2014 International Conference on Recent Trends in Information Technology最新文献

筛选
英文 中文
Smart cloud robot using raspberry Pi 使用树莓派的智能云机器人
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996193
S. Prabha, A. Antony, M. Meena, S. Pandian
{"title":"Smart cloud robot using raspberry Pi","authors":"S. Prabha, A. Antony, M. Meena, S. Pandian","doi":"10.1109/ICRTIT.2014.6996193","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996193","url":null,"abstract":"Cloud robotics is an emerging field that is centered on the benefits of converged infrastructure and shared services of a cloud computing environment. In this paper, a system is designed with an autonomous robot to sense environmental data such as temperature, humidity, and air quality, along with GPS coordinates and store them on the cloud. The mobile robot is controlled using an Arduino microcontroller and communicates with the cloud via a Raspberry Pi. A private cloud is set up using OpenStack that provides Infrastructure as a Service. The collected data are stored in a cloud server which could be viewed through a web browser and can be used to create awareness about the environmental changes of the location under study. A proof-of-concept prototype has been developed to illustrate the effectiveness of the proposed system.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122911306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Securing online reputation systems through temporal, trust and user correlation analysis 通过时间、信任和用户相关性分析来保护在线声誉系统
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996203
M. Divya, P. Kumudha, N. Anithadevi
{"title":"Securing online reputation systems through temporal, trust and user correlation analysis","authors":"M. Divya, P. Kumudha, N. Anithadevi","doi":"10.1109/ICRTIT.2014.6996203","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996203","url":null,"abstract":"Online reputation systems play a significant role in decision support during internet mediated service provision. With the fast development of online reputation systems in various social networks, operations against such systems are growing rapidly. It has been considered as an important but most difficult problem. In this paper, we propose a defense solution TTAUCA [Temporal, Trust And User Correlation Analysis], which secure the reputation systems from a novel angle, that is used to integrate time domain anomaly detection, Dempster-Shafer Theory based trust computation and user correlation analysis. Real user attack data collected from a cyber competition is used to construct the testing data set. Compared with previous scheme TATA [Temporal And Trust Analysis], TTAUCA achieves a better performance in terms of detecting products under attacks, identifying malicious users who insert illegitimate ratings, and recovering reputation scores of victim products.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122716916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Opportunistic routing to mitigate attacks in MANET 机会路由以减轻MANET中的攻击
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996116
M. Elakkiya, S. Kaushik, Elizabeth. N Edna
{"title":"Opportunistic routing to mitigate attacks in MANET","authors":"M. Elakkiya, S. Kaushik, Elizabeth. N Edna","doi":"10.1109/ICRTIT.2014.6996116","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996116","url":null,"abstract":"Adhoc Networks (MANETs) are an emerging area of mobile computing. There are various challenges that are faced in adhoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set up elaborate networks. Adhoc networks therefore throw up new requirements and problems in all areas of networking. The solutions for conventional networks are usually not sufficient to provide efficient Ad-hoc operations. The wireless nature of communication and lack of any security infrastructure raise several security problems. Commonly defined as the infrastructure less independent networks are prone to much vulnerability. These decentralized networks when employ conventional routing algorithms to forward data do not effectively transfer the packet to the right destination, as all these algorithms require a contemporary routing path between a source and destination node. Such prolonged link is not possible in a highly mobile network. The link between the nodes is only temporary and these links break down as the nodes move away from the direct communication range. Focusing on the secure routing against various attacks and the high probability of data delivery in an optimum manner, a Trust based opportunistic routing algorithm which is able to reliably route data despite highly unstable links is proposed in this paper. The trust model framed is incorporated in the basic routing algorithm, AODV. An attempt to explain various attack mitigation by the proposed trust model is also made.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115199240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient method for crowd event recognition based on motion patterns 一种基于运动模式的人群事件识别方法
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996124
C. Sindhuja, K. .. Srinivasagan, S. Kalaiselvi
{"title":"An efficient method for crowd event recognition based on motion patterns","authors":"C. Sindhuja, K. .. Srinivasagan, S. Kalaiselvi","doi":"10.1109/ICRTIT.2014.6996124","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996124","url":null,"abstract":"An automated visual monitoring process expands from low level analysis of object detection and tracking to the interpretation of their behaviors. Analyzing human crowd is an emerging trend in intelligent video surveillance for the purpose of detecting abnormalities. Tracking every human being in a crowd and analyzing their behavior is a challenging task due to occlusions. Hence, the crowd can be handled as a group entity instead of tracking the individual in the crowd. The behavior of the crowd can be distinguished with motion patterns due to prominent spatio-temporal characteristics. The proposed system involves a systematic approach to recognize the global events in human crowd through observing motion patterns such as flow, speed and direction. Initially as a preprocessing step, background subtraction is performed to extract the foreground blobs and optical flow is estimated to obtain the velocity and direction of motion. The human crowds are then clustered based on similar direction and proximity using Adjacency Matrix based Clustering (AMC). After clustering, the centroid and orientation of the cluster are extracted inorder to represent the behavior of crowd. Finally the multiclass Support Vector Machine (SVM) is trained to correctly recognize the behavior of crowd.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115916550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A combined random noise perturbation approach for multi level privacy preservation in data mining 数据挖掘中多级隐私保护的组合随机噪声摄动方法
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996194
S. Chidambaram, K. .. Srinivasagan
{"title":"A combined random noise perturbation approach for multi level privacy preservation in data mining","authors":"S. Chidambaram, K. .. Srinivasagan","doi":"10.1109/ICRTIT.2014.6996194","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996194","url":null,"abstract":"Now a Days huge volume of personal and sensitive data is collected and retrieved by various enterprises like social networking system, health networks, financial organizations and retailers. There are three main entities such as data owner; the database service provider and the client are mainly involved in this type of outsourced based data model. So that is more essential for the privacy preservation of the owner. Privacy preservation is a main challenging area in data mining. In that, Data based privacy perturbation technique is the standard model which performs the data transformation process before publishing the data. This paper proposes Additive Multiplicative Perturbation Privacy Preserving Data Mining (AM-PPDM) which is suitable for multiple trust level. In that, the random noise perturbation is applied to individual values before the data are published. This hybrid approach improves the privacy guarantee value during the reconstruction process. In AM-PPDM, the generated random Gaussian noise multiplied with the original data to produce different perturbed copies at various trust levels. By implementing this approach, the diversity attack is completely avoided during the reconstruction process.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123661881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Weighted Category Matching Algorithm in Sensor Cloud for rapid retrieval 基于传感器云的快速检索加权分类匹配算法
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996148
S. Ramachandran, S. Grace, S. S. Beevi
{"title":"Weighted Category Matching Algorithm in Sensor Cloud for rapid retrieval","authors":"S. Ramachandran, S. Grace, S. S. Beevi","doi":"10.1109/ICRTIT.2014.6996148","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996148","url":null,"abstract":"Sensor-cloud is a relatively new interdisciplinary domain that combines the fields of Wireless Sensor Networks (WSN) and Cloud Computing. The major issue needs to be addressed in Sensor-Cloud is storage and retrieval of data. Data security is preserved by encrypting the sensor data before storing it into the cloud. On analysis of existing methods, there are two different issues, First issue; Encrypted Document matching is performed based on their plaintext keywords which is not suitable for sensor data and Second issue, subscribers are categorized based on their predicates. So, the storage space required is more. To overcome these issues, the paper proposes a new indexing structure which is suitable for sensor data and a new algorithm called Weighted Category Matching Algorithm (WCMA) for quick retrieval. On comparing with existing methods, the proposed WCMA algorithm achieves a better document retrieval and results are discussed in implementation details.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123681213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of non-volatile memory express 非易失性存储器express的设计与实现
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996190
Sivashankar, S. Ramasamy
{"title":"Design and implementation of non-volatile memory express","authors":"Sivashankar, S. Ramasamy","doi":"10.1109/ICRTIT.2014.6996190","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996190","url":null,"abstract":"Flash-memory-based solid-state disks (SSDs) provide faster random access and data transfer rates than electromechanical drives and today it can often serve as rotating-disk replacements, but the host interface to SSDs remains a performance bottleneck and also I/O subsystem causes unnecessary latencies, translations in the Read/Write commands. In order to completely utilize the performance of SSDs a Non Volatile Memory Subsystem was designed based on the NVM Express Specification. The communication to this I/O subsystem is through PCI Express interface and the command set is based on NVMe 1.0c Specification. The designed sub-system typically consists of PCIe Core, PCIe controller, NVMe controller, NAND Flash Controller and several NAND Chips. The present paper deals with the design and implementation of PCIe controller and the NVMe controller. The PCIe controller was designed as a generic bridge between any PCIe device and the PCIe Core. The NVMe controller was designed as a PCIe device which implements the NVMe Specification.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114839474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Trustworthy mechanisms for selecting cloud service providers 选择云服务提供商的可靠机制
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996182
B. L. Elizabeth, K. Ramya, A. Prakash, V. R. Uthariaraj
{"title":"Trustworthy mechanisms for selecting cloud service providers","authors":"B. L. Elizabeth, K. Ramya, A. Prakash, V. R. Uthariaraj","doi":"10.1109/ICRTIT.2014.6996182","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996182","url":null,"abstract":"Cloud computing has changed the nature of IT and business. However the adoption issues for the cloud is mainly due to the lack of transparency and control. Also, there are too many cloud service providers in the marketplace offering similar functionalities. In order to support the consumers in identifying trustful cloud providers, Trustworthy mechanisms for selecting cloud service providers is proposed in this paper. The proposed system is implemented using feedbacks and credential attributes (QoS) of providers. A modified Identity model is proposed to identify malicious feedbacks and provides improvements in the trust computation. Results show that the trust computation using the proposed architecture is more efficient in terms of finding accurate trust based providers.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115242649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable graph based routing in VANET environment VANET环境下基于图的可靠路由
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996153
R. Kirtiga, O. S. GnanaPrakasi, D. Kavipriya, R. Anita, P. Varalakshmi
{"title":"Reliable graph based routing in VANET environment","authors":"R. Kirtiga, O. S. GnanaPrakasi, D. Kavipriya, R. Anita, P. Varalakshmi","doi":"10.1109/ICRTIT.2014.6996153","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996153","url":null,"abstract":"Vehicular ad hoc networks are a subclass of wireless networks in which vehicles on the road act as nodes, exchanging traffic and road safety information. The traditional MANET specific routing protocols is not as effective in VANET environment. The occurrence of link breakage is very frequent in VANET when compared to MANET due to the swift movement of the vehicles. Hence, this highly dynamic behaviour of VANETs demands a reliable routing strategy. As of now, not much attention is laid on routing reliability of VANETs in highway environment. Our objective is to propose a reliable routing protocol that minimizes link breakage and thereby increasing the throughput in VANET- variable velocity environment. The mechanism is based on the mathematical model of normal (Gaussian) distribution, which is a continuous probability distribution function. This function is used to estimate the link reliability between the vehicular nodes in the road. Based on the computed link reliability values between the nodes, the system constructs an evolving graph in a dynamic fashion and the route reliability value is estimated from the graph. This route forms the Most Reliable Journey for the data transmission.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123599335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Protocol Independent Detection and Classification (PIDC) system for DRDoS attack 针对ddos攻击的协议独立检测与分类(PIDC)系统
2014 International Conference on Recent Trends in Information Technology Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996154
P. Mohana Priya, V. Akilandeswari, S. Shalinie, V. Lavanya, M. Shanmuga Priya
{"title":"The Protocol Independent Detection and Classification (PIDC) system for DRDoS attack","authors":"P. Mohana Priya, V. Akilandeswari, S. Shalinie, V. Lavanya, M. Shanmuga Priya","doi":"10.1109/ICRTIT.2014.6996154","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996154","url":null,"abstract":"High-rate flooding attack detection and classification has become a necessary component for network administrators due to their attack range that affects the Data Center servers. The main objective of this paper is to propose the Protocol Independent Detection and Classification (PIDC) system in order to prevent the web servers from devastating attacks such as Distributed Reflection Denial of Service (DRDoS) attacks. The DRDoS flooding attack exploits fixed IP spoofing to defeat the Distributed Denial of Service (DDoS) attack prevention measures. This is the first paper to detect and classify the types of reflected attacks using SNMP MIB variables. The proposed PIDC system uses the data mining and machine learning techniques to detect all types of reflected flooding attacks. The rank correlation based detection algorithm retrieves the incoming traffic in the form of Simple Network Management Protocol -Management Information Base (SNMP-MIB) variables and finds the relationship between the MIB variables to detect the attacks from the normal traffic. Then, C4.5 classification algorithm extracts and frames association rule based on protocol information from reflected DDoS flooding attacks. Finally, the CPU, memory and disk resource distribution to legitimate requests are also increased. This method achieves 99% of true positive rates and less false positive rate of (1%) when compared to existing reflected attack detection methods. Moreover, these attacks are classified by types such as TCP reflection attacks and DNS reflection attacks with the highest probability of attack traffic.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信