2015 International Conference on Computing and Communications Technologies (ICCCT)最新文献

筛选
英文 中文
Cloud-based collaboration spaces for enterprise networks 企业网络的基于云的协作空间
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-10-08 DOI: 10.1109/ICCCT2.2015.7292743
L. Camarinha-Matos, Adrian Juan-Verdejo, S. Alexakis, H. Bar, Bholanathsingh Surajbali
{"title":"Cloud-based collaboration spaces for enterprise networks","authors":"L. Camarinha-Matos, Adrian Juan-Verdejo, S. Alexakis, H. Bar, Bholanathsingh Surajbali","doi":"10.1109/ICCCT2.2015.7292743","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292743","url":null,"abstract":"The involvement of multiple collaborative enterprise networks in the various stages of the life cycle of complex service-enhanced products represents a clear trend. Effective operation of these networks requires collaboration platforms providing adequate collaboration spaces. In this context, an advanced cloud-based collaboration platform, which copes with dynamic hierarchies of collaboration spaces, is presented, highlighting the proposed novel features. The platform specially targets networks of small and medium enterprises involved in complex products such as solar plants and intelligent buildings. Validation use cases are also described.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122104728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Image encryption and decryption in public key cryptography based on MR 基于MR的公钥加密中的图像加解密
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-10-08 DOI: 10.1109/ICCCT2.2015.7292733
Hiral Rathod, M. S. Sisodia, A. N. Reddy
{"title":"Image encryption and decryption in public key cryptography based on MR","authors":"Hiral Rathod, M. S. Sisodia, A. N. Reddy","doi":"10.1109/ICCCT2.2015.7292733","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292733","url":null,"abstract":"In the past decade, image encryption is given much attention in research of information security and a lot of image encryption algorithms have been introduced. Due to some intrinsic features of images like bulk data capacity and high data redundancy, the encryption of image is different from that of text; therefore it is difficult to handle them by traditional encryption methods. In the proposed work, a new image encryption algorithm based on Magic Rectangle (MR) is being applied. To begin with, the plain-image is converted into blocks of single bytes and then the block is replaced as the value of MR. Further, the control parameters of Magic Rectangle (MR) are selected randomly by the user. Subsequently the image is being encrypted with public key cryptography algorithms such as RSA, ElGamal etc. The experimental result shows that the proposed algorithm can successfully encrypt/decrypt the images with separate secret keys, and the algorithm has good encryption effect. Cipher text developed by this method will be entirely different when compared to the original image file and will be suitable for the secured transmission over the internet. Thus, this model provides an additional level of security to public key algorithm and efficient utilization of memory.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127940361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
An efficient CRL authentication scheme for vehicular communications 一种高效的车载通信CRL认证方案
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-10-08 DOI: 10.1109/ICCCT2.2015.7292761
S. Vinothini, T. Subha
{"title":"An efficient CRL authentication scheme for vehicular communications","authors":"S. Vinothini, T. Subha","doi":"10.1109/ICCCT2.2015.7292761","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292761","url":null,"abstract":"A vehicular ad hoc network (VANET) is a type of network that is used to create mobile nodes. It treats vehicles as mobile nodes and provides the means to communicate between vehicles for driving safely. Addressing the security requirements of inter-vehicle and vehicle-roadside communication plays an important role. In VANET, the vehicle nodes consist of On Board Unit (OBU) and Road Side Units (RSU). The RSU's are installed along the road. Vehicles communicate with each other and as well as with RSUs through wireless communications. VANET adopt Certificate Revocation Lists (CRLs) for their security. The sender certificate is included in the current CRL to verify the authenticity and signature of the sender. A trusted authority (TA) performs registration to vehicle users during which vehicles pseudonyms and secrets are updates and stored in the vehicles OBU. Secure communication and anonymous protocol is important in VANET. We propose an efficient CRL based secure communication protocol which focuses on detecting malicious node in vehicular communications.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124680304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Speed analysis of wireless communication technology banked on HBT: An analytical approach to determine the impact of GaAs/GaAsBi diode model 基于HBT的无线通信技术的速度分析:确定GaAs/GaAsBi二极管模型影响的分析方法
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-10-08 DOI: 10.1109/ICCCT2.2015.7292721
Farhana Afrin, Twisha Titirsha
{"title":"Speed analysis of wireless communication technology banked on HBT: An analytical approach to determine the impact of GaAs/GaAsBi diode model","authors":"Farhana Afrin, Twisha Titirsha","doi":"10.1109/ICCCT2.2015.7292721","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292721","url":null,"abstract":"HBT has emerged as the predominant technology for many commercial applications. This paper reports on the high speed GaAs/GaAsBi HBT technologies which are suitable for applications such as cellular, WLAN, modulator driver circuits. This paper presents a scheme of threshold-voltage-based 2-D theoretical model of GaAs/GaAsBi heterojunction diode in accordance with its various operational characteristics. Using MATLAB simulation current-voltage relationship of the recommended diode model is implemented for the prediction of its application in semiconductor filed. Furthermore depletion width-voltage characteristic give prediction of transit time of HBT using GaAs/GaAsBi material system. Capacitance-voltage relationship helps to anticipate about device performance after biasing. A comparative study of these relationships for various doping concentration is necessary for the purpose of selecting doping concentration that is attributed to device fabrication. The analytical simulation for Bismuth doping concentration of 2.1 %, 2.5 %, 3.1 %, 6.3 % and 12.5 % is done that reveals the dependency of performance characteristics of proposed heterojunction diode model on Bismuth doping concentration.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121486377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solution for multicast routing problem using particle swarm optimization 用粒子群算法解决组播路由问题
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292758
S. Amutha, S. Nivethalakshmi
{"title":"Solution for multicast routing problem using particle swarm optimization","authors":"S. Amutha, S. Nivethalakshmi","doi":"10.1109/ICCCT2.2015.7292758","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292758","url":null,"abstract":"As the communication networks rapidly increases it leads to the problem of multicast routing problem (MRP). In this paper, the technique particle swarm optimization (PSO) is used along with the bi-velocity coding technique. This bi-velocity scheme is used to denote the nodes in the networks by a coded string 0/1. If the node is coded with 1, then the node is used for the construction of the multicast tree, 0 otherwise. By using the learning mechanism of particle swarm optimization technique, the velocity and the position are updated. The global search ability of the original PSO is maintained along with its faster convergence speed. Based on this technique, a minimal cost multicast tree is constructed.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124581062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel approach for travel package recommendation using Bayesian approach 基于贝叶斯方法的旅游套餐推荐新方法
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292764
F. Anishya, Suresh Kumar M
{"title":"A novel approach for travel package recommendation using Bayesian approach","authors":"F. Anishya, Suresh Kumar M","doi":"10.1109/ICCCT2.2015.7292764","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292764","url":null,"abstract":"Today internet has been connected to people more in the world of tourism, amusement, economics and as a trend huge number of travel firms provide online services and these services are provided by individual sectors. In the traditional approach the Tourist area season topic model is used which address the unique trait along the travel statistics. Since the user has to choose only from the available packages which fails to provide a customized travel package. Therefore Tourist Relation Area Season Topic model is enhanced by creating relationship among the users and the data are semantically classified which provides effective assessment on automatic travel group formation. The Nearest Neighbor method helps to find the neighboring places for the particular area. As the solution which is more efficient than the conventional recommended system and also satisfies the user by providing customized package. It supersedes the hybrid recommendation strategy to produce an efficient result to the travellers. The collaborative tagging which mainly works in tagging the neighboring places by predicting the value for the suggested areas and this mechanism helps to capture effective results in the real world recommender system.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129968533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Preventing shoulder surfing in secure transactions 防止肩部冲浪在安全交易
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292738
M. Hindusree, R. Sasikumar
{"title":"Preventing shoulder surfing in secure transactions","authors":"M. Hindusree, R. Sasikumar","doi":"10.1109/ICCCT2.2015.7292738","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292738","url":null,"abstract":"Information and computer security are supported largely by passwords which are the principle part of the authentication process. The personal identification number (PIN) is common authentication method used in various devices like ATM's, mobile devices and electronic door locks. This PIN entry method is harmed to shoulder surfing attack (SSA). When user enters their pin number in populous place, attacker observes the pin number over their shoulder. This is called shoulder surfing attack. In this paper we will propose a method to prevent this SSA attack. We do this through the use of advanced BW (Black White) method and session key method by changing the layout of the keypad.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122869432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of an adaptive spectrum sensing technique in cognitive radio networks 认知无线电网络中自适应频谱感知技术的实现
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292773
S. Lavanya, B. Sindhuja, M. A. Bhagyaveni
{"title":"Implementation of an adaptive spectrum sensing technique in cognitive radio networks","authors":"S. Lavanya, B. Sindhuja, M. A. Bhagyaveni","doi":"10.1109/ICCCT2.2015.7292773","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292773","url":null,"abstract":"Cognitive radio techniques provide the capability to use or share the spectrum in an opportunistic manner. The major functions of cognitive radio include spectrum sensing, spectrum management, spectrum mobility and spectrum sharing. Spectrum sensing is the primary technique which is used by all the Cognitive radio users to harvest the advantage of Cognitive radio technique. In Spectrum sensing various popular methods have been already proposed and studied exhaustively by the CR researchers. In this paper spectrum sensing methods such as Eigen value based detection, energy detection and matched filter detection are implemented. All the above techniques have their own pros and cons. The main aim of this work is to classify the techniques based on the key parameters such as probability of detection, probability of false alarm and signal to noise ratio, to identify the adaptive threshold for each technique, implement and evaluate an adaptive sensing technique using MATLAB.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123881324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Raga identification of carnatic music using iterative clustering approach 基于迭代聚类方法的卡纳蒂克音乐拉格识别
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292713
Hannah Daniel, A. Revathi
{"title":"Raga identification of carnatic music using iterative clustering approach","authors":"Hannah Daniel, A. Revathi","doi":"10.1109/ICCCT2.2015.7292713","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292713","url":null,"abstract":"This paper proposes a method to identify the arohana-avarohana of carnatic raga. Carnatic raga is broadly classified as melakarta (parent) and janya (child) raga. Arohana-avarohana of 10 different ragas is collected from 16 different singers. 16 audio data are collected for each raga. 11 among the 16 are used in the training phase and the remaining 5 are used for testing. The acoustic feature, MFCC which is increasingly used in music information retrieval, is used as the feature. Clustering model with 256 clusters is developed for all the 10 different ragas. To perform testing, the 5 test data of each raga are concatenated. Then, the sequence of training vectors (feature vectors) are divided into segments of L=100 feature vectors with 90 vectors overlapping between them. The minimum distance is calculated between each test vector and centroid of clusters. Average of the minimum distances for each segment is found out. The segment belongs to the model which has minimum of averages. To improve to accuracy, each of the ten ragas is sub classified as either parent or child group and testing is done under each group.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126441353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design of a Quad Band Microstrip Antenna for Wearable Wireless Devices and investigations on substrate types and performance at various body sites 用于可穿戴无线设备的四波段微带天线的设计及其在不同身体部位的衬底类型和性能研究
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292749
V. Karthik, T. Rao
{"title":"Design of a Quad Band Microstrip Antenna for Wearable Wireless Devices and investigations on substrate types and performance at various body sites","authors":"V. Karthik, T. Rao","doi":"10.1109/ICCCT2.2015.7292749","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292749","url":null,"abstract":"This work proposes a novel Quad Band Microstrip Antenna for Body Wearable Wireless Devices (BWWD). The designed antenna finds immense applications in general health monitoring utilizing wearable devices, sports health monitoring and observing military personnel in war field where monitoring bio-signals is the prime objective. Ultra high frequency (UHF) and Ultra wide band (UWB) technology adequately meet power, size and distance considerations for WBANs. The antenna designed operates at quad bands, resonating at 1.8 GHz, 2.4 GHz, 5.0 GHz and 8.9 GHz when placed on human body. They are the de-licensed, GSM, Wi-Fi and UWB. The antenna design considers the interaction of body tissues with the electromagnetic (EM) fields, which is different when compared to free space. The performance of the antenna is investigated at different places on the body and for different type of substrates. Most common and comfortable sites on body are chosen as anatomical sites for placement of WWD. A simplified, human body tissue layer model that is frequency dependent in its properties is used for simulations. Simulations are carried out using EM analysis tools.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128688025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信