2015 International Conference on Green Computing and Internet of Things (ICGCIoT)最新文献

筛选
英文 中文
E-readiness to implement e-government an overview study in HR domain in Nepal 尼泊尔人力资源领域实施电子政务的电子准备综述研究
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380526
Shreedhar Marasini, S. Shakya
{"title":"E-readiness to implement e-government an overview study in HR domain in Nepal","authors":"Shreedhar Marasini, S. Shakya","doi":"10.1109/ICGCIOT.2015.7380526","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380526","url":null,"abstract":"Information and Communication Technology play vital roles for personal and societal growth. Basis of ICT development is composed of ICT infrastructure, ICT hardware, software & information system, human resource, ICT Security etc. HR is the first and most important domain of e-Government because if there is no skilled human resource (HR), then, Plans, Policies, Infrastructure, Network, Hardware, Software is deficient. Human Resources as the living resources that can make decisions and synchronize with other domains resulting a better e-government System. This study focuses on HR domain to check their e-readiness to implement e-government in Nepal. The study aims to give us an overview on the output of our current HR skills, qualifications, training, job responsibility etc. The last 10 years readiness index and human capital index data are presented. Similarly the current status of human resource and their overview on the basis of availability, skills, job opportunity, competency, computer literacy, willingness and preparedness are also discussed.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"33 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114090863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of classification accuracy of our Adaptive Classifier using image processing techniques in the field of Medical Data Mining 在医学数据挖掘领域,利用图像处理技术提高自适应分类器的分类精度
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380599
Sneha Chandra, Maneet Kaur
{"title":"Enhancement of classification accuracy of our Adaptive Classifier using image processing techniques in the field of Medical Data Mining","authors":"Sneha Chandra, Maneet Kaur","doi":"10.1109/ICGCIOT.2015.7380599","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380599","url":null,"abstract":"Medical Data Mining is one of the most challenging fields of Data Mining. The greatest challenge lies in classifying the diseases with high classification accuracy. In this research work, image processing techniques have been used on the advanced version of our Adaptive Classifier, to generate categories for the attributes of sample medical datasets. The advanced version of our Adaptive Classifier has been generated using the techniques of Clustering Data Mining in conjunction with Classification Data Mining. The proposed approach works upon the sample medical datasets, and compares the results of our Adaptive Classifier with the results of its constituent classifiers. The experimental results generated showed higher classification accuracy for our Adaptive Classifier, which has rightly aroused the curiosity required for further analysis.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120909425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Study of data security and privacy preserving solutions in cloud computing 云计算中数据安全和隐私保护解决方案的研究
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380627
Siddhartha Choubey, M. Namdeo
{"title":"Study of data security and privacy preserving solutions in cloud computing","authors":"Siddhartha Choubey, M. Namdeo","doi":"10.1109/ICGCIOT.2015.7380627","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380627","url":null,"abstract":"Cloud computing is a rapidly growing model of computation. It is the delivery of computing services by shared resources, software and information over the network (Internet or Intranet). It allows user to store large amount of data in cloud storage and use as when required from any part of the world by networks. Cloud computing is network based technology since security issues like privacy, data security, confidentiality etc. are encountered. It has a number of users, who are using cloud services like social network, email, file-sharing and other which are increasing the data load in cloud storage regularly. It is also increasing the risk of data vulnerability. Therefore, the data security must be provided in cloud computing models. There are some solutions proposed, to resolve these issues, based on encryption techniques. The main contribution of this paper is to perform a study of different solutions to provide data security and privacy in existing cloud computing scenario.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121149392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Experimental analysis of energy management techniques for mobile devices using cloud computing 使用云计算的移动设备能源管理技术的实验分析
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380560
Oshin Sharma, H. Saini
{"title":"Experimental analysis of energy management techniques for mobile devices using cloud computing","authors":"Oshin Sharma, H. Saini","doi":"10.1109/ICGCIOT.2015.7380560","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380560","url":null,"abstract":"For energy efficient mobile devices, cloud computing is very much essential by providing storage and performing computations in the network. With the help of cloud computing many devices can connect over internet and can access the resources at anytime from anywhere. This paper provides a clear view of various energy management techniques used for mobile devices and performance analysis of various cloud computing techniques for energy efficient devices. For this, we have given brief introduction and our vision in the field of green computing. In addition to this we performed performance analysis of various load balancing techniques based on six different cases.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123747298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and implementation of low power, cost effective human machine interface by left and right eye movement technique 利用左右眼运动技术设计和实现低功耗、低成本的人机界面
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380445
A. Saravanan, Nikhil Arora, Silpa Ajith Kumar
{"title":"Design and implementation of low power, cost effective human machine interface by left and right eye movement technique","authors":"A. Saravanan, Nikhil Arora, Silpa Ajith Kumar","doi":"10.1109/ICGCIOT.2015.7380445","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380445","url":null,"abstract":"The development of assistive technologies by means of human machine interface is turning out to be one of the most attractive areas of today's research. Innovation in power consumption, signal processing and wireless communication has been the focus for the development of such systems. However, these devices have not reached the mass market yet. This system incorporates Texas embedded processor, wireless communication solutions and highly-customized analog front ends. As a proof of concept, this technology integrates MCU architecture, instrumentation amplifiers as analog front end and further single supply quad op-amp for analog signal processing in an effective manner. The development of such a cost effective versatile system can impact clinical and rehabilitative control applications in most of the developing countries thus revolutionizing this domain.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121510104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Next State Prediction algorithm for the avionic systems using the hidden Markov models 基于隐马尔可夫模型的航空电子系统下一状态预测算法
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380726
M. Lokesh, Y. S. Kumaraswamy
{"title":"Next State Prediction algorithm for the avionic systems using the hidden Markov models","authors":"M. Lokesh, Y. S. Kumaraswamy","doi":"10.1109/ICGCIOT.2015.7380726","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380726","url":null,"abstract":"This paper covers increasing need for next state prediction in the field of the avionics system that will predict and overcome the faults caused by the avionics systems. “Next State Prediction” is used for the predication of the possible states that the system can exist. This paper explains about how Markov models and hidden Markov models can be used for the prediction of the state in which the system exist based on which it could be stated if it is in a safe state. In the current scenario, it is not possible to have 100% test coverage for all the test cases. There will be instances where some of the portions that will not be covered by the test coverage and may lead to catastrophic faults. A very good process of verification and validation is carried out before the software is operational. However, all these are carried out before the software is commissioned on the target for its stipulated use. Further, the V&V is carried out in a simulated environment. It is very difficult to simulate the environment into. There could be some environmental conditions which have not been simulated and which could trigger the software state to an unsafe condition. Hence we use this methodology so as to predict if the current state or any further states in which an aircraft could exist would be safer one, if not, necessary steps could be carried out so as to make it safer.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"15 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125624346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel and efficient approach to encrypt images using chaotic logistic map and stream cipher 一种利用混沌逻辑映射和流密码对图像进行加密的新方法
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380694
M. Rani, Sudesh Kumar
{"title":"A novel and efficient approach to encrypt images using chaotic logistic map and stream cipher","authors":"M. Rani, Sudesh Kumar","doi":"10.1109/ICGCIOT.2015.7380694","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380694","url":null,"abstract":"This research gives a novel approach for fast encryption of images using chaotic maps and pixel shuffling using modified RC4 stream cipher algorithm. In this, the given image will be first divided into the three blocks of same size which represents red, green and blue color intensity matrices respectively. These 2d blocks will the converted to horizontal vectors and these vectors will then undergo from a series of bit shuffling process. These independent blocks will then be encrypted using proposed algorithm and then transmitted to the network after reconciling these blocks. The key space for this proposed algorithm is 2192. The user key is 120 bit and the rest 72 bit is appended at run time to generate a dynamic key for each encryption process.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"144 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114017735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Semi visible watermarking scheme based on DWT and PCA 基于小波变换和主成分分析的半可见水印方案
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380606
Anand Kumar, M. Gupta
{"title":"Semi visible watermarking scheme based on DWT and PCA","authors":"Anand Kumar, M. Gupta","doi":"10.1109/ICGCIOT.2015.7380606","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380606","url":null,"abstract":"In this paper, we have purposed a DWT-PCA based non-blind digital colour image watermarking scheme. We have developed two algorithms for embedding and extraction process. The original image is first DWT-decomposed, and then the colour watermark is implanted. Before embedding the watermark, the original image is segmented and principle component analysis is applied. Watermark embedding is applied in different frequency bands of the image and PSNR and NC plots are drawn for all the frequency bands. PSNR and NC are two parameters which define the correlation between the original image and watermarked image. A comparative study of plots of PSNR and NC shows that embedding in HL and LH bands is more robust and imperceptive than LL and HH band. Plots show the robustness of the scheme against various attacks. The main aim of this paper is to present a scheme for the purpose of copy right protection and authentification of the colour image data.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122937016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cascaded DNA cryptography and steganography 级联DNA密码和隐写术
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380438
Shweta, S. Indora
{"title":"Cascaded DNA cryptography and steganography","authors":"Shweta, S. Indora","doi":"10.1109/ICGCIOT.2015.7380438","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380438","url":null,"abstract":"The redundancy in English words helps the unauthorized entity to guess the cipher text. The DNA sequences do not follow such properties. It means the conversion of message to DNA sequences make it robust against attacks. This paper performs the DNA cryptography and then hides the DNA sequence in to the random frame of a video. The result analysis shows that the frame is imperceptible. The video seems to be same. The enhancement in PSNR value and reduction in MSE shows the effectiveness of the technique.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133664944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
5G: Revolution of future communication technology 5G:未来通信技术的革命
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380446
Sanjay Kumar, G. Gupta, Kunwar Singh
{"title":"5G: Revolution of future communication technology","authors":"Sanjay Kumar, G. Gupta, Kunwar Singh","doi":"10.1109/ICGCIOT.2015.7380446","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380446","url":null,"abstract":"This paper aims to specify the future generation of wireless mobile communication networks. In this paper also specify the development of various wireless technologies range from 1G to 4G and future prediction as 5G. 5G technology is a very important advantage which will change the way we look at these different wireless technologies & will also change the way bandwidth users look at it as they can access their phones quite differently. 5G will also enhance the e-payments and e-transactions. 5G design is based on the user centric mobile environment.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133942425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信