2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)最新文献

筛选
英文 中文
Analysis and visualization of health data from the CAB dataset 来自CAB数据集的健康数据的分析和可视化
Y. Bhavsar, Mitaxi Mehta
{"title":"Analysis and visualization of health data from the CAB dataset","authors":"Y. Bhavsar, Mitaxi Mehta","doi":"10.1109/ICAMMAET.2017.8186717","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186717","url":null,"abstract":"Many datasets contain variables that take binary values. Often one would like to subset the data set according to the value of such a binary variables and compare and contrast the statistical parameters for such subsets. We have written an R code to analyze such datasets and create plots to give comparison of mean of variables for such binary partitions. We show the result of this analysis for the CAB database which has health data from several Indian states. The data contains survey from the year 2014 with total 53 health indicators, covering 8 states and with total data 13.8 MB. We also show the state-wise means of several partitioned and normalized variables using a single plot. Two binary variables have been used, a demographic one (rural/urban) and the gender (male/female), to partition and compare the database.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124868847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An overview of information security governance 信息安全治理概述
M. Asgarkhani, Eduardo Correia, Amitrajit Sarkar
{"title":"An overview of information security governance","authors":"M. Asgarkhani, Eduardo Correia, Amitrajit Sarkar","doi":"10.1109/ICAMMAET.2017.8186666","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186666","url":null,"abstract":"IT Governance spans the culture, organization, policy and practices that provide for IT management and control across five key functions including Strategic Alignment, Value Delivery, Resource Management, Performance Management, and Risk Management. The risk management function is concerned with ascertaining that procedures are defined for ensuring that risks have been sufficiently managed, as well as including assessing the risk factors of IT investments. The increased use of networking solutions has meant that the key aspect of risk management function of IT Governance is focused on managing information and network security. The internet has progressed to become the common platform for connecting businesses and communities worldwide. Transferring information through the internet amid sophisticated networked systems and applications is a norm. While some previous research has identified the need for protective measures in operating networked systems, security management of information and networked systems is essential. This paper examines previous research on technology governance, risk management, and IT security management by using a broad risk management framework.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127561030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluation and optimization of smart cities using betweenness centrality 基于中间中心性的智慧城市评价与优化
Abhishek Kumar Jha, N. Sunitha
{"title":"Evaluation and optimization of smart cities using betweenness centrality","authors":"Abhishek Kumar Jha, N. Sunitha","doi":"10.1109/ICAMMAET.2017.8186729","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186729","url":null,"abstract":"A smart city is an interconnection of a great number of subsystems of a city to facilitate data exchanges with the goal of enhancing a city's efficiency. A number of challenges present themselves with the concept of smart city. Some of them are security and efficiency of networks. In this paper, using the concept of betweenness centrality, we attempt to address those problems. Betweenness Centrality measures the extent to which a node lies on the shortest path(s) of other pairs of nodes. This gives us a fair ides about network traffic and node requirements, which can then be exploited to solve security and efficiency issues.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128311054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Online flower marketing system using mobile apps 使用移动应用程序的在线花卉营销系统
J. Vijayabaskar, A. Arun, V. Vijay, S. Janakiraman
{"title":"Online flower marketing system using mobile apps","authors":"J. Vijayabaskar, A. Arun, V. Vijay, S. Janakiraman","doi":"10.1109/ICAMMAET.2017.8186725","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186725","url":null,"abstract":"The project titled “ONLINE FLOWER MARKETING SYSTEM USING MOBILE APPS” is a comprehensive system which co-ordinates various operations in flower shop by using the mobile application through the online. This includes a variety of collections of flowers and flower made products such as flower arrangements, flower bouquets, retails and etc. This project deals with the booking of various flower products to the various customers, updating and editing of flower products rates and searching for employees, customers and calculation of bills. We first check the availability of the particular flower. Then if available sale it to the particular customer. Than easy to order the flowers in the particular shop by using in the mobile app and also to make the order from which time, place and product status from your orders in the mobile apps.so that in this application through easy to use of the customers and to delivery for the customer at the order time in the product. The mobile application should be easy to work. The application should be able to extract information from databases and make the reports very easily. The database should maintained for shop owner and application admin. The application and its operations should be safe and unauthorized access should not be allowed.it should provide security in the customer and seller for the data base system.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125954180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pixel based image encryption using magic square 基于像素的图像加密使用魔方
S. Sowmiya, I. M. Tresa, A. Chakkaravarthy
{"title":"Pixel based image encryption using magic square","authors":"S. Sowmiya, I. M. Tresa, A. Chakkaravarthy","doi":"10.1109/ICAMMAET.2017.8186634","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186634","url":null,"abstract":"In recent world, the way of transferring the secured information particularly in public sectors, has faced more challenges. To minimize these challenges, cryptographic concepts has been introduced. Cryptography is the art of technique that is used to changing the information in to unreadable format based on the user's key. Various cryptographic concepts have been introduced for text and image. Due to data redundancy and mass data capacity the text encryption methods are difficult to handle the image encryption. Image encryption is done by changing the position of the pixels in an image based on the key provided by the user. In the existing method, the image encryption is done by the magic rectangle method. It contains only one magic rectangle and if it is computed, the intruder can easily retrieve the original image. To overcome this, we proposed the Pan Magic Square encryption algorithm for the image to be encrypted. In PMS, the plain text image is partitioned into pixels. By user's key, 64 magic squares are generated. Then, encrypt the image based on the square values. The image is being encrypted by the PMS algorithm. The encrypted image is transmitted to the receiver. The receiver will decrypt the image by the reverse process of the encryption. The encrypted image provided by the algorithm is different from the plaintext image so we can securely transmit over the internet. After decryption, the resulting image provided by the proposed technique will be same as the original plaintext image.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128108854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Android application for complaining against the social issues Android应用程序投诉社会问题
P. Vanathi, N. Ambika, E. Sivaranjani, R. Suruthipriyanga, L. Sailaja
{"title":"Android application for complaining against the social issues","authors":"P. Vanathi, N. Ambika, E. Sivaranjani, R. Suruthipriyanga, L. Sailaja","doi":"10.1109/ICAMMAET.2017.8186721","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186721","url":null,"abstract":"Android is the software stack for the mobile devices which goes viral on everybody's hand, these apps paves path for being updated in current affairs, not only in knowing the news but also in letting others know the news. The proposed android app enables the user highlight the current social issues such as farmers' death, improper maintenance of toilets and infrastructures at schools and hospitals, bribing etc. The user might feel comfortable in interacting with its enhanced features. Videos or images captured will be uploaded directly in order to avoid the fraudulent, one who uploads the sensitive items might not be worried of the security or privacy issues because all the personal information of that particular user will be hidden from the third party so, their details will not be leaked.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126994326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-distrust protocol for the secure routing in wireless sensor networks 无线传感器网络中安全路由的信任不信任协议
S. Karthick, E. S. Devi, R. Nagarajan
{"title":"Trust-distrust protocol for the secure routing in wireless sensor networks","authors":"S. Karthick, E. S. Devi, R. Nagarajan","doi":"10.1109/ICAMMAET.2017.8186688","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186688","url":null,"abstract":"Now a days usage of Wireless Sensor Networks (WSNs) is increasing, because of its wide application. Unlike common networks the WSNs have the capability of reconfiguration, whenever any defect occurs in the network. However, while routing in these network the loss of data is occurring due to its security lack. Hence many researchers have presented their research for providing secure routing in WSNs. The security is still an issue in routing of WSNs. In this paper, we have developed a novel protocol for the secure routing of WSNs, and named as Trust-Distrust Protocol (TDP). The proposed protocol has four stages, initial stage is topology management, where an improved k-means algorithm is applied. Then the second stage is Link Quality Appraisal, which means fitness evaluation of every nodes in the network. The third stage is Grading, in which based on the fitness value a grade point is allotted to every node. In the last stage the secure path for the routing is determined based on grade point. The proposed TDP is tested in NS2 and the performance is compared with the existing LEACH protocol. Ultimately the proposed protocol outperform the performance of the existing routing protocol.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131918806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Optimizing multiple-QPM in Fibonacci sequence using simulated annealing algorithm 用模拟退火算法优化斐波那契数列中的多重qpm
P. Shiva, C. Siva, Balaji Narayanan, Toijam Sunder Meetei, K. Pandiyan
{"title":"Optimizing multiple-QPM in Fibonacci sequence using simulated annealing algorithm","authors":"P. Shiva, C. Siva, Balaji Narayanan, Toijam Sunder Meetei, K. Pandiyan","doi":"10.1109/ICAMMAET.2017.8186693","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186693","url":null,"abstract":"We have analyzed the simulated annealing algorithm in a Fibonacci based optical superlattices to obtain multiple second harmonic generation (SHG) in a single channel Quasi-Phase matching (QPM) device. The Fibonacci sequence itself has plenty of reciprocal vectors to generate multiple-QPM. To arrange the multiple peaks in a desired order, we have introduced simulated annealing algorithm in the Fibonacci based optical superlattices. The parameters such as temperature, perturbation size and choice of domains which are playing key role in designing the multiple peaks are discussed in detail.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129304456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel fuzzy based energy efficient routing for Internet of Things 一种新的基于模糊的物联网节能路由
S. Santiago, L. Arockiam
{"title":"A novel fuzzy based energy efficient routing for Internet of Things","authors":"S. Santiago, L. Arockiam","doi":"10.1109/ICAMMAET.2017.8186645","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186645","url":null,"abstract":"The Internet of Things (IoT) provides communication between physical and digital world. The devices sense, communicate and exchange data. This paper articulates the design and implementation of Energy Efficient Routing for IoT. Routing metrics are combined to optimize the network performance. The proposed technique makes use of fuzzy inference system to merge energy aware metrics for choosing the preferential path and to prolong the lifetime of the networks. The results are obtained using MATLAB and the output performance is 63.4% for the given scenario.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133848975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Metaheuristic techniques for cluster selection in WSN WSN中聚类选择的元启发式技术
D. Prasad, P. Naganjaneyulu, K. Prasad
{"title":"Metaheuristic techniques for cluster selection in WSN","authors":"D. Prasad, P. Naganjaneyulu, K. Prasad","doi":"10.1109/ICAMMAET.2017.8186745","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186745","url":null,"abstract":"Wireless Sensor Networks (WSN) is generally used in monitoring and controlling specific environments. Low-priced sensor nodes are used to form the WSN and are kept distributed in a dense manner in the environment. Collecting information and forwarding it to a Base Station (BS) is the chief function of a sensor node. New trends show that the importance and relevance of WSNs has widened and improved significantly. The biggest disadvantage of such type of network is its limited energy resources. To improve the lifetime of these networks a suitable method namely clustering is used which saves energy thus protecting the limited sensor resources. Meta-heuristic algorithms are popularly used for clustering of WSNs. In more complex problems calculating a huge amount of possible modes is carried out to find the most precise answer. In the current work, the selection of clustering protocols in WSNs is examined. The chosen clustering techniques have their basis in metaheuristic protocols.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133067462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信