{"title":"E-readiness to implement e-government an overview study in HR domain in Nepal","authors":"Shreedhar Marasini, S. Shakya","doi":"10.1109/ICGCIOT.2015.7380526","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380526","url":null,"abstract":"Information and Communication Technology play vital roles for personal and societal growth. Basis of ICT development is composed of ICT infrastructure, ICT hardware, software & information system, human resource, ICT Security etc. HR is the first and most important domain of e-Government because if there is no skilled human resource (HR), then, Plans, Policies, Infrastructure, Network, Hardware, Software is deficient. Human Resources as the living resources that can make decisions and synchronize with other domains resulting a better e-government System. This study focuses on HR domain to check their e-readiness to implement e-government in Nepal. The study aims to give us an overview on the output of our current HR skills, qualifications, training, job responsibility etc. The last 10 years readiness index and human capital index data are presented. Similarly the current status of human resource and their overview on the basis of availability, skills, job opportunity, competency, computer literacy, willingness and preparedness are also discussed.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"33 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114090863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of classification accuracy of our Adaptive Classifier using image processing techniques in the field of Medical Data Mining","authors":"Sneha Chandra, Maneet Kaur","doi":"10.1109/ICGCIOT.2015.7380599","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380599","url":null,"abstract":"Medical Data Mining is one of the most challenging fields of Data Mining. The greatest challenge lies in classifying the diseases with high classification accuracy. In this research work, image processing techniques have been used on the advanced version of our Adaptive Classifier, to generate categories for the attributes of sample medical datasets. The advanced version of our Adaptive Classifier has been generated using the techniques of Clustering Data Mining in conjunction with Classification Data Mining. The proposed approach works upon the sample medical datasets, and compares the results of our Adaptive Classifier with the results of its constituent classifiers. The experimental results generated showed higher classification accuracy for our Adaptive Classifier, which has rightly aroused the curiosity required for further analysis.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120909425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of data security and privacy preserving solutions in cloud computing","authors":"Siddhartha Choubey, M. Namdeo","doi":"10.1109/ICGCIOT.2015.7380627","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380627","url":null,"abstract":"Cloud computing is a rapidly growing model of computation. It is the delivery of computing services by shared resources, software and information over the network (Internet or Intranet). It allows user to store large amount of data in cloud storage and use as when required from any part of the world by networks. Cloud computing is network based technology since security issues like privacy, data security, confidentiality etc. are encountered. It has a number of users, who are using cloud services like social network, email, file-sharing and other which are increasing the data load in cloud storage regularly. It is also increasing the risk of data vulnerability. Therefore, the data security must be provided in cloud computing models. There are some solutions proposed, to resolve these issues, based on encryption techniques. The main contribution of this paper is to perform a study of different solutions to provide data security and privacy in existing cloud computing scenario.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121149392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental analysis of energy management techniques for mobile devices using cloud computing","authors":"Oshin Sharma, H. Saini","doi":"10.1109/ICGCIOT.2015.7380560","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380560","url":null,"abstract":"For energy efficient mobile devices, cloud computing is very much essential by providing storage and performing computations in the network. With the help of cloud computing many devices can connect over internet and can access the resources at anytime from anywhere. This paper provides a clear view of various energy management techniques used for mobile devices and performance analysis of various cloud computing techniques for energy efficient devices. For this, we have given brief introduction and our vision in the field of green computing. In addition to this we performed performance analysis of various load balancing techniques based on six different cases.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123747298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of low power, cost effective human machine interface by left and right eye movement technique","authors":"A. Saravanan, Nikhil Arora, Silpa Ajith Kumar","doi":"10.1109/ICGCIOT.2015.7380445","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380445","url":null,"abstract":"The development of assistive technologies by means of human machine interface is turning out to be one of the most attractive areas of today's research. Innovation in power consumption, signal processing and wireless communication has been the focus for the development of such systems. However, these devices have not reached the mass market yet. This system incorporates Texas embedded processor, wireless communication solutions and highly-customized analog front ends. As a proof of concept, this technology integrates MCU architecture, instrumentation amplifiers as analog front end and further single supply quad op-amp for analog signal processing in an effective manner. The development of such a cost effective versatile system can impact clinical and rehabilitative control applications in most of the developing countries thus revolutionizing this domain.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121510104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Next State Prediction algorithm for the avionic systems using the hidden Markov models","authors":"M. Lokesh, Y. S. Kumaraswamy","doi":"10.1109/ICGCIOT.2015.7380726","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380726","url":null,"abstract":"This paper covers increasing need for next state prediction in the field of the avionics system that will predict and overcome the faults caused by the avionics systems. “Next State Prediction” is used for the predication of the possible states that the system can exist. This paper explains about how Markov models and hidden Markov models can be used for the prediction of the state in which the system exist based on which it could be stated if it is in a safe state. In the current scenario, it is not possible to have 100% test coverage for all the test cases. There will be instances where some of the portions that will not be covered by the test coverage and may lead to catastrophic faults. A very good process of verification and validation is carried out before the software is operational. However, all these are carried out before the software is commissioned on the target for its stipulated use. Further, the V&V is carried out in a simulated environment. It is very difficult to simulate the environment into. There could be some environmental conditions which have not been simulated and which could trigger the software state to an unsafe condition. Hence we use this methodology so as to predict if the current state or any further states in which an aircraft could exist would be safer one, if not, necessary steps could be carried out so as to make it safer.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"15 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125624346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel and efficient approach to encrypt images using chaotic logistic map and stream cipher","authors":"M. Rani, Sudesh Kumar","doi":"10.1109/ICGCIOT.2015.7380694","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380694","url":null,"abstract":"This research gives a novel approach for fast encryption of images using chaotic maps and pixel shuffling using modified RC4 stream cipher algorithm. In this, the given image will be first divided into the three blocks of same size which represents red, green and blue color intensity matrices respectively. These 2d blocks will the converted to horizontal vectors and these vectors will then undergo from a series of bit shuffling process. These independent blocks will then be encrypted using proposed algorithm and then transmitted to the network after reconciling these blocks. The key space for this proposed algorithm is 2192. The user key is 120 bit and the rest 72 bit is appended at run time to generate a dynamic key for each encryption process.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"144 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114017735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semi visible watermarking scheme based on DWT and PCA","authors":"Anand Kumar, M. Gupta","doi":"10.1109/ICGCIOT.2015.7380606","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380606","url":null,"abstract":"In this paper, we have purposed a DWT-PCA based non-blind digital colour image watermarking scheme. We have developed two algorithms for embedding and extraction process. The original image is first DWT-decomposed, and then the colour watermark is implanted. Before embedding the watermark, the original image is segmented and principle component analysis is applied. Watermark embedding is applied in different frequency bands of the image and PSNR and NC plots are drawn for all the frequency bands. PSNR and NC are two parameters which define the correlation between the original image and watermarked image. A comparative study of plots of PSNR and NC shows that embedding in HL and LH bands is more robust and imperceptive than LL and HH band. Plots show the robustness of the scheme against various attacks. The main aim of this paper is to present a scheme for the purpose of copy right protection and authentification of the colour image data.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122937016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cascaded DNA cryptography and steganography","authors":"Shweta, S. Indora","doi":"10.1109/ICGCIOT.2015.7380438","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380438","url":null,"abstract":"The redundancy in English words helps the unauthorized entity to guess the cipher text. The DNA sequences do not follow such properties. It means the conversion of message to DNA sequences make it robust against attacks. This paper performs the DNA cryptography and then hides the DNA sequence in to the random frame of a video. The result analysis shows that the frame is imperceptible. The video seems to be same. The enhancement in PSNR value and reduction in MSE shows the effectiveness of the technique.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133664944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"5G: Revolution of future communication technology","authors":"Sanjay Kumar, G. Gupta, Kunwar Singh","doi":"10.1109/ICGCIOT.2015.7380446","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380446","url":null,"abstract":"This paper aims to specify the future generation of wireless mobile communication networks. In this paper also specify the development of various wireless technologies range from 1G to 4G and future prediction as 5G. 5G technology is a very important advantage which will change the way we look at these different wireless technologies & will also change the way bandwidth users look at it as they can access their phones quite differently. 5G will also enhance the e-payments and e-transactions. 5G design is based on the user centric mobile environment.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133942425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}