2012 International Conference on Computing Sciences最新文献

筛选
英文 中文
New Directions in Quantum Chaotic Crypto Schemes 量子混沌密码方案的新方向
2012 International Conference on Computing Sciences Pub Date : 2012-09-14 DOI: 10.1109/ICCS.2012.47
G. Geetha
{"title":"New Directions in Quantum Chaotic Crypto Schemes","authors":"G. Geetha","doi":"10.1109/ICCS.2012.47","DOIUrl":"https://doi.org/10.1109/ICCS.2012.47","url":null,"abstract":"The non-linear part of the chaotic cryptography when handled through quantum dynamics can be termed as \"Quantum Chaotic cryptography\". A novel approach using quantum chaos that could aid the cryptographers in the development of cryptographic design is proposed. The dynamics in quantum setup is analyzed through energy packets. The geometry that explains these coordinates is a Riemannian geometry with a line element given by a metric ds2 = gij dxi dxj, where xi is the position vector, gij is the fundamental metric of a covariant tensor of rank 2. With this fundamental form we obtain the difference equation for a geodesic. By allowing encryption to occupy the geodesic, we achieve time and space complexity of the systems.","PeriodicalId":429916,"journal":{"name":"2012 International Conference on Computing Sciences","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121577548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Cryptographic Hashing Solution for Mitigating Persistent Packet Reordering Attack in Wireless Ad Hoc Networks 一种减轻无线自组织网络中持久数据包重排序攻击的加密散列解决方案
2012 International Conference on Computing Sciences Pub Date : 2012-09-14 DOI: 10.1109/ICCS.2012.83
P. Raju, K. Shet
{"title":"A Cryptographic Hashing Solution for Mitigating Persistent Packet Reordering Attack in Wireless Ad Hoc Networks","authors":"P. Raju, K. Shet","doi":"10.1109/ICCS.2012.83","DOIUrl":"https://doi.org/10.1109/ICCS.2012.83","url":null,"abstract":"In this paper, we propose a new scheme for mitigating the persistent packet reordering attack. This attack mainly makes use of the end to end congestion control mechanism of TCP. The proposed scheme uses symmetric key cryptography and modified SHA-1 (mSHA-1) hash function for verifying packet reordering. This is implemented with AOMDV routing protocol using NS-2 network simulator. The proposed solution blocks the attack after its detection. The efficiency of the proposed scheme is evaluated on different performance metrics like congestion window and TCP Good put as the attack mainly targets the congestion control mechanism of TCP.","PeriodicalId":429916,"journal":{"name":"2012 International Conference on Computing Sciences","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129201387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulators for Wireless Networks: A Comparative Study 无线网络模拟器:比较研究
2012 International Conference on Computing Sciences Pub Date : 2012-09-14 DOI: 10.1109/ICCS.2012.65
A. Kumar, S. Kaushik, R. Sharma, P. Raj
{"title":"Simulators for Wireless Networks: A Comparative Study","authors":"A. Kumar, S. Kaushik, R. Sharma, P. Raj","doi":"10.1109/ICCS.2012.65","DOIUrl":"https://doi.org/10.1109/ICCS.2012.65","url":null,"abstract":"Network simulation is the most predominant evaluation techniques in the area of computer Networks. The simulation models in a reliable and simple way can be developed by researchers using different simulators for evaluating the behavior and performance of protocols for different networks, simulations are a good example between cost and complexity by maintaining the accuracy of the results. This paper gives briefly survey on a performance comparison study of the different network simulators for wireless network. There are many simulators for wireless network, but among them five are the popular simulators these are: Qualnet/GlomoSim, OM-Net++, Ns-2, OPNET modeler and JSim with a real-world test bed. The information about each of the simulator abilities, their internal structure, development environment and their support for wireless network simulation has detailed discussed in this paper. This paper helps to identify one is best option among shown simulator for their best need. Finally, the paper contains survey, comparatively study and conclusion about making the suitable choice of network simulator supporting wireless network based on the numbers of surveys and papers.","PeriodicalId":429916,"journal":{"name":"2012 International Conference on Computing Sciences","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130328293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Novel Approach for Color Image Enhancement Using Double Window Concept 基于双窗口概念的彩色图像增强新方法
2012 International Conference on Computing Sciences Pub Date : 2012-09-14 DOI: 10.1109/ICCS.2012.3
S. Setty, N. K. Srinath, M. C. Hanumantharaju
{"title":"A Novel Approach for Color Image Enhancement Using Double Window Concept","authors":"S. Setty, N. K. Srinath, M. C. Hanumantharaju","doi":"10.1109/ICCS.2012.3","DOIUrl":"https://doi.org/10.1109/ICCS.2012.3","url":null,"abstract":"In this paper, a new approach for the enhancement of color image using luminance and contrast enhancement based on double window concept has been presented. The proposed method exploits Hue-Saturation-Value (HSV) color space since the HSV space separates color from intensity. The hue and saturation components have been kept constant in order to avoid color distortion. In this work, the value component of the HSV has been modified in two steps. First, the non-linear transfer function is applied on the overlapping and non-overlapping window in order to enhance luminance part of the image. Further, the 2-D Gaussian filter has been used for contrast enhancement. The Gaussian filter enhances the darker pixel while neutralizing the over enhanced pixel. The modified value is combined with preserved hue and saturation components in order to obtain enhanced HSV image. Finally, the image from HSV color space is converted into RGB color space. The experimental results presented show that the color image enhanced by this algorithm is clearer, vivid and efficient.","PeriodicalId":429916,"journal":{"name":"2012 International Conference on Computing Sciences","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132961880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalization of Software Metrics on Software as a Service (SaaS) 软件即服务(SaaS)中软件度量的泛化
2012 International Conference on Computing Sciences Pub Date : 2012-09-14 DOI: 10.1109/ICCS.2012.37
Ram Singh, Avinash Bhagat, Navdeep Kumar
{"title":"Generalization of Software Metrics on Software as a Service (SaaS)","authors":"Ram Singh, Avinash Bhagat, Navdeep Kumar","doi":"10.1109/ICCS.2012.37","DOIUrl":"https://doi.org/10.1109/ICCS.2012.37","url":null,"abstract":"\"Upgradation\", simply means learn from your past experiences and make efforts to change your present and future to attain more and more satisfaction. From the era of single job processing to batch processing and then to multiprocessing, we have updated our work process, computing environment, business rules and so on. With the advent of increased awareness of IT in common man, everyone wants to upgrade themselves. IT companies provide software that can install on client machines and produce outputs as per requirements of client. But it will be more advantageous when different kind of software will be made available at one place for usage. This paper aims in providing functionalities of SaaS, types of software as a service, types of SaaS users and certain important software metrics that are required to check the performance of SaaS.","PeriodicalId":429916,"journal":{"name":"2012 International Conference on Computing Sciences","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114436391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in Mobile Ad Hoc Networks 移动Ad Hoc网络中一种简单有效的虫洞攻击检测与避免机制
2012 International Conference on Computing Sciences Pub Date : 2012-09-14 DOI: 10.1109/ICCS.2012.4
V. Raju, K. V. Kumar
{"title":"A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in Mobile Ad Hoc Networks","authors":"V. Raju, K. V. Kumar","doi":"10.1109/ICCS.2012.4","DOIUrl":"https://doi.org/10.1109/ICCS.2012.4","url":null,"abstract":"Mobile ad hoc networks are vulnerable to many kinds of attacks since they have unique characteristics like limited bandwidth, limited battery power and dynamic network topology. Among the various attacks possible in mobile ad hoc networks wormhole attack is one which is treated as a very severe attack. In this attack a malicious node records packets at one location in the network and tunnels them to another malicious node which is present in the other end of the network. In this paper, we have proposed an algorithm which detects and avoids the wormhole attack in the routing phase itself. Our mechanism is based on the total round trip time (RTT) of the established route and the average round trip times of the sender one hop neighbors, which is considered as maximum one hop round trip time. Our solution works for both mobile ad hoc networks and wireless ad hoc networks.","PeriodicalId":429916,"journal":{"name":"2012 International Conference on Computing Sciences","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114647946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
High Performance Computing into Cloud Computing Services 云计算服务中的高性能计算
2012 International Conference on Computing Sciences Pub Date : 2012-09-14 DOI: 10.1109/ICCS.2012.39
A. Batra, A. Kumar
{"title":"High Performance Computing into Cloud Computing Services","authors":"A. Batra, A. Kumar","doi":"10.1109/ICCS.2012.39","DOIUrl":"https://doi.org/10.1109/ICCS.2012.39","url":null,"abstract":"High-Performance Computing (HPC) projects span a spectrum of computer hardware implementations ranging from peta-flop supercomputers, high-end tera-flop facilities running a variety of operating systems and applications, to mid-range and smaller computational clusters used for HPC application development, pilot runs and prototype staging clusters. What they all have in common is that they operate as a stand-alone system rather than a scalable and shared user reconfigurable resource. The advent of cloud computing has changed the traditional HPC implementation. In this article, we will discuss a very successful production level architecture and policy framework for supporting HPC services within a more general cloud computing infrastructure. This integrated environment, called Virtual Computing Lab (VCL), has been operating at NC State since fall 2004. Nearly 8,500,000 HPC CPU-Hrs were delivered by this environment to NC State faculty and students during 2009. In addition, we present and discuss operational data that show that integration of HPC and non-HPC (or general VCL) services in a cloud can substantially reduce the cost of delivering cloud services (down to cents per CPU hour).","PeriodicalId":429916,"journal":{"name":"2012 International Conference on Computing Sciences","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126522233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Complexity Analysis of Image-Based CAPTCHA 基于图像的验证码复杂度分析
2012 International Conference on Computing Sciences Pub Date : 2012-09-14 DOI: 10.1109/ICCS.2012.20
R. Manna, R. Saha, G. Geetha
{"title":"Complexity Analysis of Image-Based CAPTCHA","authors":"R. Manna, R. Saha, G. Geetha","doi":"10.1109/ICCS.2012.20","DOIUrl":"https://doi.org/10.1109/ICCS.2012.20","url":null,"abstract":"In the field of information security, CAPTCHA technology is a recent successful achievement. Apart from using different text CAPTCHAs, image-based CAPTCHAs are also in existence. Though text based CAPTCHAs are in regular usage in internet services, the vulnerability in text CAPTCHAs has compiled us to move on to the image based CAPTCHAs. Therefore before implementing image based CAPTCHAs publicly, it is necessary to analyze the different complexity issues related to image based CAPTCHAs. In this paper we have presented the analyzed results based on the complexity issues including both space and time. The analysis is done on the data collected with the help of gamification of image based CAPTCHAs called CAPTCHINO.","PeriodicalId":429916,"journal":{"name":"2012 International Conference on Computing Sciences","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123475755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and Fabrication of Dual-Band Coplanar Antenna Using EBG Structures 基于EBG结构的双频共面天线的设计与制造
2012 International Conference on Computing Sciences Pub Date : 2012-09-14 DOI: 10.1109/ICCS.2012.23
S. Tarigonda, B. Bharath
{"title":"Design and Fabrication of Dual-Band Coplanar Antenna Using EBG Structures","authors":"S. Tarigonda, B. Bharath","doi":"10.1109/ICCS.2012.23","DOIUrl":"https://doi.org/10.1109/ICCS.2012.23","url":null,"abstract":"Modified design of dual band co-planar antenna with EBG structures is being presented in this paper. This is wearable type antenna which can be easily sewn and worn on general garments. This is designed to operate at 2.45 and 5.5 GHz frequency bands. The overall design of antenna and EBG is described in this paper. Different parameters are studied with EBG structures. Good responses were observed.","PeriodicalId":429916,"journal":{"name":"2012 International Conference on Computing Sciences","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131827663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reducing Web Page Post Backs through jQuery Ajax Call in a Trust Based Framework 在基于信任的框架中通过jQuery Ajax调用减少网页回发
2012 International Conference on Computing Sciences Pub Date : 2012-09-14 DOI: 10.1109/ICCS.2012.81
R. Dhand
{"title":"Reducing Web Page Post Backs through jQuery Ajax Call in a Trust Based Framework","authors":"R. Dhand","doi":"10.1109/ICCS.2012.81","DOIUrl":"https://doi.org/10.1109/ICCS.2012.81","url":null,"abstract":"The world is moving towards Web. People are more connected now. Web Services are acting the core component for Web 2.0 and related technologies. jQuery is the new industry standard that has redefined ways of client side programming. Programmers writing multiple lines of code in JavaScript, now can really unleash the power of jQuery with few lines of code. Also they can make use of Ajax calls and JSON support in invoking of web services. jQuery is now acting as an industry standard as big top IT companies are supporting jQuery in their product(s). jQuery also helps in removing biggest problem of multiple page post backs through client side scripting. Through this any web developer can use the Ajax based update of the page which can partially update the page asynchronously without any post back. This will help in reducing the number of calls to the server and ultimately improving the bandwidth.","PeriodicalId":429916,"journal":{"name":"2012 International Conference on Computing Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130397158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信