronously the most promising regions of the solution space and also samples the most favorable regions. BCO is a class of optimization algorithm which uses the bottom-up approach of modeling and swarm intelligence of honeybees. The primary aim of this paper is to give an insight into the areas in which BCO can be used.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125898252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-mining a mechanism against cyber threats: A review","authors":"S. Kumar, J. Jassi, S. Yadav, Ravi Sharma","doi":"10.1109/ICICCS.2016.7542343","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542343","url":null,"abstract":"Data mining is the process in that analyzing of data from different perspective and summarizes that data into some useful information which can be used to enhance the revenue generation, cost cutting etc. In data mining, cluster formation plays a vital role which is data can be divided into different groups. Clustering is the technique in which grouping is based on similar type of data relevant to different attributes. WEKA is the most important tool of data mining which is used to allocate and clustering of data with use of various machine learning algorithms. The purpose of this paper is to compare different algorithms of machine learning on the subject of types of data set, their size, number of clusters and cyber privacy platform. We also discuss different types of cyber threats in computing world.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131465339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Goel, Mohsen Hallaj Asghar, Vivek Kumar, S. Pandey
{"title":"Ensemble based approach to increase vulnerability assessment and penetration testing accuracy","authors":"J. Goel, Mohsen Hallaj Asghar, Vivek Kumar, S. Pandey","doi":"10.1109/ICICCS.2016.7542303","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542303","url":null,"abstract":"Vulnerability Assessment and Penetration Testing is an important activity to improve cyber defense of systems/networks. It assist to make systems/networks vulnerability free. But it is a costly process. Premium VAPT tools are very costly. Even premium VAPT tools are not able to give 100 % accuracy to find out vulnerability. In addition to that, single VAPT tool cannot find all type of vulnerabilities. So there is a need of a model that can find out all type vulnerabilities, gives almost 100 % accuracy and do not cost more. To achieve this goal we made an Ensemble approach of VAPT tools. Our approach combine multiple VAPT tools (open source/premium) and apply majority voting and weighted priority. Our approach provide better accuracy and more versatility. Our approach provide cost effective solution for vulnerability analysis and penetration testing. After that we made a software to implement this approach called `VEnsemble 1.0'. We have also presented implemented software and results in this paper.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116948180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A critical review of Artificial Bee Colony optimizing technique in software testing","authors":"Disha Garg, Abhishek Singhal","doi":"10.1109/ICICCS.2016.7542311","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542311","url":null,"abstract":"Any software development is governed by implementation of all steps in a Software Development Life Cycle in an effective manner. Out of all the steps in SDLC, the testing phase plays an important role in determining whether the software is developed in the most efficient and correct manner, since it states the measure of correctness of the product and also verifies whether the software is completely acceptable to the user or not. Testing phase can be achieved successfully either through manual means or can be automated by various testing tools. Manual testing will obviously take more time and may also lead to many errors that can remain unidentified. However, automatic testing ensures that all bugs are identified and all errors are removed with the help of various meta-heuristic techniques such as Genetic Algorithms with Mutation Testing, Artificial Bee Colony Algorithm and Ant Colony Optimization. The Artificial Bee Colony works on the intelligent synchronization of bees where they help each other to find nodes in the software code with promising results. This approach has been discussed in detail. The proposed approach is more scalable, requires less computation time and is easy to understand and implement.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124437436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}