2015 International Conference on Pervasive Computing (ICPC)最新文献

筛选
英文 中文
A review of issues and challenges in designing Iris recognition Systems for noisy imaging environment 综述了噪声环境下虹膜识别系统设计中存在的问题和挑战
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087003
K. Hajari, K. Bhoyar
{"title":"A review of issues and challenges in designing Iris recognition Systems for noisy imaging environment","authors":"K. Hajari, K. Bhoyar","doi":"10.1109/PERVASIVE.2015.7087003","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087003","url":null,"abstract":"Iris recognition is a challenging task in a noisy imaging environment. Nowadays researcher's primary focus is to develop reliable Iris recognition System that can work in noisy imaging environment and to increase the iris recognition rate on different iris database. But there are major issues involved in designing such systems like occlusion by eyelashes, eyelids, glass frames, off-angle imaging, presence of contact lenses, poor illumination, motion blur, close-up of iris image acquired at a large standoff distance and specular reflections etc. Because of these issues the quality of acquired iris image gets affected. The performance of the iris based recognition system will deteriorate abruptly, when the iris mask is not accurate. This results in lower recognition rate. In this review paper different challenges in designing iris recognition systems for noisy imaging environment are reviewed and methodologies involved in overcoming these issues are discussed. At the end, some measures to improve the accuracy of such systems are suggested.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124207471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Comparative study of routing protocols in Cognitive Radio Networks
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087073
Shriram K. Kulkarni, S. Markande
{"title":"Comparative study of routing protocols in Cognitive Radio Networks","authors":"Shriram K. Kulkarni, S. Markande","doi":"10.1109/PERVASIVE.2015.7087073","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087073","url":null,"abstract":"Cognitive Radio Networks (CRNs) have been receiving significant research attention due to their ability to address the problems related with the usage of `precious' spectrum. Majority of the research in the field of CRNs has been carried out at lower two layers of the protocol stack. Very recently people have started working at network and above layers. Due to the dynamic nature of the spectrum available in CRNs, design of routing protocols has been challenging. Our paper mainly focuses on routing in CRN and we also discuss the challenges and classification associated with it. Next, we provide an extensive survey on existing routing schemes in CRNs. Finally, various open challenges in relation with the routing in CRNs are discussed for researchers.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121400464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Design and implementation of smartphone authentication system based on Color-Code 基于色码的智能手机认证系统的设计与实现
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087038
Sanraj Rajendra Bandre
{"title":"Design and implementation of smartphone authentication system based on Color-Code","authors":"Sanraj Rajendra Bandre","doi":"10.1109/PERVASIVE.2015.7087038","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087038","url":null,"abstract":"Smartphones are used as a communication channel for exchanging user data and coordinating their business work. Users are more concerned about their private data that are stored on their portable devices, but unfortunately these devices are more prone to attacks by malicious users. The objective of this paper is to provide a new authentication system based on Color-Code such that it will preserve user's privacy and improve smartphone security. Every individual person has his own choice to select different colors. A color sequence can be a variety of unique color combinations and they are easy to remember. A user would specify desired Color-Code sequence as a passkey to authenticate user on the device. In order to fortify smartphone security from malicious users, this system uses random colors to increase difficulty of brute force attack. This system is based on multi-phase security schema which authenticates users and safeguards their privacy on a smartphone.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113972227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of AES algorithm on FPGA for low area consumption 低面积消耗AES算法在FPGA上的实现
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087102
Pritamkumar N. Khose, V. Raut
{"title":"Implementation of AES algorithm on FPGA for low area consumption","authors":"Pritamkumar N. Khose, V. Raut","doi":"10.1109/PERVASIVE.2015.7087102","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087102","url":null,"abstract":"An AES algorithm can be implemented in software or hardware but hardware implementation is more suitable for high speed applications in real time. AES is most secure security algorithm to maintain safety and reliability of data transmission. The main goal of paper is AES hardware implementation to achieve less area and low power consumption which maintain standard throughput of data, also to achieve high speed data processing and reduce time for key generating. AES hardware implementation can easily reset and immediately erase data on disk. The conventional Sbox combinational logic is replaced by BRAM which gives instantaneous output. The AES 128/196/256 is implements on a FPGA using HDL language with help of Xilinx ISE tool.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127750840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
An efficient dynamic resource allocation strategy for VM environment in cloud 一种高效的云环境下虚拟机动态资源分配策略
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087186
Mahesh B. Nagpure, Prashant Dahiwale, Punam Marbate
{"title":"An efficient dynamic resource allocation strategy for VM environment in cloud","authors":"Mahesh B. Nagpure, Prashant Dahiwale, Punam Marbate","doi":"10.1109/PERVASIVE.2015.7087186","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087186","url":null,"abstract":"Cloud computing becomes well liked among cloud users by contribution of various resources. This is on demand as it gives dynamic flexible resource allocation, for reliable service in pay as use manner to cloud service users. Cloud computing is not application oriented and this is a service oriented. In cloud computing, dynamic flexibility in resource allocation propose by virtualization technology. Virtualization technology provides server resources allocation dynamically based on the application request. In this paper, we proposed dynamic resource allocation system which allocated resources to cloud user. We used skewness which measure uneven utilization of multiple resources of each VMs and according skew value load balance across VMs. By minimizing skew value of each VM, we can easily combine different multiple resources and improve resource utilization of server. These proposed algorithms we prevent overload by effective load balancing and future load prediction and achieve optimize performance in terms of server resource utilization with minimum energy consumption.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131318915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Detection and classification of Eye Blink Artifact in electroencephalogram through Discrete Wavelet Transform and Neural Network 基于离散小波变换和神经网络的脑电图眨眼伪影检测与分类
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087077
M. Tibdewal, R. R. Fate, M. Mahadevappa, A. Ray
{"title":"Detection and classification of Eye Blink Artifact in electroencephalogram through Discrete Wavelet Transform and Neural Network","authors":"M. Tibdewal, R. R. Fate, M. Mahadevappa, A. Ray","doi":"10.1109/PERVASIVE.2015.7087077","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087077","url":null,"abstract":"Electroencephalography (EEG) is the recording of electrical activity along the scalp of human brain. EEG is most often used to diagnose brain disorders i.e. epilepsy, sleep disorder, coma, brain death etc. EEG signals are frequently contaminated by Eye Blink Artifacts generated due to the opening and closing of eye lids during EEG recording. To analyse signal of EEG for diagnosis it is necessary that the EEG recording should be artifact free. This paper is based on the work to detect the presence of artifact and its actual position with extent in EEG recording. For the purpose of classification of artifact or non-artifact activity Artificial Neural Network (ANN) is used and for detection of contaminated zone the Discrete Wavelet Transform with level 6 Haar is used. The part of zone detection is necessary for further appropriate removal of artifactual activities from EEG recording without losing the background activity. The results demonstrated from the ANN classifier are very much promising such as- Sensitivity 98.21 %, Specificity 87.50 %, and Accuracy 95.83 %.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131926606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Wearable sensors and patient monitoring system: A Review 可穿戴传感器与患者监护系统综述
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7086982
Shraddha Deshmukh, S. Shilaskar
{"title":"Wearable sensors and patient monitoring system: A Review","authors":"Shraddha Deshmukh, S. Shilaskar","doi":"10.1109/PERVASIVE.2015.7086982","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7086982","url":null,"abstract":"Nowadays wearable sensors are drawing attention in biomedical field. Main reason for that is a continuous development in sensor technologies. These developments are in the form of smart sensors, sensors build textile etc, and also it includes advances in the technologies such as microcontroller and wireless. Wearable sensors are used to do continuous monitoring of parameters which are very much important in cardiovascular diseases such as heart pulse, temperature, respiration rate, oxygen rate, body posture etc. Focus on such sensors is given in this paper.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132366567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Wireless ARM-Based Automatic Meter Reading & control system (WAMRCS) 基于arm的无线自动抄表控制系统
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087019
Amit Biranje, S. Lokhande
{"title":"Wireless ARM-Based Automatic Meter Reading & control system (WAMRCS)","authors":"Amit Biranje, S. Lokhande","doi":"10.1109/PERVASIVE.2015.7087019","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087019","url":null,"abstract":"In this paper we discuss about Wireless ARM Based Automatic Meter Reading with control system (WAMRCS). This System is used with 32 bit ARM microprocessor for reading power consumption & communicates this data to the utility server for power data processing. GPRS networks are used for communication with utility server in two - way communication link. Power data is used for various purposes such as bill management, for measurement of static power parameters etc. Control systems contains relay circuit, used for disconnection power supply when consumer fails to pay electricity bill in due time.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"2623 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128836165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Integrity checking privacy preserving approach to cloud using third party auditor 使用第三方审计师的云完整性检查隐私保护方法
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7087136
Sonali D. Thosar, N. Mhetre
{"title":"Integrity checking privacy preserving approach to cloud using third party auditor","authors":"Sonali D. Thosar, N. Mhetre","doi":"10.1109/PERVASIVE.2015.7087136","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087136","url":null,"abstract":"Cloud is a platform where user can store the data and enjoy services provided by cloud. User is free from burden of storage and maintenance. Data integrity verification is challenging task as user no longer possesses data locally. User should use the cloud data without worrying its integrity. So, to enable public auditability external party auditor called as third party auditor is used to check integrity of cloud data. Following are the two requirements which should be met 1) Third party auditor should verify cloud data without asking copy of data. 2) Auditing process should not bring any vulnerability towards user's data. Our system supports privacy preserving public auditability.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128891528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient analysis of lightweight Sybil attack detection scheme in Mobile Ad hoc Networks 移动自组网中轻量级Sybil攻击检测方案的高效分析
2015 International Conference on Pervasive Computing (ICPC) Pub Date : 2015-04-16 DOI: 10.1109/PERVASIVE.2015.7086988
Mohsin A. Mulla, S. Sambare
{"title":"Efficient analysis of lightweight Sybil attack detection scheme in Mobile Ad hoc Networks","authors":"Mohsin A. Mulla, S. Sambare","doi":"10.1109/PERVASIVE.2015.7086988","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7086988","url":null,"abstract":"Mobile Ad hoc Networks (MANETs) are vulnerable to different kinds of attacks like Sybil attack. In this paper we are aiming to present practical evaluation of efficient method for detecting lightweight Sybil Attack. In Sybil attack, network attacker disturbs the accuracy count by increasing its trust and decreasing others or takes off the identity of few mobile nodes in MANET. This kind of attack results into major information loss and hence misinterpretation in the network, it also minimizes the trustworthiness among mobile nodes, data routing disturbing with aim of dropping them in network etc. There are many methods previously presented by different researchers with aim of mitigating such attacks from MANET with their own advantage and disadvantages. In this research paper, we are introducing the study of efficient method of detecting the lightweight Sybil attack with aim of identifying the new identities of Sybil attackers and without using any additional resources such as trusted third party or any other hardware. The method which we are investigating in this paper is based on use of RSS (Received Signal Strength) to detect Sybil attacker. This method uses the RSS in order to differentiate between the legitimate and Sybil identities. The practical analysis of this work is done using Network Simulator (NS2) by measuring throughput, end to end delay, and packet delivery ratio under different network conditions.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124269826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信