L. Camarinha-Matos, Adrian Juan-Verdejo, S. Alexakis, H. Bar, Bholanathsingh Surajbali
{"title":"Cloud-based collaboration spaces for enterprise networks","authors":"L. Camarinha-Matos, Adrian Juan-Verdejo, S. Alexakis, H. Bar, Bholanathsingh Surajbali","doi":"10.1109/ICCCT2.2015.7292743","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292743","url":null,"abstract":"The involvement of multiple collaborative enterprise networks in the various stages of the life cycle of complex service-enhanced products represents a clear trend. Effective operation of these networks requires collaboration platforms providing adequate collaboration spaces. In this context, an advanced cloud-based collaboration platform, which copes with dynamic hierarchies of collaboration spaces, is presented, highlighting the proposed novel features. The platform specially targets networks of small and medium enterprises involved in complex products such as solar plants and intelligent buildings. Validation use cases are also described.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122104728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image encryption and decryption in public key cryptography based on MR","authors":"Hiral Rathod, M. S. Sisodia, A. N. Reddy","doi":"10.1109/ICCCT2.2015.7292733","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292733","url":null,"abstract":"In the past decade, image encryption is given much attention in research of information security and a lot of image encryption algorithms have been introduced. Due to some intrinsic features of images like bulk data capacity and high data redundancy, the encryption of image is different from that of text; therefore it is difficult to handle them by traditional encryption methods. In the proposed work, a new image encryption algorithm based on Magic Rectangle (MR) is being applied. To begin with, the plain-image is converted into blocks of single bytes and then the block is replaced as the value of MR. Further, the control parameters of Magic Rectangle (MR) are selected randomly by the user. Subsequently the image is being encrypted with public key cryptography algorithms such as RSA, ElGamal etc. The experimental result shows that the proposed algorithm can successfully encrypt/decrypt the images with separate secret keys, and the algorithm has good encryption effect. Cipher text developed by this method will be entirely different when compared to the original image file and will be suitable for the secured transmission over the internet. Thus, this model provides an additional level of security to public key algorithm and efficient utilization of memory.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127940361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient CRL authentication scheme for vehicular communications","authors":"S. Vinothini, T. Subha","doi":"10.1109/ICCCT2.2015.7292761","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292761","url":null,"abstract":"A vehicular ad hoc network (VANET) is a type of network that is used to create mobile nodes. It treats vehicles as mobile nodes and provides the means to communicate between vehicles for driving safely. Addressing the security requirements of inter-vehicle and vehicle-roadside communication plays an important role. In VANET, the vehicle nodes consist of On Board Unit (OBU) and Road Side Units (RSU). The RSU's are installed along the road. Vehicles communicate with each other and as well as with RSUs through wireless communications. VANET adopt Certificate Revocation Lists (CRLs) for their security. The sender certificate is included in the current CRL to verify the authenticity and signature of the sender. A trusted authority (TA) performs registration to vehicle users during which vehicles pseudonyms and secrets are updates and stored in the vehicles OBU. Secure communication and anonymous protocol is important in VANET. We propose an efficient CRL based secure communication protocol which focuses on detecting malicious node in vehicular communications.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124680304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speed analysis of wireless communication technology banked on HBT: An analytical approach to determine the impact of GaAs/GaAsBi diode model","authors":"Farhana Afrin, Twisha Titirsha","doi":"10.1109/ICCCT2.2015.7292721","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292721","url":null,"abstract":"HBT has emerged as the predominant technology for many commercial applications. This paper reports on the high speed GaAs/GaAsBi HBT technologies which are suitable for applications such as cellular, WLAN, modulator driver circuits. This paper presents a scheme of threshold-voltage-based 2-D theoretical model of GaAs/GaAsBi heterojunction diode in accordance with its various operational characteristics. Using MATLAB simulation current-voltage relationship of the recommended diode model is implemented for the prediction of its application in semiconductor filed. Furthermore depletion width-voltage characteristic give prediction of transit time of HBT using GaAs/GaAsBi material system. Capacitance-voltage relationship helps to anticipate about device performance after biasing. A comparative study of these relationships for various doping concentration is necessary for the purpose of selecting doping concentration that is attributed to device fabrication. The analytical simulation for Bismuth doping concentration of 2.1 %, 2.5 %, 3.1 %, 6.3 % and 12.5 % is done that reveals the dependency of performance characteristics of proposed heterojunction diode model on Bismuth doping concentration.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121486377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solution for multicast routing problem using particle swarm optimization","authors":"S. Amutha, S. Nivethalakshmi","doi":"10.1109/ICCCT2.2015.7292758","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292758","url":null,"abstract":"As the communication networks rapidly increases it leads to the problem of multicast routing problem (MRP). In this paper, the technique particle swarm optimization (PSO) is used along with the bi-velocity coding technique. This bi-velocity scheme is used to denote the nodes in the networks by a coded string 0/1. If the node is coded with 1, then the node is used for the construction of the multicast tree, 0 otherwise. By using the learning mechanism of particle swarm optimization technique, the velocity and the position are updated. The global search ability of the original PSO is maintained along with its faster convergence speed. Based on this technique, a minimal cost multicast tree is constructed.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124581062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for travel package recommendation using Bayesian approach","authors":"F. Anishya, Suresh Kumar M","doi":"10.1109/ICCCT2.2015.7292764","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292764","url":null,"abstract":"Today internet has been connected to people more in the world of tourism, amusement, economics and as a trend huge number of travel firms provide online services and these services are provided by individual sectors. In the traditional approach the Tourist area season topic model is used which address the unique trait along the travel statistics. Since the user has to choose only from the available packages which fails to provide a customized travel package. Therefore Tourist Relation Area Season Topic model is enhanced by creating relationship among the users and the data are semantically classified which provides effective assessment on automatic travel group formation. The Nearest Neighbor method helps to find the neighboring places for the particular area. As the solution which is more efficient than the conventional recommended system and also satisfies the user by providing customized package. It supersedes the hybrid recommendation strategy to produce an efficient result to the travellers. The collaborative tagging which mainly works in tagging the neighboring places by predicting the value for the suggested areas and this mechanism helps to capture effective results in the real world recommender system.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129968533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preventing shoulder surfing in secure transactions","authors":"M. Hindusree, R. Sasikumar","doi":"10.1109/ICCCT2.2015.7292738","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292738","url":null,"abstract":"Information and computer security are supported largely by passwords which are the principle part of the authentication process. The personal identification number (PIN) is common authentication method used in various devices like ATM's, mobile devices and electronic door locks. This PIN entry method is harmed to shoulder surfing attack (SSA). When user enters their pin number in populous place, attacker observes the pin number over their shoulder. This is called shoulder surfing attack. In this paper we will propose a method to prevent this SSA attack. We do this through the use of advanced BW (Black White) method and session key method by changing the layout of the keypad.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122869432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of an adaptive spectrum sensing technique in cognitive radio networks","authors":"S. Lavanya, B. Sindhuja, M. A. Bhagyaveni","doi":"10.1109/ICCCT2.2015.7292773","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292773","url":null,"abstract":"Cognitive radio techniques provide the capability to use or share the spectrum in an opportunistic manner. The major functions of cognitive radio include spectrum sensing, spectrum management, spectrum mobility and spectrum sharing. Spectrum sensing is the primary technique which is used by all the Cognitive radio users to harvest the advantage of Cognitive radio technique. In Spectrum sensing various popular methods have been already proposed and studied exhaustively by the CR researchers. In this paper spectrum sensing methods such as Eigen value based detection, energy detection and matched filter detection are implemented. All the above techniques have their own pros and cons. The main aim of this work is to classify the techniques based on the key parameters such as probability of detection, probability of false alarm and signal to noise ratio, to identify the adaptive threshold for each technique, implement and evaluate an adaptive sensing technique using MATLAB.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123881324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Raga identification of carnatic music using iterative clustering approach","authors":"Hannah Daniel, A. Revathi","doi":"10.1109/ICCCT2.2015.7292713","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292713","url":null,"abstract":"This paper proposes a method to identify the arohana-avarohana of carnatic raga. Carnatic raga is broadly classified as melakarta (parent) and janya (child) raga. Arohana-avarohana of 10 different ragas is collected from 16 different singers. 16 audio data are collected for each raga. 11 among the 16 are used in the training phase and the remaining 5 are used for testing. The acoustic feature, MFCC which is increasingly used in music information retrieval, is used as the feature. Clustering model with 256 clusters is developed for all the 10 different ragas. To perform testing, the 5 test data of each raga are concatenated. Then, the sequence of training vectors (feature vectors) are divided into segments of L=100 feature vectors with 90 vectors overlapping between them. The minimum distance is calculated between each test vector and centroid of clusters. Average of the minimum distances for each segment is found out. The segment belongs to the model which has minimum of averages. To improve to accuracy, each of the ten ragas is sub classified as either parent or child group and testing is done under each group.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126441353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a Quad Band Microstrip Antenna for Wearable Wireless Devices and investigations on substrate types and performance at various body sites","authors":"V. Karthik, T. Rao","doi":"10.1109/ICCCT2.2015.7292749","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292749","url":null,"abstract":"This work proposes a novel Quad Band Microstrip Antenna for Body Wearable Wireless Devices (BWWD). The designed antenna finds immense applications in general health monitoring utilizing wearable devices, sports health monitoring and observing military personnel in war field where monitoring bio-signals is the prime objective. Ultra high frequency (UHF) and Ultra wide band (UWB) technology adequately meet power, size and distance considerations for WBANs. The antenna designed operates at quad bands, resonating at 1.8 GHz, 2.4 GHz, 5.0 GHz and 8.9 GHz when placed on human body. They are the de-licensed, GSM, Wi-Fi and UWB. The antenna design considers the interaction of body tissues with the electromagnetic (EM) fields, which is different when compared to free space. The performance of the antenna is investigated at different places on the body and for different type of substrates. Most common and comfortable sites on body are chosen as anatomical sites for placement of WWD. A simplified, human body tissue layer model that is frequency dependent in its properties is used for simulations. Simulations are carried out using EM analysis tools.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128688025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}