{"title":"Identity Mapping using Cluster-based Certificate technique for Vehicular Ad-Hoc Networks","authors":"M. Naresh, K. Srinija, N. Varsha, M. Kalpana","doi":"10.1109/ICCS45141.2019.9065402","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065402","url":null,"abstract":"In this paper, we introduced a secure authentication technique for VANETs called Identity-Mapping using cluster-based revocation technique. In this technique, all the nodes are split into various clusters and Cluster Head is selected accordingly. The certificate authority is responsible for retracting and issuing certificates, upon the successful transmission of messages or identification of any harmful activities by any node, to the corresponding vehicles. From the simulations and comparative analysis provided in this paper, it is verified that the recommended method shows better performance when compared with the existing works.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121628187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authenticating Cryptography over Network in Data","authors":"Priyanka Agarwal, Sloni Mittal, Ankita Tiwari, Ishu Gupta, Ashutosh Kumar Singh, Bharti Sharma","doi":"10.1109/ICCS45141.2019.9065608","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065608","url":null,"abstract":"The instantaneous growth for the world being digital is- \"Expeditious growth of a network system and high-speed internet\". This leads to both ease as well as security threats to the users. Network security issues can broadly be classified into two main categories: System security and Data security. The system security issue protects the system from unwanted attacks by malicious threats. Data security is protecting the leakage or modification of data from the unauthorized party in the network. The main goal and sole purpose of the network security are to achieve Authenticity, Integrity, Availability, and Confidentiality in the wireless network. This paper mainly instigates with all the network security issues and classify various encryption technologies, tools, and keys used in the network for ensuring Confidentiality and Integrity over the network.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121882041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Self-Driving Car Implementation using Computer Vision for Detection and Navigation","authors":"Bhaskar Barua, Clarence Gomes, Shubham Baghe, Jignesh Sisodia","doi":"10.1109/ICCS45141.2019.9065627","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065627","url":null,"abstract":"In recent years, lidar has been used as primary sensors for self-driving cars, however, due to their high expense, it becomes infeasible for mass production. Hence, we present the working of a self-driving car prototype that relies upon a cheaper alternative, viz. cameras. The primary objective of our prototype is to navigate safely, quickly, efficiently and comfortably through our virtual environment using computer vision. We have performed detection of lanes, traffic cars, obstacles, signals, etc. and have used the concept of stereo vision for depth calculation. Trajectory planning and steering control have also been implemented. Experimental results show that camera-based self-driving cars are viable and thus our paper can provide a foundation for all future real-world implementations.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICCS 2019 Author Index","authors":"","doi":"10.1109/iccs45141.2019.9065392","DOIUrl":"https://doi.org/10.1109/iccs45141.2019.9065392","url":null,"abstract":"","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124759377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weighted product Taxonomy for Mobile-Commerce site in Recommendation of Product based on Heuristic Approach","authors":"Shanti Verma, Kalyani Patel","doi":"10.1109/ICCS45141.2019.9065437","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065437","url":null,"abstract":"As we know number of smart phone users grows rapidly and Indian government survey said that there are 10+ billion smart phone users by 2020. We know that in metro cities people does not have time to purchase products of their daily needs. For this reason Online shopping using mobile phone is now in trend and survey also says that number of online shopping users grows exponentially. There are various types of factor plays important role in recommendation of product to customer. Product taxonomy, Customer behavioral and navigational factor are among them which are analyzed in this paper. Importance of weighted product taxonomy in fast recommendation of product is highlighted in this paper by authors. Authors proposed a greedy heuristic algorithm to search product in weighted product taxonomy. To proof the efficiency of proposed algorithm they use one tail independent sample‘t’ test with 5% level of significance and found that results are significant.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Merlin. V. Kunju, Esther Dainel, Heron Celestie Anthony, Sonali Bhelwa
{"title":"Evaluation of Phishing Techniques Based on Machine Learning","authors":"Merlin. V. Kunju, Esther Dainel, Heron Celestie Anthony, Sonali Bhelwa","doi":"10.1109/ICCS45141.2019.9065639","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065639","url":null,"abstract":"Phishing sites is the major problems for online security challenges because of large number of online transactions is done every day. The objective of the paper is to do survey about the phishing: A social attack and its detection and to make aware of the users who doesn’t know about this major attack as many of them are still falling in the trap. Most of the users are unaware about this problem; they unknowingly fill many forms that belong to phishing website which are hidden. This leads to the leaking of sensitive information of the victim. This study also gives brief knowledge about several machine learning techniques such as kNN Algorithm, Naïve Bayes, Decision Tree, Support Vector Machines, Neural Network and Random Forest algorithm for predicting phishing sites.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123231736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vaibhav S. Guntuk, Umesh V. Bakle, Vishal S. Lahare, Akash R. Bochare, Mohan P. Thakre
{"title":"A Novel 4-level Converter for Switched Reluctance Motor Drive in Plug-In HEVs","authors":"Vaibhav S. Guntuk, Umesh V. Bakle, Vishal S. Lahare, Akash R. Bochare, Mohan P. Thakre","doi":"10.1109/ICCS45141.2019.9065527","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065527","url":null,"abstract":"Switched Reluctance Motor (SRM) due to its advanced application, it is the best suited candidate for the propulsion system of the electric vehicles and hybrid vehicles. It can be used in any severe operating condition, is compact in design and is able to produce required torque and speed. Asymmetric bridge converter (i.e. two transistors per phase) is commonly used for SRM drives. The biggest disadvantage of using this type of converter is higher torque ripple in the motor output. In this paper, a 4-level converter is proposed for Switched Reluctance Motor in Plug-in HEV. The proposed converter (i.e. 4-level converter) has four current controlling modes that are able to produce additional 2 voltage levels. The high demagnetizing voltage developed by the converter can be used to decrease the demagnetization period which can minimize the torque ripples. The different modes of operation of the proposed 4-level converter are also described. The results of this 4 level converter are compared with commonly used 2 level converter in MatLab simulink.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126486321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison on Hyper ledger Fabric and Hyper ledger Composer of Block Chain Technology","authors":"M. M S, V. Haritha, Swetha M S, Thungamani M","doi":"10.1109/ICCS45141.2019.9065776","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065776","url":null,"abstract":"The innovation that has had the best effect on our ways of life in the course of the most recent decade is Blockchain. The key feature of blockchain is the secure storage of data in encrypted block chains that have a distributed database that processes a growing list of transactions. This makes the blockchain incredibly impervious to unapproved changes to put away information. In this paper, the study to get a brief idea about the platforms of blockchain and explore what exactly is Hyperledger Fabric and also understand the steps of working with Hyperledger fabric and Hyperledger Composer. While hyperledger composer is a set of tools, APIs for modeling, building and distributing a blockchain corporate network. The Hyperledger fabric is an implementation of the blockchain framework for developing solutions with a modular architecture. The composer runs on hyperledger fabric. It is a framework to accelerate the development of applications based on Hyperledger Fabric.To create a Simple Commodity Blockchain with Hyperledger Composer.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130595070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart and Reliable Transportation System based on Message Queuing Telemetry Transport Protocol","authors":"M. Swarnamugi, Dr.Chinnaiyan R","doi":"10.1109/ICCS45141.2019.9065789","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065789","url":null,"abstract":"With the advancement of IoT, the traditional transportation system be wrap up with intelligence to provide smart and quick services to user and be better informed on road safety and make safer and coordinated transportation medium. This intelligent transportation system ITS uses wired and wireless connectivity to communicate among objects connected. Whatever the application usage of ITS is, it’s development require more reliable and invulnerable communication among the objects connected and have to be free from connectivity problems like service outrages, signal loss, bandwidth issues, problems of high latency and loss of data communication. Considering all this, this paper addresses the use of MQTT, a light weight messaging protocol in the message transfer of ITS application. The effectiveness of MQTT in ITS is illustrated by discussing different use case scenarios.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121091906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CNN based Traffic Sign Classification using Adam Optimizer","authors":"S. Mehta, C. Paunwala, Bhaumik Vaidya","doi":"10.1109/ICCS45141.2019.9065537","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065537","url":null,"abstract":"An automatic detection and classification of traffic signs is an important task in Advanced Driver Assistance System (ADAS).Convolutional Neural Network (CNN) has surpassed the human performance and shown the great success in detection and classification of traffic signs. The paper proposes an approach based on the deep convolutional network for classifying traffic signs. The Belgium traffic sign dataset (BTSD) is used for evaluation and experiment results shows that the proposed method can achieve competitive results compared with state of the art approaches. Different activations and optimizers are used to evaluate the performance of proposed architecture and it is observed that Adam (Adaptive Moment Estimation) optimizer and softmax activation performs well.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130302264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}