2015 International Conference on Green Computing and Internet of Things (ICGCIoT)最新文献

筛选
英文 中文
Energy efficient fault-tolerant clustering algorithm for wireless sensor networks 无线传感器网络的高能效容错聚类算法
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380464
K. Nitesh, M. Azharuddin, P. K. Jana
{"title":"Energy efficient fault-tolerant clustering algorithm for wireless sensor networks","authors":"K. Nitesh, M. Azharuddin, P. K. Jana","doi":"10.1109/ICGCIOT.2015.7380464","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380464","url":null,"abstract":"Energy utilization and fault tolerance are the two major issues in the development of a large scale wireless sensor networks (WSNs). In this paper, we propose a distributed algorithm to design an energy efficient cluster base WSN. We also propose a local recovery mechanism for the orphan sensor nodes, which are generated due to the failure of any cluster head. The proposed algorithm is based on cost function which is formulated with several parameters such as residual energy, distance and cluster cardinality. The algorithm is simulated rigorously over several performance metrics and the results acquired are compared with some existing algorithms to demonstrate its effectiveness.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134177520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Spherule diagrams: A matrix-based set visualization compared with Euler diagrams 球规则图:与欧拉图相比,基于矩阵的集合可视化
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380712
Mithileysh Sathiyanarayanan, Donato Pirozzi
{"title":"Spherule diagrams: A matrix-based set visualization compared with Euler diagrams","authors":"Mithileysh Sathiyanarayanan, Donato Pirozzi","doi":"10.1109/ICGCIOT.2015.7380712","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380712","url":null,"abstract":"The explosive growth of the internet, the overall computerization of the engineering, medical, business and defense sectors have created a widespread need of visualization techniques to explore large and complex datasets. As the data keeps growing in complexity, users find it difficult to navigate and understand the relationships between the sets. There are limitations such as scalability and sub-optimal layouts being produced with the state-of-the-art visualization methods such as Euler diagrams, Treemap diagrams and ConSets. So, an effective visual method is in great need to produce an optimal layout and identify set properties with ease. This motivated us to develop a novel visual method called “Spherule diagrams” to improve the analysis of set relationships effectively. Then a small-scale user preference study was conducted to compare Euler diagrams with Spherule diagrams, where 80% participants preferred Spherule diagrams for its simplicity, navigation, better layout and set ordering characteristics. The other results based on error rate and rating, Spherule diagrams outperformed Euler diagrams. Thus, we provide evidence that Spherule diagrams are preferred over Euler diagrams for visualizing set relations.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115631292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Log analytics on cloud using pattern recognition a practical perspective to cloud based approach 使用模式识别进行云日志分析是一种基于云的实用方法
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380553
A. Bhole, B. Adinarayana, Sanath S. Shenoy
{"title":"Log analytics on cloud using pattern recognition a practical perspective to cloud based approach","authors":"A. Bhole, B. Adinarayana, Sanath S. Shenoy","doi":"10.1109/ICGCIOT.2015.7380553","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380553","url":null,"abstract":"Every application nowadays produces huge amounts of log data which can give critical insights if properly monitored. The biggest problem in monitoring such large amounts of log data by using the existing techniques is that they are compute intensive, and require a lot of effort. And also usually log data is unformatted and may contain some redundant data as well that needs to be removed. This critical information is more valuable, a potential predictive analytics improves the proactive control of the application. Data analytics paradigm shows new ways of handing this critical information by providing various technologies to handle this in an effective way. Visualization is used to convey the findings from data analytics in an easily understandable way. Due to the huge size of data that has to be analyzed, a highly scalable approach is required which provides additional optimization. In this paper an approach for data analytics with the combination of cloud computing is proposed and demonstrated.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115636414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Few location based routing protocols in Wireless Sensor Network 无线传感器网络中几种基于位置的路由协议
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380562
Shruti, U. Kumari
{"title":"Few location based routing protocols in Wireless Sensor Network","authors":"Shruti, U. Kumari","doi":"10.1109/ICGCIOT.2015.7380562","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380562","url":null,"abstract":"Wireless Sensor Networks (WSN) consists of many small compact devices equipped with sensors. It is a very popular area for exploration. The nodes are movable and set themselves into a network. However in larger networks, geographical routing protocol is required. Geographical routing uses location information to send the packets to the target region. In this paper, some of major geographic routing protocols for WSNs are presented.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114215100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detecting and overcoming blackhole attack in mobile Adhoc Network 移动自组网中黑洞攻击的检测与克服
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380462
Sakshi Jain, A. Khuteta
{"title":"Detecting and overcoming blackhole attack in mobile Adhoc Network","authors":"Sakshi Jain, A. Khuteta","doi":"10.1109/ICGCIOT.2015.7380462","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380462","url":null,"abstract":"A mobile Adhoc Network (MANET) is a huddle of autonomous mobile nodes which dynamically forms a temporary multi-hoped radio network, without any use of previous infrastructure. Due to its characteristics like limited resources, changing topology and lack of centralized administration, MANET is exposed to various network layer attacks. Ad-hoc On Demand Distance Vector (AODV) is a self starting routing protocol for MANETs whose security is compromised with the particular type of attack called “BlackHole” attack. In this malicious node advertise itself as having the best path to destination during the route discovery process and thus interrupt the real communication and degrade network performance. In the proposed scheme we deploy the base node in the network that increases the probability of detecting multiple malicious nodes in network and further isolate them from taking part in any communication.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122970842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Characterization and comparison of Distributed Denial of Service attack tools 分布式拒绝服务攻击工具的特征与比较
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380634
Harjeet Kaur, Sunny Behal, Krishan Kumar
{"title":"Characterization and comparison of Distributed Denial of Service attack tools","authors":"Harjeet Kaur, Sunny Behal, Krishan Kumar","doi":"10.1109/ICGCIOT.2015.7380634","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380634","url":null,"abstract":"Distributed Denial of Service (DDoS) attack is a prime threat for the extensively used Internet based services like e-commerce, banking, medicine, education etc. Hackers launch DDoS attacks by compromising the vulnerable systems (called bots) in order to degrade or sometimes completely disrupt these services. In recent years, DDoS attacks have been increased in strength, frequency and sophistication. Though many solutions have been proposed in literature to combat against such attacks but still defending from a DDoS attack is a challenging issue. Hackers are continuously upgrading their skills to launch diversified attacks and are developing new means to circumvent these countermeasures. The purpose of this paper is to characterize and compare the popular DDoS attack tools used by the attackers in recent times, their modus operandi and types of attacks, they launch. This would help the researcher community to handpick the appropriate DDoS attack tool for their experimentation purpose.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A review on recent phishing attacks in Internet 网络钓鱼攻击的最新进展
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380669
Lakhita, Surendra Yadav, Brahmdutt Bohra, M. Tech Scholar, Asst Prof
{"title":"A review on recent phishing attacks in Internet","authors":"Lakhita, Surendra Yadav, Brahmdutt Bohra, M. Tech Scholar, Asst Prof","doi":"10.1109/ICGCIOT.2015.7380669","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380669","url":null,"abstract":"The development of internet comes with the other domain that is cyber-crime. The record and intelligently can be exposed to a user of illegal activity so that it has become important to make the technology reliable. Phishing techniques include domain of email messages. Phishing emails have hosted such a phishing website, where a click on the URL or the malware code as executing some actions to perform is socially engineered messages. Lexically analyzing the URLs can enhance the performance and help to differentiate between the original email and the phishing URL. As assessed in this study, in addition to textual analysis of phishing URL, email classification is successful and results in a highly precise anti phishing.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122652688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Five staged pipelined processor with self clocking mechanism 五阶段流水线处理器,具有自时钟机构
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380684
Anish Gupta, Vinayak Kini, Prathik Shetty, Chirag Bafna
{"title":"Five staged pipelined processor with self clocking mechanism","authors":"Anish Gupta, Vinayak Kini, Prathik Shetty, Chirag Bafna","doi":"10.1109/ICGCIOT.2015.7380684","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380684","url":null,"abstract":"With the advent of synchronous systems we have come across various difficulties and problems associated with them, mainly like clock skew, power consumption, etc. The idea of making systems clockless has been proposed numerous times and has been explored in great detail. Although we see that even those systems are not free from their own disadvantages like false triggering, handshaking hardware requirement, etc. Since both systems, synchronous and asynchronous show their own set of advantages and disadvantages the logical step is to find a mix of each of them in an overall system. This paper proposes an idea of a five stage pipelined processor with both synchronous and asynchronous blocks combined together to take the best of both ideologies. We intend to mix both these systems together by making use of the handshake signals from the asynchronous systems to generate a clock for the synchronous systems. This makes the processor give output with an average time delay lesser than the worst case delay of the synchronous processor, yet keeping the benefits from the synchronous system intact and adding various other benefits also.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129848020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Case study of Internet of Things in area of Agriculture, ‘AGCO's Fuse Technology's’ ‘Connected Farm Services’ 物联网在农业领域的案例研究,爱科的Fuse Technology的“互联农场服务”
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380447
Rashi Chaudhary, Jalaj Ranjan Pandey, Prakhar Pandey, Pulkit Chaudhary
{"title":"Case study of Internet of Things in area of Agriculture, ‘AGCO's Fuse Technology's’ ‘Connected Farm Services’","authors":"Rashi Chaudhary, Jalaj Ranjan Pandey, Prakhar Pandey, Pulkit Chaudhary","doi":"10.1109/ICGCIOT.2015.7380447","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380447","url":null,"abstract":"Embedded with Internet of Things, Smart Agriculture vision is analyzed in this case study. Smart Farming techniques offered by leading Agriculture Company AGCO's Fuse Technology's `Connected Farm Services' is under study. Study presents a future projection of smart connected agriculture objects and processes and the scope of the internet driven applications in agriculture field. SWOT analysis has been used to analyze the issue under study. Case has been explained in majorly five portions, introduction, Smart farming operational Fundamentals, Smart Agriculture by AGCO, SWOT Analysis, Conclusion.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128234891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Cluster based route discovery technique for routing protocol in MANET 基于集群的MANET路由协议发现技术
2015 International Conference on Green Computing and Internet of Things (ICGCIoT) Pub Date : 2015-10-08 DOI: 10.1109/ICGCIOT.2015.7380539
Poonam Thakur, Anita Ganpati
{"title":"Cluster based route discovery technique for routing protocol in MANET","authors":"Poonam Thakur, Anita Ganpati","doi":"10.1109/ICGCIOT.2015.7380539","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380539","url":null,"abstract":"Mobile Ad hoc Networks (MANETs) as the name signifies is a network formed by collection of mobile ad hoc devices (nodes). It is a kind of infrastructure less wireless network which is autonomous decentralized where each node is free to move anywhere at any time. Due to the mobility of nodes routing is main issue of research, since the wired network's routing protocols cannot be used here. Routing in MANETs is mainly of two types proactive and reactive. A proactive routing protocol(DSDV, WRP, CGSR) maintains the route between all pairs of nodes in the network all the times whereas a reactive routing protocol (AODV, DSR, TORA) is an on demand routing protocol where route is found only when required which has great advantage over proactive protocols. In this paper a new cluster based route discovery algorithm for reactive routing protocol i.e. Ad hoc On Demand Distance Vector (AODV) is proposed, since for the existing algorithms control overhead is very high which consumes a lot of available bandwidth. In the future performance evaluation of the proposed technique can be done and the results thus obtained can be compared with the existing algorithms. We hope that control packet overhead will be less in case of proposed algorithm.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124505016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信