2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)最新文献

筛选
英文 中文
Iris technology: A review on iris based biometric systems for unique human identification 虹膜技术:虹膜生物识别系统的研究进展
C. Raghavendra, A. Kumaravel, S. Sivasubramanian
{"title":"Iris technology: A review on iris based biometric systems for unique human identification","authors":"C. Raghavendra, A. Kumaravel, S. Sivasubramanian","doi":"10.1109/ICAMMAET.2017.8186679","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186679","url":null,"abstract":"Biometric features are widely used in real time applications for unique human identification. Iris is one of the physiological biometric features which are regarded as highly reliable in biometric identification systems. Often iris is combined with other biometric features for robust biometric systems. It is also observed that biometrics is combined with cryptography for stronger security mechanisms. Since iris is unique for all individuals across the globe, many researchers focused on using iris or along with other biometrics for security with great precision. Multimodal biometric systems came into existence for better accuracy in human authentication. However, iris is considered to be most discriminatory of facial biometrics. Study of iris based human identification in ideal and noncooperative environments can provide great insights which can help researchers and organizations that depend on iris-based biometric systems. The technical knowhow of iris strengths and weaknesses can be great advantage. This is more important in the wake of widespread use of smart devices which are vulnerable to attacks. This paper throws light into various iris-based biometric systems, issues with iris in the context of texture comparison, cancellable biometrics, iris in multi-model biometric systems, iris localization issues, challenging scenarios pertaining to accurate iris recognition and so on.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"45 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131658230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Energy efficient secure clustering and intrusion detection with resource utilization in mobile adhoc networks 基于资源利用的移动自组网节能安全集群和入侵检测
A. D. Khamalakhannen, S. Vanitha
{"title":"Energy efficient secure clustering and intrusion detection with resource utilization in mobile adhoc networks","authors":"A. D. Khamalakhannen, S. Vanitha","doi":"10.1109/ICAMMAET.2017.8186643","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186643","url":null,"abstract":"The mobile nodes in Mobile Ad-Hoc Network (MANET) are heterogeneous and communicate each other without centralized access point and administration. Ensuring the secure communication between the clusters is tough because of the changing wireless network environment. In recent clustering algorithm the energy minimization is not handled effectively, also due to the dynamic and distributed nature of network security in the network holds narrow research problems. Our protocol improves the efficient clustering process which reduces the number of hops to transmit the information which decreases the energy consumption. Security in terms of IDS detection and key management improved when compared with existing protocols. We consider the channel usage time allocation to minimize the interference to improve the network transmission. To illustrate the efficiency of the proposed protocol we present simulations using NS-2. Simulation results show that significant reduction in the energy and makes improvement in control packet overhead and delivery ratio as compared to existing protocols.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134569572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A contraption endorsed Indian pulse seed recognition system with quality determination prioritizing compound imaging techniques 一个精巧的装置支持印度脉冲种子识别系统与质量确定优先复合成像技术
H. SalomeHemaChitra, S. Suguna
{"title":"A contraption endorsed Indian pulse seed recognition system with quality determination prioritizing compound imaging techniques","authors":"H. SalomeHemaChitra, S. Suguna","doi":"10.1109/ICAMMAET.2017.8186656","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186656","url":null,"abstract":"The main objective of presenting this context is to identify and verify the quality of the seed for future fertilization in the field of agriculture. This research paper proposes a novel image processing technique that includes two phases depicts an optimized selection of feature extraction and classification algorithm that enhances the quality, exactness of the seed variety and realization of the most excellent classification production percentage of 98.9%. In the identification and classification phase, image representation of the pulse seed varieties is pre-processed to enhance the seed image with S-component Conversion and the escalated seed image is processed to detect the outer boundary of the seed and also the inner region of the pulse seed image is extracted for the more accurate and closed boundaries to detect and fill the inner holes of the pulse seed image. This proposed algorithm employed with extraction of 256 features by evaluating the shape, color, texture and seed specialized features. And to attain significant features selection by weighting and ranking techniques for the particular varietal classification. In the second phase, the quality determination of the pulse seed is established to find good viability condition of seed using thermal imaging techniques. The quality aspects are estimating water content in the seed, germination level, and vigorness of the seed and trueness of the seed. In our proposed work average utilization time for processing of identification and classification for each seed is 0.21s. Findings: This work implemented two main phases: Pulse seed Identification and classification and Pulse Quality Determination. In Phase-I, the seed image is acquisitioned and pre-processed by image enhancement and noise removal. Then the enhanced image is processed to detect the inner and outer region of the seed image for the identification process. Then features are extracted from the segmented image for the classification of the pulse seed variety. To minimize the complexity and time consumption of the feature extraction is significant feature are selected using feature selection for classification. In Phase-II, the quality of the seed is determined by evaluating the quality test aspects of the healthy seed such as Germination, Vigorness and Seed color Purity.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132137684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Customer demanding products in online shopping — A novel framework 网上购物中的顾客需求——一种新的框架
P. Yogananth, K. Priyadharshini, S. Mahalakshmi, R. Udhayasanthiya, A. Shilpasree
{"title":"Customer demanding products in online shopping — A novel framework","authors":"P. Yogananth, K. Priyadharshini, S. Mahalakshmi, R. Udhayasanthiya, A. Shilpasree","doi":"10.1109/ICAMMAET.2017.8186720","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186720","url":null,"abstract":"E-Commerce is the Digital Technology of buying or selling products online. In 2020, E-Commerce of India is predicted to bounce from certain billion of its income to tremendous increase in total income which is highest in the world. The sector of online purchase is prominent by the penetration of mobile, increasing internet, growing facility of e-payments among users has improved the purchase of e-commerce products in India. The branded products like televisions, mobile phones, laptops are the products that hits majorly on the e-commerce shopping, that are purchased by ordering through the mobile phones applications. On the other hand, the other pattern of online shopping is by bidding. Online bidding on Deal is exciting & easy. Buyers can bid or buy instantly, and sellers can use website to get rid of unwanted items. Hence the scope of the project is to develop an application for the User to shop by bidding their desired product online, then acquiring that product. The seller with satisfying bid rate can sell the product. The buyer can acquire bade product by delivering them to the buyers location.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132182097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secured text communication using chaotic maps 使用混沌地图的安全文本通信
S. Sheela, K. Suresh, D. Tandur
{"title":"Secured text communication using chaotic maps","authors":"S. Sheela, K. Suresh, D. Tandur","doi":"10.1109/ICAMMAET.2017.8186653","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186653","url":null,"abstract":"Security has become vital issue in storage and transmission of digital data over insecure communication channel which can be achieved by using reliable encryption algorithms. Chaos based encryption techniques are more popular because of their exceptionally superior properties such as high security, simplicity and faster speed. In this paper, one of the chaos based text encryption algorithms is considered which employs modified Henon map and Sine map. The encryption capability of the algorithm is verified for different text data. Further, the empirical results of the chaos based algorithm are compared with RC4. Experimental findings reveal that the algorithm provides secure communication for text data of different file sizes.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115096188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Regulated DC-DC converter for grid connected system during hazardous conditions 危险工况下并网系统的稳压DC-DC变换器
K. Kandasamy, D. Raja, R. Vairavan, N. Hemanthkumar
{"title":"Regulated DC-DC converter for grid connected system during hazardous conditions","authors":"K. Kandasamy, D. Raja, R. Vairavan, N. Hemanthkumar","doi":"10.1109/ICAMMAET.2017.8186665","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186665","url":null,"abstract":"The solar based grid-connected power system is becoming a very fast growing area due to the shortage of the fossil fuel energy and the great environmental pollution. But the grid continuously supplies the power even when load is not present. This cause harmful situation in and around the grid. In the proposed technique, First Zeta converter is designed using PID(Proportional Integral Differential) control technique for regulated DC output later the issue caused due to non-availability of load is solved by isolating the DC converter supplied to the inverter. The DC to DC converter is isolated using trip switch, so that power coming to load side is blocked as shown in figure 1. Here, DC-DC converter is designed to produce the regulated output also ability to handle the islanding problem. In order to monitor the converter, DC supply is fed to PWM(Pulse Width Modulation)inverter. These method is initially approached theoretically and further the condition tested and analyzed using simulation results. The PIDcontroller used in this paper is to provide optimum DC output during abnormal input and load condition. A novel digital logical control is designed near the load to isolate problems occurred due to islanding.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134252985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of strength reduction method in shiran reservoir reinforcement project 强度折减法在石然水库加固工程中的应用
Xiaocheng Su
{"title":"Application of strength reduction method in shiran reservoir reinforcement project","authors":"Xiaocheng Su","doi":"10.1109/ICAMMAET.2017.8186628","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186628","url":null,"abstract":"After the reinforcement of dam stability is very important. The stability analysis is carried out on the section of the dam, analysis of reservoir slope based on strength reduction method. The Phi-c reduction process gradually reduced the strength by using the finite element equilibrium equation to calculate the shear strength parameters. The most dangerous slip surface of dam slope is obtained until the calculation does not converge. So the slope stability factor is obtained. This paper provides a very good example for similar projects.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134519727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm 利用虚拟节点和ECC算法防止OLSR协议中的拒绝服务攻击
R. Bhuvaneswari, R. Ramachandran
{"title":"Prevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm","authors":"R. Bhuvaneswari, R. Ramachandran","doi":"10.1109/ICAMMAET.2017.8186625","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186625","url":null,"abstract":"Security is the most important issue which needs to be given utmost importance and as both ‘Mobile Ad hoc Networks (MANET) and Wireless Sensor Networks (WSN) have similar system models, their security issues are also similar. This study deals in analysing the various lapses in security and the characteristics of various routing protocol's functionality and structure. This paper presents the implementation of ECC algorithm in the prevention of Denial of Service (DoS) attack through fictitious node. Optimized Link State Routing (OLSR) protocol is a MANET routing protocol and is evaluated mainly for two things. Primarily OLSR is less secure like AODV and others. The reason for it being less secure is that it is a table-driven in nature and uses a methodology called selective flooding technique, where redundancy is reduced and thus the security possibilities of the protocol is reduced. Another reason for selecting OLSR is that is an highly effective routing protocol for MANET. A brief information about formal routing is provided by the proposed methodology termed Denial Contradictions with Fictitious Node Mechanism (DCFM) which provides brief information about formal routing. Here, fictitious node acts as a virtual node and large networks are managed from attacks. More than 95% of attacks are prevented by this proposed methodology and the solution is applicable all the other DoS attacks of MANET.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132988681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mitigation of voltage sag, swell and THD using Dynamic Voltage Restorer with photovoltaic system 光伏系统动态电压恢复器对电压暂降、膨胀和THD的抑制作用
S. S. Rao, P. Krishna, S. Babu
{"title":"Mitigation of voltage sag, swell and THD using Dynamic Voltage Restorer with photovoltaic system","authors":"S. S. Rao, P. Krishna, S. Babu","doi":"10.1109/ICAMMAET.2017.8186668","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186668","url":null,"abstract":"At present power quality is the primary term in the power system. PQ problems like voltage sag and swells in the load. Fore long occurrence of these hurdles can result in failure of appliances at short duration of time. In this paper in-phase voltage injection scheme for DVR are employed with a Photovoltaic system. Dynamic Voltage Restorer (DVR) is a better performer and is of lesser cost. The control of compensation voltage in Dynamic Voltage Restorer (DVR) has been proposed using synchronous reference frame (dq0) technique and reduced the rating of DVR with compensate the voltage sag and voltage swell and harmonics in the system fed by photo voltaic technique.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125231342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
ENAES CCSA to preserve confidentiality of outsourced data in public cloud ENAES CCSA保护公有云中外包数据的机密性
R. Kalaichelvi, S. S. Manikandasaran
{"title":"ENAES CCSA to preserve confidentiality of outsourced data in public cloud","authors":"R. Kalaichelvi, S. S. Manikandasaran","doi":"10.1109/ICAMMAET.2017.8186657","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186657","url":null,"abstract":"Cloud storage must be secured for maintaining the confidentiality of data. To maintain the confidentiality, many researchers suggested cryptographic techniques to protect data against malevolent attackers in order to preserve data confidentiality. It is observed from various studies, a groundbreaking security system is required to maintain cloud data confidentiality, as the existing techniques are not adequate to protect data stored in Cloud storage. This paper proposes a Cryptographic Cloud Storage Algorithm (CCSA) namely, Enhanced Advanced Encryption Standard (EnAES) to ensure confidentiality of cloud stored data. The proposed CCSA is a symmetric encryption algorithm with data partition and data shuffling mechanisms. Same keys are used to encrypt and decrypt the data. Keys for EnAES CCSA are generated from cloud. EnAES CCSA takes less time for encrypting and decrypting date when compared to the existing AES algorithm. EnAES allows users to encrypt data with high security. The dynamic_S-box of Enhanced_substitute stage enhances the security level in the proposed CCSA. The Enhanced_MixColumns stage helps to reduce the execution time. Ciphertext produced by EnAES CCSA is not easily hacked by the illegitimate users. It confuses the cryptanalyst to get the original ciphertext as there are three mechanisms: data partition, data shuffling and encryption incorporated.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129929459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信