2013 5th International Conference on Computational Intelligence and Communication Networks最新文献

筛选
英文 中文
Mobile Ticketing System for Automatic Fare Collection Model for Public Transport 公共交通自动收费模型移动售票系统
D. G. Chandra, R. Prakash, S. Lamdharia
{"title":"Mobile Ticketing System for Automatic Fare Collection Model for Public Transport","authors":"D. G. Chandra, R. Prakash, S. Lamdharia","doi":"10.1109/CICN.2013.131","DOIUrl":"https://doi.org/10.1109/CICN.2013.131","url":null,"abstract":"The ticketing system of public transport system is mainly manual and in some areas semi-automatic which is tedious, stressful and involves a lot of time, effort & manpower. Besides, this is highly inadequate to handle the humongous commuter volume. The traveler has to spend lots of time in queue for buying tickets, tokens and smart cards as well as recharging the smart card specifically during picks hours. To get rid of this hurdle we are proposing a Mobile ticketing model for public transport system. In this paper we are using the Cell phone (Mobile) of a commuter. The Mobile Ticketing model comprises of a registered mobile subscription either Prepaid or postpaid for the traveler's identity by scanning mobile phone number at the entrance/exit of the vehicle or stations and deducting the fare from the Mobile number immediately in case of prepaid connection and sending the information to the service provider of the Mobile connection in case of post paid mobile connection.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123810212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Evaluation of Wireless Sensor Network Routing Protocols with Respect to Power Efficiency 基于功率效率的无线传感器网络路由协议评估
Shounak Chakraborty, Ajoy Kumar Khan
{"title":"Evaluation of Wireless Sensor Network Routing Protocols with Respect to Power Efficiency","authors":"Shounak Chakraborty, Ajoy Kumar Khan","doi":"10.1109/CICN.2013.36","DOIUrl":"https://doi.org/10.1109/CICN.2013.36","url":null,"abstract":"Recent advances in the trend of development of small and powerful battery backed sensor node. These sensor nodes are deployed for various surveillance activities and thus forming a network. There has been numerous amount of research work for the development of power efficient routing protocols for the network of these limited power sensor nodes. This paper provides a survey of these routing protocols on basis and concludes with grading each protocol on energy saving.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122278847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of Facebook Social Network Facebook社交网络分析
N. Akhtar, Hira Javed, Geetanjali Sengar
{"title":"Analysis of Facebook Social Network","authors":"N. Akhtar, Hira Javed, Geetanjali Sengar","doi":"10.1109/CICN.2013.99","DOIUrl":"https://doi.org/10.1109/CICN.2013.99","url":null,"abstract":"Social Network Analysis (SNA) is a technique for modeling the communication patterns between individuals in a way that illuminates the structure of the network and the importance of individuals within the network. SNA has gained a recent importance due to the appearance of various web 2.0 platforms like blogs, wikis, content and media sharing sites which consists of a huge collection of data. These data are vast, noisy, unstructured and dynamic in nature, so mining is performed on such data by various SNA methods and tools in order to extract actionable patterns which are useful for business, consumers, and users. This study is a part of the growing body of research on Social Network Analysis and uncovers hidden relationships in a facebook network. It gives a prospective view of the hidden attributes of the high degree nodes (users having greater number of friends) in the Facebook network. Results show that there is little association among high degree nodes.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Security Breaches in an Organization and Their Countermeasures 组织中的安全漏洞及其对策
Pavitra Chauhan, Nikita Singh, N. Chandra
{"title":"Security Breaches in an Organization and Their Countermeasures","authors":"Pavitra Chauhan, Nikita Singh, N. Chandra","doi":"10.1109/CICN.2013.79","DOIUrl":"https://doi.org/10.1109/CICN.2013.79","url":null,"abstract":"Today's business rely completely on IT network and their connections with the global Internet as the backbone of their sales, sourcing, operating and financial systems. In a similar way many aspects of our lives rely on internet and computers including communications (email, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation), government (birth/death records, Social Security, licensing, tax records), finance (bank accounts, loans, electronic paychecks), medicine (equipment, medical records), and education (virtual classrooms, online report cards, research). In this 21st century no government, business, nongovernmental organizations are purely invulnerable to the cyber attacks. Password based attacks are more popular kinds of attacks that can harm the firm/organization. So, here we present the prevention of a password based attacks. Our main focus was to know about the security breaches in an organization and how are they handled by them. Inspired by such facts, the project revolves around security breaches in the organization and their respective counter measures.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of Cloud on E-Learning 云计算对电子学习的影响
Kritika Verma, M. A. Rizvi
{"title":"Impact of Cloud on E-Learning","authors":"Kritika Verma, M. A. Rizvi","doi":"10.1109/CICN.2013.105","DOIUrl":"https://doi.org/10.1109/CICN.2013.105","url":null,"abstract":"The Cloud computing environment is rising as a natural platform to provide support to online systems. Therefore, there is a need to redefine and redesign the whole educational system which meets the current educational need in the light of cloud. The advent of computers with sophisticated software has made it possible to solve many complex problems very fast and at a lower cost. This paper introduces the characteristics of the current E-Learning and then analyses the concept of cloud computing and describes the architecture of cloud computing platform by combining the features of E-Learning. The authors have tried to introduce cloud computing to e-learning, build an e-learning cloud, and make an active research and exploration in this area. The present scenario of e-learning has certain limitations to it, in order to overcome those limitations there is a paradigm shift in internet based e-learning to the cloud environment.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128222748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hybrid Optical Wireless Access Networks 混合光无线接入网
A. Katara, A. Bapat, A. Selokar, R. Chalse
{"title":"Hybrid Optical Wireless Access Networks","authors":"A. Katara, A. Bapat, A. Selokar, R. Chalse","doi":"10.1109/CICN.2013.41","DOIUrl":"https://doi.org/10.1109/CICN.2013.41","url":null,"abstract":"This paper describes a dynamic reconfiguration algorithm for a hybrid fiber wireless network, which takes advantage of dynamic reconfiguration in WDM based optical networks to provide bandwidth on the fly. The WDM technique for optical networks allows network operators to extend the existing capacity of passive optical networks manifolds. However presently, WDM networks were used mostly in long haul backbone networks and recently have been put to use in metropolitan networks (MAN). But till now not much work has been done on use of WDM networks in MAN. We use wireless technology to solve the Last mile problem of WDM networks. Wireless networks on the other hand are always constrained by need of bandwidth and we use WDM based optical networks to provide that. So both network technologies complement each other. Our proposed approach allows providing bandwidth on demand. It also allows for service differentiation by service providers, and sharing of infrastructure by several service providers.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133680010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
An Efficient Approach to Set Up High Performance Network Center in Academia 建立学术界高性能网络中心的有效途径
J. Kumar, M. Bhattacharya, B. Pandey
{"title":"An Efficient Approach to Set Up High Performance Network Center in Academia","authors":"J. Kumar, M. Bhattacharya, B. Pandey","doi":"10.1109/CICN.2013.28","DOIUrl":"https://doi.org/10.1109/CICN.2013.28","url":null,"abstract":"Performance is a critical issue in setup of network center in any academia. In a research institute, a moment of time is precious for analysis, design, research and development. In this work, an efficient approach, which based on firewall, complaint handling system, LDAP server and spanning tree protocol, is used to set up a network center in ABV-IIITM to provide network facility to researcher, student and faculty in cost-effective and fast-processing way. Here, the Spanning-Tree Protocol is applied in switched networks for a loop free network which open a path for fault tolerant network. That increases 60-70 percent performance in compare to traditional approach used in setup of Network Center. Complaint handling system is a unique characteristic of this network, which ensure transparency and make this network more users friendly.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116436655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AHP Based Trust Model in VANETs 基于AHP的VANETs信任模型
Deepika Saraswat, B. Chaurasia
{"title":"AHP Based Trust Model in VANETs","authors":"Deepika Saraswat, B. Chaurasia","doi":"10.1109/CICN.2013.86","DOIUrl":"https://doi.org/10.1109/CICN.2013.86","url":null,"abstract":"In this work, we present a analytical hierarchy process (AHP) for computing trust in the vehicular ad hoc networks (VANETs). AHP based trust management provides a lightweight security alternative to existing security techniques. Trust Management in VANETs is required to broadcast of selfish or malicious messages and also enable other vehicles to filter out such messages. A trust management system has ability to cope with sparsity of direct interactions. To evaluate the trust, we introduce the AHP based technique constitutes the combination of direct, reputation and indirect trust technique. The AHP is also used to coalesce various recommendation opinions from neighbour vehicles through exchanges of messages. Result shows that the scheme is lightweight and completes in order of milliseconds.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134457479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Simulation Parameter Correction System Design Based on the Measured Data 基于实测数据的仿真参数校正系统设计
Kan Yunqi, Meng Fanqi
{"title":"A Simulation Parameter Correction System Design Based on the Measured Data","authors":"Kan Yunqi, Meng Fanqi","doi":"10.1109/CICN.2013.111","DOIUrl":"https://doi.org/10.1109/CICN.2013.111","url":null,"abstract":"Electric power simulation system can carry on the simulation of power system, it can help managers to make decisions in the event of a disturbance, but the accuracy of the simulation system depends on the simulation parameters. Diversity and variability of the Simulation environment led the parameters must to be correct at any time, correct process depends on the power system operating data. In order to ensure the simulation result closer to actual results to a great extent, using measured data of monitoring platforms is the best choice. In this paper, according to the simulation system parameter correction problem, we designed parameter correction algorithm based on the WAMS's monitor flow data, and developed relevant system, which have been verified by experiments.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Simulation of Traction and Braking Performance for High-Speed Railway Virtual Reality System 高速铁路虚拟现实系统牵引与制动性能仿真
Cong Guan, Long Chang, Huaiyu Xu
{"title":"The Simulation of Traction and Braking Performance for High-Speed Railway Virtual Reality System","authors":"Cong Guan, Long Chang, Huaiyu Xu","doi":"10.1109/CICN.2013.138","DOIUrl":"https://doi.org/10.1109/CICN.2013.138","url":null,"abstract":"A high-speed railway virtual reality system can vividly show the train running process, traction and braking control performance using 3D computer graphics technology. As a major part of virtual reality system, the traction and braking performance have great significance to the effect of the rain running. This paper researches the basic theory of train traction and braking calculation, which can be used to simulate the train running in the virtual reality system. It also introduces the realization process of the virtual simulation based on Direct3D.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130598088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信