2017 International Conference on Computing, Communication and Automation (ICCCA)最新文献

筛选
英文 中文
A framework for assessing the evolvability characteristics along with sub-characteristics in AOSQ model using fuzzy logic tool 利用模糊逻辑工具对AOSQ模型的演化特征及其子特征进行评估
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229839
Pankaj Kumar, S. K. Singh
{"title":"A framework for assessing the evolvability characteristics along with sub-characteristics in AOSQ model using fuzzy logic tool","authors":"Pankaj Kumar, S. K. Singh","doi":"10.1109/CCAA.2017.8229839","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229839","url":null,"abstract":"Over the past few decades, IT industry has faced the difficulties of evolving their software systems in order to live on the market and to compete with similar software systems. For software systems to live on market, they should derived new additional design requirements and concert themselves to the new evolving environment. Evolvability is most crucial and essential attribute to evaluate the software development. Due to gradual development of system, the AOP-based software moves closer to researcher and practitioner. It is sufficient straightforward to reuse the system than developing the new system. Evolvability reduces the different factors like development cost, time (i.e. installation and access), maintenance and effort of software system. This paper explores a framework to assess and verification of evolvability in AOSQ model using fuzzy logic toolbox. All the values of evolvability and its related characteristics are calculated by analytic hierarchy process (AHP) tool.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"28 1","pages":"339-344"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83380757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Integration of network intrusion detection systems and honeypot networks for cloud security 融合网络入侵检测系统和蜜罐网络,实现云安全
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229911
Varan Mahajan, S. K. Peddoju
{"title":"Integration of network intrusion detection systems and honeypot networks for cloud security","authors":"Varan Mahajan, S. K. Peddoju","doi":"10.1109/CCAA.2017.8229911","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229911","url":null,"abstract":"With an aim of provisioning fast, reliable and low cost services to the users, the cloud-computing technology has progressed leaps and bounds. But, adjacent to its development is ever increasing ability of malicious users to compromise its security from outside as well as inside. The Network Intrusion Detection System (NIDS) techniques has gone a long way in detection of known and unknown attacks. The methods of detection of intrusion and deployment of NIDS in cloud environment are dependent on the type of services being rendered by the cloud. It is also important that the cloud administrator is able to determine the malicious intensions of the attackers and various methods of attack. In this paper, we carry out the integration of NIDS module and Honeypot Networks in Cloud environment with objective to mitigate the known and unknown attacks. We also propose method to generate and update signatures from information derived from the proposed integrated model. Using sandboxing environment, we perform dynamic malware analysis of binaries to derive conclusive evidence of malicious attacks.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"23 1","pages":"829-834"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78631301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
DEDUP: Deduplication system for encrypted data in cloud DEDUP:用于云中加密数据的重复数据删除系统
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229904
Himshai Kamboj, Bharati Sinha
{"title":"DEDUP: Deduplication system for encrypted data in cloud","authors":"Himshai Kamboj, Bharati Sinha","doi":"10.1109/CCAA.2017.8229904","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229904","url":null,"abstract":"Cloud computing facilitates different cloud services in which the most popular one is cloud storage. For maintaining the privacy and security of data, the data holders often store their data in encrypted form. Further the encrypted data introduce new problems for deduplication while processing such a crucial big data. The present schemes of data deduplictaion in encrypted form lacks in security. Most schemes do not support access on data thus creating a big challenge of ownership on data being stored on cloud. In this paper, we have proposed a DeDup App which is easy to use application interface based on challenge of ownership and re-encryption. The efficiency of our scheme is a result of the computer simulation and analysis performed.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"101 1","pages":"795-800"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72906857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy tuned PID controller for power system stability 电力系统稳定的模糊整定PID控制器
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230056
Zubair Iqbal, Shoeb Hussain, M. A. Bazaz
{"title":"Fuzzy tuned PID controller for power system stability","authors":"Zubair Iqbal, Shoeb Hussain, M. A. Bazaz","doi":"10.1109/CCAA.2017.8230056","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230056","url":null,"abstract":"This paper introduces a hybrid fuzzy based PID controller to improve the performance of power system stabilization. The inadequately damped electromechanical motions in power frameworks has been an issue to power engineers for quite a while. This restrains the ability of transfer of power in transmission lines and further incites worry in the mechanical shaft of machine. Owing to large scale interconnections and structured complexity of power systems, some disturbances arise which result in poorly damped low-frequency oscillations that don't damp out with time and at some occasions system is shaken out of equilibrium. The dynamics of this framework is additionally influenced by these oscillations at low frequency. The oscillations can be reduced and in turn the stability can be increased by proper design of controllers. The oscillations can be diminished and thus the solidness can be expanded by appropriate outline of controllers. The essential element of the proposed approach is plan of a fuzzy based PID controller (FPID) that uses a rearranged configuration. FPID controller, which exploits the properties of fuzzy PI and PD controllers, is proposed. This approach doesn't require exact learning of plant's characteristics for execution of the controller. The performance when compared with the conventional controllers, the results of fuzzy controller are quite encouraging and satisfactory.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"13 1","pages":"1379-1384"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85994937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power efficient voltage controlled oscillator design in 180nm CMOS technology 180nm CMOS技术的高效电压控制振荡器设计
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230032
Prachi Gupta, Manoj Kumar
{"title":"Power efficient voltage controlled oscillator design in 180nm CMOS technology","authors":"Prachi Gupta, Manoj Kumar","doi":"10.1109/CCAA.2017.8230032","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230032","url":null,"abstract":"In this paper, four different single ended delay cells based ring oscillators have been presented. Output frequencies of ring oscillators have been controlled by varying the supply voltage 1.4V to 3.0V. The active load concept has been used in proposed circuits. First design shows frequency variation in the range [4.50–1.40] GHz with phase noise −87.79dBc/Hz @1MHz in saturated load. Second design shows frequency variation of [6.26–2.85] GHz with pseudo-NMOS logic. Third design shows frequency variation in the range [4.54–0.77] GHz with phase noise −85.38dBc/Hz @1MHz and tuning range of 141.8% in unsaturated load. Fourth design shows frequency variation of [2.66–2.38] GHz with linear load. Simulations have been performed using SPICE based on 180nm CMOS technology at 1.8V. The proposed designs of 3-Stage, 5-Stage, 7-Stage have been compared with previous work for frequency and power consumption, phase noise, tuning range. Proposed methods show the improvement with low power consumption, low phase noise and wide tuning range.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"14 1","pages":"1470-1476"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85158633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IoT based smart health care system using CNT electrodes (for continuous ECG monitoring) 使用碳纳米管电极的基于物联网的智能医疗系统(用于连续心电监测)
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230002
Malti Bansal, Bani Gandhi
{"title":"IoT based smart health care system using CNT electrodes (for continuous ECG monitoring)","authors":"Malti Bansal, Bani Gandhi","doi":"10.1109/CCAA.2017.8230002","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230002","url":null,"abstract":"As the world population is growing at a rapid pace, the demand for better health care facilities is increasing steadily. It has been observed that many health problems are unpredictable; especially heart diseases; hence it is important to monitor heart continuously. Earlier it was not always possible to monitor the patient continuously and for longer durations, but thanks to the latest developments in the domain of Information and Communications Technology (ICT), that facilitate the acquirement, transmission, interpretation and reception of various bio-signals, from permanent or mobile sites. The developments in the sphere of sensing technologies, wireless communication, embedded systems, nano-electronics, etc make it feasible to build intelligent systems to monitor bio-signals especially heart signals (ECG) of the patient; and further with the help of necessary protocols, the information can be promptly sent to the doctor, hospitals, etc. Thanks to the concept of Internet-of-Things (IoT), which provides necessary help in emergency situations. Nanomaterials are now being used in a big way because of their several advantages over the conventional materials. So, getting together the concept of IoT and nanomaterials will restructure the field of health-care, promising economic, technological and social benefits.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"12 1","pages":"1324-1329"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82082334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Data security using authenticated encryption and decryption algorithm for Android phones 数据安全使用认证的加密和解密算法的Android手机
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229903
A. Vichare, T. Jose, Jagruti Tiwari, U. Yadav
{"title":"Data security using authenticated encryption and decryption algorithm for Android phones","authors":"A. Vichare, T. Jose, Jagruti Tiwari, U. Yadav","doi":"10.1109/CCAA.2017.8229903","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229903","url":null,"abstract":"With the growing number of mobile applications, secure storage of information is essential. A strong encryption system is required to protect the data stored in android phones at a maximum level. Traditional encryption schemes have the disadvantage that communication overheads and the computation costs are too high. And also there is a possibility that the data is lost after encryption. Hence, it is necessary to implement a “Data Encryption and Decryption” scheme with “Cloud Backup” feature which is more efficient in order to provide high level of data security for android phones. It is necessary to create means which will enable a user to encrypt confidential data present in the mobile phones. Decrypt it to recover the encrypted data. In case of brute force attack, user need not worry about losing the data as “Automatic encryption” is triggered. “Cloud Backup” is another mechanism to prevent the data from being known by an adversary. This paper proposes an Android Application which will provide the features of automatic encryption, data encryption/decryption, and cloud backup all in one single mobile application. AES −256 bit algorithm is used for this purpose. The sole purpose of using AES for encryption/decryption is that it is secure and has high computational complexity. Due to this the intruder will require comparatively more time to decrypt the data.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"31 1","pages":"789-794"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81729432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Ant colony optimization routing in mobile adhoc networks — A survey paper 移动自组网中的蚁群优化路由研究
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229858
Mohd. Sharique Khan, Vishnu Sharma
{"title":"Ant colony optimization routing in mobile adhoc networks — A survey paper","authors":"Mohd. Sharique Khan, Vishnu Sharma","doi":"10.1109/CCAA.2017.8229858","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229858","url":null,"abstract":"This survey paper basically going to represent AODV algorithm to examined or explained ant colony optimization (ACO) in mobile AdHoc networks (MANETs). Here, in network routing we widely used two optimization techniques i.e. ACO and a swarm intelligence based optimization techniques. On-demand routing protocol is very highly potential, adaptive and scalable. These ant colony optimization and swarm intelligence based techniques will use to design the result of swarm ability to engineering and mathematical errors. These types of networks are soft or flexible, these networks will not require any kind of existing central administration or infrastructure or base. Therefore, mobile ad-hoc networks are those type of network which is consist completely of infrastructure less nodes, which is work concurrently in an AdHoc way (i.e., in an air and on fly) and also suitable or appropriate for temporary communication links. The major aim in the designing of these protocols was to decrease the overhead for routing. Mobile ad-hoc networks are a set of mobile nodes which always communicate in the air or fly over radio waves.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"12 1","pages":"529-533"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81806217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Student academic performance and social behavior predictor using data mining techniques 利用数据挖掘技术预测学生学习成绩和社会行为
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229794
Suhas Athani, Sharath A Kodli, Mayur N Banavasi, P. Hiremath
{"title":"Student academic performance and social behavior predictor using data mining techniques","authors":"Suhas Athani, Sharath A Kodli, Mayur N Banavasi, P. Hiremath","doi":"10.1109/CCAA.2017.8229794","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229794","url":null,"abstract":"Education can be utilized as a tool to face many problems, overcome many hurdles in life. The knowledge obtained from education helps to enhance opportunities in one's employment development. To extract useful information from the knowledge obtained, Educational Data Mining is widely used. Educational data mining provides the process of applying different data mining tools and techniques to analyze and visualize the data of an institution (school) and can be used to discover a unique pattern of students' academic performance and behavior. The present work intends to enhance students' academic performance in secondary school using data mining techniques. Real data was collected using school reports and questionnaire method by the Portugal school which has been used in this paper. Naive Bayesian algorithm can be easily implemented to predict the students' academic performance and behavior. Classification of students into two classes, pass and fail, involves training phase and testing phase. In training phase, Naive Bayes classifier is built and in the testing phase, Naive Bayes classifier is used to make the prediction. The accuracy of the classifier is calculated using WEKA tool in which confusion matrix is generated. The accuracy of the classifier obtained is 87% which can be further improved by the selection of appropriate attributes. Developing the classification algorithms in this way helps to obtain a more efficient student performance predictor tool using other data mining algorithms and it also helps to improve the quality of education in an educational institution.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"32 1","pages":"170-174"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84401547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Sentiment analysis: Approaches and open issues 情感分析:方法和开放的问题
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229791
Shahnawaz, Parmanand Astya
{"title":"Sentiment analysis: Approaches and open issues","authors":"Shahnawaz, Parmanand Astya","doi":"10.1109/CCAA.2017.8229791","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229791","url":null,"abstract":"Sentiment Analysis is the process which helps to identify and classifying the opinions or feelings expressed in opinioned data, in order to ascertain whether the attitude of the writer towards a particular service, product etc. is negative, positive or neutral. Sentiment analysis also helps the consumers to identify if the information in the neighborhood of the product or service is satisfactory or not before the customers buy it. The interest of the scientific communities and business world is increasing day by day to gather, process and extract the knowledge from the public opinions available on different types of social media. The main problems that exist in the current techniques are: inability to perform well in different domains, inadequate accuracy and performance in sentiment analysis based on insufficient labeled data, incapability to deal with complex sentences that require more than sentiment words and simple analyzing. This article discusses the different approaches for sentiment analysis and open problems and issues present in performing sentiment analysis.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"17 1","pages":"154-158"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84419169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信