2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)最新文献

筛选
英文 中文
Design an intelligent controller for a process control system 为过程控制系统设计一种智能控制器
Meenakshi Sharma, P. Verma, L. Mathew
{"title":"Design an intelligent controller for a process control system","authors":"Meenakshi Sharma, P. Verma, L. Mathew","doi":"10.1109/ICICCS.2016.7542302","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542302","url":null,"abstract":"Process control is one of the important problems in today industries. Precise control of level, temperature, pressure and flow is important in many process applications. Now a day's PID controllers have found wide acceptance and applications in the industries. The main objective of this work is to improve the performance of PID controller of water tank system consists of various sensors /transducers used for measurement of process variables such as level, flow, pressure and temperature. These systems normally found in food and drink manufacturing, petrochemical production, water purification, sewage processing and many other area of industry. The Performance of the PID controller can be improved using various soft computing techniques such as Genetic Algorithm (GA), Artificial Neural Network (ANN), Particle Swarm optimizations (PSO), Fuzzy logic controller (FLC), In this paper GA and PSO used to improve the performance of the water tank system using gain optimization.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125083945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Solving traffic congestion — An application of VANET 解决交通拥堵——VANET的一个应用
Abhishek Srivastava, Gaurav Kapoor, Aman Gupta
{"title":"Solving traffic congestion — An application of VANET","authors":"Abhishek Srivastava, Gaurav Kapoor, Aman Gupta","doi":"10.1109/ICICCS.2016.7542307","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542307","url":null,"abstract":"Vehicular Ad Hoc Network (VANET) is an evolving technology of today's world and is expected to be all pervasive in the near future. The vehicles in VANET possess mobility as well as computational processing power. The vehicles collaboratively form the ad-hoc network and are peers of each other. This paper discusses solving Traffic Congestion as an application of VANET. We have simulated the work of mobility on Network Simulator Tool(NS2), in which we have simulated the traffic roads with the help of SUMO(Simulation of urban mobility) using routing protocol AODV.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123247821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multi release modeling of a software with testing effort and fault reduction factor 一个软件的多版本建模与测试工作和故障减少因素
P. K. Kapur, Prabhanjan Mishra, A. Shrivastava, S. Khatri
{"title":"Multi release modeling of a software with testing effort and fault reduction factor","authors":"P. K. Kapur, Prabhanjan Mishra, A. Shrivastava, S. Khatri","doi":"10.1109/ICICCS.2016.7542352","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542352","url":null,"abstract":"In today's fast moving day to day life almost everything is more or less dependent on software. This dependence on software has increased the demand of reliable software in no time. Hence software firms are now a days releasing multiple versions of the software instead of providing a software with less number of bugs and removing the bugs of the previous version in the next up-gradation Firms remove the bugs of the previous version in the next up-gradation or by updating the software. But removal of bugs is not a simple task and at the time of removal it may be possible that testing team may introduce some new bugs to it. In the existing software reliability literature numerous models are proposed incorporating effort spent on removing the bugs. In this paper we have incorporated one more attribute of fault reduction factor in the effort based multi release modelling of a software. Fault reduction factors (FRFs) play an important role in software reliability and are generally defined as the ratio of the total number of reduced faults to the total number of failures experienced. FRFs are not fixed and it is affected by many factors, e.g., imperfect debugging, resource allocations, and debugging time lag. Taking this into consideration we propose two effort based multi up-gradation software reliability growth models incorporating time dependent FRF. Numerical illustration of the proposed model is done on a real life data set of tandem computers for four release.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131677309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Multipath routing protocols in MANETs: A study manet中的多路径路由协议研究
Prasanta Kumar Manohari, N. Ray
{"title":"Multipath routing protocols in MANETs: A study","authors":"Prasanta Kumar Manohari, N. Ray","doi":"10.1109/ICICCS.2016.7542318","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542318","url":null,"abstract":"In the recent times many routing protocols have been proposed in MANET. Some of them prefers single path and forward the entire packets over that path. However, single path routing protocols fails to perform in many environments. In the same time, multipath routing selects multiple routes between the same source-destination pair to forward the entire traffic. It has so many advantages as compared to the single path. It gives better network lifetime, energy efficiency, and lower end-to-end delay. They have also some challenges in terms of data packet ordering, path maintenance etc. In this paper, an attempt has been made to discuss issues and challenges of multipath routing in MANETs. We analysis and discuss them briefly in this study.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133337863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Big data lakes can support better population health for rural India — Swastha Bharat 大数据湖可以为印度农村地区更好的人口健康提供支持
Shalu Gupta, P. Tripathi
{"title":"Big data lakes can support better population health for rural India — Swastha Bharat","authors":"Shalu Gupta, P. Tripathi","doi":"10.1109/ICICCS.2016.7542361","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542361","url":null,"abstract":"As India seeks to become a world power, there's maybe nothing additional vital than the health and well-being of its citizens. Better population health is one among the vital considerations in India. While, those living in cities and massive cities have access to high finish health services, the ample folks living in rural India, notably within the remote elements of the country face issues of inadequate facilities and poor access to attention. The inefficiencies and inequities within the public health care access in India have pushed forward the necessity for power and innovative solutions to strengthen a similar. Paper identifies the large shortage of correct health care facilities and addresses a way to give bigger access to primary health care services in rural India. any this paper, it conjointly addresses the important computing and analytical ability of Big Data in process huge volumes of transactional information in real time things to show the dream of Swastha Bharat (Healthy India) into reality. Furthur the target of this paper is to suggest the reforms within the health care sector and boosts the discussions on how government will harness innovations within the big data analytics to boost the health care system.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132275490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Computational analysis of composite layered structure using ABAQUS software for engineering applications 应用ABAQUS软件对复合材料层状结构进行工程计算分析
Shilpi Ghosh, Ankesh Yadav, Snigdha Sharma, S. Urooj, V. Bhadoria
{"title":"Computational analysis of composite layered structure using ABAQUS software for engineering applications","authors":"Shilpi Ghosh, Ankesh Yadav, Snigdha Sharma, S. Urooj, V. Bhadoria","doi":"10.1109/ICICCS.2016.7542310","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542310","url":null,"abstract":"This paper describes the analysis of constituent materials of a composite layered structure using the platform of ABAQUS software. Unlike in composite materials, the constituent materials when used individually have various adverse effects on their structure. The simulation results signify the variation in the different sections of the composite structure due to the effect of load. Depending upon these facilitated simulation results, various engineering applications of this composite material structure has been explored.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125697673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A systematic review of applications of Bee Colony Optimization 蜂群优化的应用综述
Sherry Chalotra, S. Sehra, Sukhjit Singh Sehra
{"title":"A systematic review of applications of Bee Colony Optimization","authors":"Sherry Chalotra, S. Sehra, Sukhjit Singh Sehra","doi":"10.1109/ICICCS.2016.7542297","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542297","url":null,"abstract":"In this paper an overview of Bee Colony Optimization and area of its application where it has been used is given. Bee Colony Optimization is based on concept of Swarm Intelligence (SI), the artificial intelligence (AI) which is based on decentralized and self-organizing systems that can either be natural or artificial. Bee Colony Optimization is a meta-heuristic algorithm which uses the swarm behavior of bees to interact locally with one another in their environment that simulates the foraging behavior of honey bees and combines the global explorative search with local explorative search. The Bees Algorithms hunts synchronously the most promising regions of the solution space and also samples the most favorable regions. BCO is a class of optimization algorithm which uses the bottom-up approach of modeling and swarm intelligence of honeybees. The primary aim of this paper is to give an insight into the areas in which BCO can be used.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125898252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Data-mining a mechanism against cyber threats: A review 数据挖掘:对抗网络威胁的机制综述
S. Kumar, J. Jassi, S. Yadav, Ravi Sharma
{"title":"Data-mining a mechanism against cyber threats: A review","authors":"S. Kumar, J. Jassi, S. Yadav, Ravi Sharma","doi":"10.1109/ICICCS.2016.7542343","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542343","url":null,"abstract":"Data mining is the process in that analyzing of data from different perspective and summarizes that data into some useful information which can be used to enhance the revenue generation, cost cutting etc. In data mining, cluster formation plays a vital role which is data can be divided into different groups. Clustering is the technique in which grouping is based on similar type of data relevant to different attributes. WEKA is the most important tool of data mining which is used to allocate and clustering of data with use of various machine learning algorithms. The purpose of this paper is to compare different algorithms of machine learning on the subject of types of data set, their size, number of clusters and cyber privacy platform. We also discuss different types of cyber threats in computing world.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131465339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Ensemble based approach to increase vulnerability assessment and penetration testing accuracy 基于集成的方法提高漏洞评估和渗透测试的准确性
J. Goel, Mohsen Hallaj Asghar, Vivek Kumar, S. Pandey
{"title":"Ensemble based approach to increase vulnerability assessment and penetration testing accuracy","authors":"J. Goel, Mohsen Hallaj Asghar, Vivek Kumar, S. Pandey","doi":"10.1109/ICICCS.2016.7542303","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542303","url":null,"abstract":"Vulnerability Assessment and Penetration Testing is an important activity to improve cyber defense of systems/networks. It assist to make systems/networks vulnerability free. But it is a costly process. Premium VAPT tools are very costly. Even premium VAPT tools are not able to give 100 % accuracy to find out vulnerability. In addition to that, single VAPT tool cannot find all type of vulnerabilities. So there is a need of a model that can find out all type vulnerabilities, gives almost 100 % accuracy and do not cost more. To achieve this goal we made an Ensemble approach of VAPT tools. Our approach combine multiple VAPT tools (open source/premium) and apply majority voting and weighted priority. Our approach provide better accuracy and more versatility. Our approach provide cost effective solution for vulnerability analysis and penetration testing. After that we made a software to implement this approach called `VEnsemble 1.0'. We have also presented implemented software and results in this paper.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116948180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A critical review of Artificial Bee Colony optimizing technique in software testing 软件测试中人工蜂群优化技术综述
Disha Garg, Abhishek Singhal
{"title":"A critical review of Artificial Bee Colony optimizing technique in software testing","authors":"Disha Garg, Abhishek Singhal","doi":"10.1109/ICICCS.2016.7542311","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542311","url":null,"abstract":"Any software development is governed by implementation of all steps in a Software Development Life Cycle in an effective manner. Out of all the steps in SDLC, the testing phase plays an important role in determining whether the software is developed in the most efficient and correct manner, since it states the measure of correctness of the product and also verifies whether the software is completely acceptable to the user or not. Testing phase can be achieved successfully either through manual means or can be automated by various testing tools. Manual testing will obviously take more time and may also lead to many errors that can remain unidentified. However, automatic testing ensures that all bugs are identified and all errors are removed with the help of various meta-heuristic techniques such as Genetic Algorithms with Mutation Testing, Artificial Bee Colony Algorithm and Ant Colony Optimization. The Artificial Bee Colony works on the intelligent synchronization of bees where they help each other to find nodes in the software code with promising results. This approach has been discussed in detail. The proposed approach is more scalable, requires less computation time and is easy to understand and implement.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124437436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信