2014 International Conference on Computing for Sustainable Global Development (INDIACom)最新文献

筛选
英文 中文
A scalable model for implementing Cyber Security Exercises 实施网络安全演习的可扩展模型
2014 International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2014-03-05 DOI: 10.1109/INDIACOM.2014.6828048
Rahul Gurnani, K. Pandey, Shashi Kant Rai
{"title":"A scalable model for implementing Cyber Security Exercises","authors":"Rahul Gurnani, K. Pandey, Shashi Kant Rai","doi":"10.1109/INDIACOM.2014.6828048","DOIUrl":"https://doi.org/10.1109/INDIACOM.2014.6828048","url":null,"abstract":"Information Systems are `The Lifeline' of every organization, but they have become very large-scale and complex, thereby making it difficult to secure them against ever evolving cyber threats. Despite heavy expenses on deployment of cyber security products, organizations fail to protect themselves against cyber-attacks. Cyber Security Exercises have been identified as an effective mechanism to impart IT security training but are also complex to customize and implement in line with the different security needs of every organization.","PeriodicalId":404873,"journal":{"name":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127930905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Overview on vehicular ad hoc network and its security issues 车载自组织网络及其安全问题综述
2014 International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2014-03-05 DOI: 10.1109/INDIACOM.2014.6828071
Ankit Kumar, M. Sinha
{"title":"Overview on vehicular ad hoc network and its security issues","authors":"Ankit Kumar, M. Sinha","doi":"10.1109/INDIACOM.2014.6828071","DOIUrl":"https://doi.org/10.1109/INDIACOM.2014.6828071","url":null,"abstract":"Vehicular ad-hoc networks (VANETs) provides infrastructure less, rapidly deployable, self-configurable network connectivity. The network is the collection vehicles interlinked by wireless links and willing to store and forward data for their peers. As vehicles move freely and organize themselves arbitrarily, message routing is done dynamically based on network connectivity. Compared with other ad-hoc networks, VANETs are particularly challenging due to the part of the vehicles' high rate of mobility and the numerous signal-weakening barrier, such as buildings, in their environments. Due to their enormous potential, VANET have gained an increasing attention in both industry and academia. Research activities range from lower layer protocol design to applications and implementation issues. A secure VANET system, while exchanging information should protect the system against unauthorized message injection, message alteration, eavesdropping. The security of VANET is one of the most critical issues because their information transmission is propagated in open access (wireless) environments. A few years back VANET has received increased attention as the potential technology to enhance active and preventive safety on the road, as well as travel comfort Safekeeping and privacy are mandatory in vehicular communications for a grateful acceptance and use of such technology. This paper is an attempt to highlight the problems occurred in Vehicular Ad hoc Networks and security issues.","PeriodicalId":404873,"journal":{"name":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132609444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Mining inflation rate using predictive and descriptive Data Mining techniques 使用预测和描述性数据挖掘技术挖掘通货膨胀率
2014 International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2014-03-05 DOI: 10.1109/INDIACOM.2014.6828133
T. Madhulatha, S. Fatima
{"title":"Mining inflation rate using predictive and descriptive Data Mining techniques","authors":"T. Madhulatha, S. Fatima","doi":"10.1109/INDIACOM.2014.6828133","DOIUrl":"https://doi.org/10.1109/INDIACOM.2014.6828133","url":null,"abstract":"This paper focuses on the descriptive and predictive methods used in applying the Time Series Data Mining techniques to financial time series data for calculating Indian Inflation rates. The descriptive method creates various tables and plots for time series data. Tests are conducted to determine whether or not the observations could be samples from a random or white noise process. Predictive method will forecast the next coming month's rates.","PeriodicalId":404873,"journal":{"name":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133680039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of eye tracking techniques in usability and HCI perspective 眼动追踪技术的可用性和人机交互分析
2014 International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2014-03-05 DOI: 10.1109/INDIACOM.2014.6828034
Chahat Sharma, S. Dubey
{"title":"Analysis of eye tracking techniques in usability and HCI perspective","authors":"Chahat Sharma, S. Dubey","doi":"10.1109/INDIACOM.2014.6828034","DOIUrl":"https://doi.org/10.1109/INDIACOM.2014.6828034","url":null,"abstract":"Usability plays a key role in Human Computer Interaction (HCI). The eye tracking research is extensively being incorporated to study the usability issues. Substantial literature exists and extensive research has been done till now regarding eye-tracking systems to resolve usability problems and how it can be measured with respect to real time. This paper presents the issues and scope of implementing eye-tracking systems to test the usable interface which covers various paradigms such as usability, psychological aspects, market research, etc. It introduces the eye-tracking technologies with respect to the movement of eyes as an input to drive the system interaction. It focuses on the various techniques through which eye-movements can be systematically measured to examine the usability of an interface. Paper also discusses about certain areas and the future research which can be done in the field of HCI for efficient application of the technique in studying the complexities prevailing in the usage of the system.","PeriodicalId":404873,"journal":{"name":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130354774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Influence of crossover and mutation on the behavior of Genetic algorithms in Mobile Ad-hoc Networks 移动Ad-hoc网络中交叉和突变对遗传算法行为的影响
2014 International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2014-03-05 DOI: 10.1109/INDIACOM.2014.6828092
Anju Sharma, M. Sinha
{"title":"Influence of crossover and mutation on the behavior of Genetic algorithms in Mobile Ad-hoc Networks","authors":"Anju Sharma, M. Sinha","doi":"10.1109/INDIACOM.2014.6828092","DOIUrl":"https://doi.org/10.1109/INDIACOM.2014.6828092","url":null,"abstract":"This paper evaluates the effect of applying well known mutation and crossover operators of Genetic algorithm in Mobile Ad-hoc NETworks (MANETs). In this paper, we propose an approach to develop an algorithm for an efficient routing in MANETs. A wireless ad-hoc network can be defined by a collection of mobile nodes, connected over a wireless medium. Genetic algorithm is an evolutionary optimization approach, applicable to problems which are large, non-deterministic, non linear and discrete in nature. Crossover is the primary operator distinguishing Genetic algorithms from other stochastic search methods, but its role in GAs needs to be better understood. Mutation plays important role in Genetic algorithm to preserving and introducing diversity. In this paper, an evolutionary scheme for adapting the crossover and mutation probabilities is proposed. Experimental results show that the proposed scheme significantly improves the performance of genetic algorithms and outperforms previous work.","PeriodicalId":404873,"journal":{"name":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130365100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A channel wise color image watermarking scheme based on Discrete Wavelet Transformation 一种基于离散小波变换的信道彩色图像水印方案
2014 International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2014-03-05 DOI: 10.1109/INDIACOM.2014.6828064
K. Giri, M. A. Peer, P. Nagabhushan
{"title":"A channel wise color image watermarking scheme based on Discrete Wavelet Transformation","authors":"K. Giri, M. A. Peer, P. Nagabhushan","doi":"10.1109/INDIACOM.2014.6828064","DOIUrl":"https://doi.org/10.1109/INDIACOM.2014.6828064","url":null,"abstract":"Digital watermarking being a potential mechanism of information security has received a lot of attention from researchers over the last few decades and accordingly has undergone a thorough research. Number of methods and techniques have been proposed and implemented so far. The host values chosen and the way the watermark is being embedded are two important factors that determine the effectiveness of the technique. This paper presents a novel channel wise watermarking technique for protection of copyrights of color images using Discrete Wavelet Transformation. The results obtained have shown that the technique is a secure one and is robust against various common image processing attacks.","PeriodicalId":404873,"journal":{"name":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115294869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Two tier protocol for hierarchical access control in medical image transmission 医学图像传输中分层访问控制的两层协议
2014 International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2014-03-05 DOI: 10.1109/INDIACOM.2014.6828067
J. Begum, K. Kumar, V. Sumathy
{"title":"Two tier protocol for hierarchical access control in medical image transmission","authors":"J. Begum, K. Kumar, V. Sumathy","doi":"10.1109/INDIACOM.2014.6828067","DOIUrl":"https://doi.org/10.1109/INDIACOM.2014.6828067","url":null,"abstract":"The main aim of this research is to develop hierarchical access control model by which medical images sent to low class users like medical assistants can also be seen by physicians who are higher in the hierarchy whereas the vice-versa is not allowed. To provide hierarchical access control, symmetric polynomial based scheme is used. At the receiving end the key can be derived by all the class controllers which are higher in the hierarchy using symmetric polynomial and the medical image file can be retrieved. To deal with more number of users in each class the protocol is divided into two layers. The upper layer is based on symmetric polynomial and takes care of class level dynamics and the lower layer takes care of user dynamics and implemented using GDH protocol. The key is used for hiding the medical images in different bit locations of host media without inviting suspicion. During transmission the image is hidden using the symmetric polynomial key for a short period and within each and every ancestor class, the image is hidden using the corresponding GDH key. The image is hidden in an audio file. Hence this makes the scheme secure and suitable for large dynamic groups.","PeriodicalId":404873,"journal":{"name":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122590486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
GLCM and Multi Class Support vector machine based automated skin cancer classification 基于GLCM和多类支持向量机的皮肤癌自动分类
2014 International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2014-03-05 DOI: 10.1109/INDIACOM.2014.6828177
Ritesh Maurya, S. Singh, A. Maurya, Ajeet Kumar
{"title":"GLCM and Multi Class Support vector machine based automated skin cancer classification","authors":"Ritesh Maurya, S. Singh, A. Maurya, Ajeet Kumar","doi":"10.1109/INDIACOM.2014.6828177","DOIUrl":"https://doi.org/10.1109/INDIACOM.2014.6828177","url":null,"abstract":"It is utmost important to early detect the skin cancers. Proper diagnosis is critical for survival of the patient. Biopsy method of detection is much painful. We have proposed an automated system for detection and classification of one of the skin four types of skin cancers: Melanoma, Basal cell carcinoma, actinic Keratosis, Squamous cell carcinoma. There are a certain features of these types of skin cancers, which can be extracted using proper feature extraction algorithm. The features of skin lesions are extracted normalized symmetrical Grey Level Co-occurrence Matrices (GLCM). GLCM based texture features are extracted from each of the four classes and given as input to the Multi-Class Support vector machine which is used for c1assification purpose. It c1assifies the given data set into one of the four skin cancer classes. The accuracy of our proposed method is 81.43%.","PeriodicalId":404873,"journal":{"name":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125700349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
A system model of online trading system for Nepal Stock Exchange 尼泊尔证券交易所网上交易系统的系统模型
2014 International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2014-03-05 DOI: 10.1109/INDIACOM.2014.6828161
B. Dhakal, M. Gupta
{"title":"A system model of online trading system for Nepal Stock Exchange","authors":"B. Dhakal, M. Gupta","doi":"10.1109/INDIACOM.2014.6828161","DOIUrl":"https://doi.org/10.1109/INDIACOM.2014.6828161","url":null,"abstract":"Nepal Stock Exchange is the only Stock Exchange in Nepal. It has already introduced ATS. Central Depository System has also been implemented in the investment of Nepal stock Exchange. With physical share certificates trading, it takes at least 15 days to transfer securities from the seller to the buyer and about a week for the seller to receive funds. Even with the introduction of Central Depository System, the settlement cycle of trades done in NEPSE is T+3. T+3 means that when a security is purchased, payment and the securities certificate must change hands no later than three business days after the trade is executed. In the current scenario, the market is changing continuously but investors are unable to sell or buy their securities at their preferred time. So, there is a need of online trading system that helps investors to buy or sell their securities and settle their trade in less time. At the moment, securities market is broker dependent so this research proposes a system model to increase the dependency of the investors directly in the secondary market. For this purpose, this work investigates the current IT systems implemented in securities market and proposes a model of online trading system for Nepal Stock Exchange. This research has used qualitative and quantitative methodologies to collect the data from the stakeholders.","PeriodicalId":404873,"journal":{"name":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130001034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring cyber intelligence alternatives for countering cyber crime 探索打击网络犯罪的网络情报替代方案
2014 International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2014-03-05 DOI: 10.1109/INDIACOM.2014.6828093
P. Usha Gayatri, S. Neeraja, C. Poornima, K. Chandra Sekharaiah, M. Yuvaraj
{"title":"Exploring cyber intelligence alternatives for countering cyber crime","authors":"P. Usha Gayatri, S. Neeraja, C. Poornima, K. Chandra Sekharaiah, M. Yuvaraj","doi":"10.1109/INDIACOM.2014.6828093","DOIUrl":"https://doi.org/10.1109/INDIACOM.2014.6828093","url":null,"abstract":"In this paper, a case study of cyber crime is presented in the context of JNTUHJAC website. CERT-In is identified as the organization relevant to handling this kind of cybercrime. This paper is an attempt to find and do away with the lacunae in the prevailing cyber laws and the I.T. Act 2000 and the related amendment act 2008 such that law takes cognizance of all kinds of cybercrimes perpetrated against individuals/societies/nations. It is found that ICANN is an organization to control the cyberspace by blocking the space wherein the content involves cognizable offence.","PeriodicalId":404873,"journal":{"name":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129346578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信