{"title":"A framework for assessing the evolvability characteristics along with sub-characteristics in AOSQ model using fuzzy logic tool","authors":"Pankaj Kumar, S. K. Singh","doi":"10.1109/CCAA.2017.8229839","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229839","url":null,"abstract":"Over the past few decades, IT industry has faced the difficulties of evolving their software systems in order to live on the market and to compete with similar software systems. For software systems to live on market, they should derived new additional design requirements and concert themselves to the new evolving environment. Evolvability is most crucial and essential attribute to evaluate the software development. Due to gradual development of system, the AOP-based software moves closer to researcher and practitioner. It is sufficient straightforward to reuse the system than developing the new system. Evolvability reduces the different factors like development cost, time (i.e. installation and access), maintenance and effort of software system. This paper explores a framework to assess and verification of evolvability in AOSQ model using fuzzy logic toolbox. All the values of evolvability and its related characteristics are calculated by analytic hierarchy process (AHP) tool.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"28 1","pages":"339-344"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83380757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of network intrusion detection systems and honeypot networks for cloud security","authors":"Varan Mahajan, S. K. Peddoju","doi":"10.1109/CCAA.2017.8229911","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229911","url":null,"abstract":"With an aim of provisioning fast, reliable and low cost services to the users, the cloud-computing technology has progressed leaps and bounds. But, adjacent to its development is ever increasing ability of malicious users to compromise its security from outside as well as inside. The Network Intrusion Detection System (NIDS) techniques has gone a long way in detection of known and unknown attacks. The methods of detection of intrusion and deployment of NIDS in cloud environment are dependent on the type of services being rendered by the cloud. It is also important that the cloud administrator is able to determine the malicious intensions of the attackers and various methods of attack. In this paper, we carry out the integration of NIDS module and Honeypot Networks in Cloud environment with objective to mitigate the known and unknown attacks. We also propose method to generate and update signatures from information derived from the proposed integrated model. Using sandboxing environment, we perform dynamic malware analysis of binaries to derive conclusive evidence of malicious attacks.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"23 1","pages":"829-834"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78631301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DEDUP: Deduplication system for encrypted data in cloud","authors":"Himshai Kamboj, Bharati Sinha","doi":"10.1109/CCAA.2017.8229904","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229904","url":null,"abstract":"Cloud computing facilitates different cloud services in which the most popular one is cloud storage. For maintaining the privacy and security of data, the data holders often store their data in encrypted form. Further the encrypted data introduce new problems for deduplication while processing such a crucial big data. The present schemes of data deduplictaion in encrypted form lacks in security. Most schemes do not support access on data thus creating a big challenge of ownership on data being stored on cloud. In this paper, we have proposed a DeDup App which is easy to use application interface based on challenge of ownership and re-encryption. The efficiency of our scheme is a result of the computer simulation and analysis performed.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"101 1","pages":"795-800"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72906857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy tuned PID controller for power system stability","authors":"Zubair Iqbal, Shoeb Hussain, M. A. Bazaz","doi":"10.1109/CCAA.2017.8230056","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230056","url":null,"abstract":"This paper introduces a hybrid fuzzy based PID controller to improve the performance of power system stabilization. The inadequately damped electromechanical motions in power frameworks has been an issue to power engineers for quite a while. This restrains the ability of transfer of power in transmission lines and further incites worry in the mechanical shaft of machine. Owing to large scale interconnections and structured complexity of power systems, some disturbances arise which result in poorly damped low-frequency oscillations that don't damp out with time and at some occasions system is shaken out of equilibrium. The dynamics of this framework is additionally influenced by these oscillations at low frequency. The oscillations can be reduced and in turn the stability can be increased by proper design of controllers. The oscillations can be diminished and thus the solidness can be expanded by appropriate outline of controllers. The essential element of the proposed approach is plan of a fuzzy based PID controller (FPID) that uses a rearranged configuration. FPID controller, which exploits the properties of fuzzy PI and PD controllers, is proposed. This approach doesn't require exact learning of plant's characteristics for execution of the controller. The performance when compared with the conventional controllers, the results of fuzzy controller are quite encouraging and satisfactory.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"13 1","pages":"1379-1384"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85994937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power efficient voltage controlled oscillator design in 180nm CMOS technology","authors":"Prachi Gupta, Manoj Kumar","doi":"10.1109/CCAA.2017.8230032","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230032","url":null,"abstract":"In this paper, four different single ended delay cells based ring oscillators have been presented. Output frequencies of ring oscillators have been controlled by varying the supply voltage 1.4V to 3.0V. The active load concept has been used in proposed circuits. First design shows frequency variation in the range [4.50–1.40] GHz with phase noise −87.79dBc/Hz @1MHz in saturated load. Second design shows frequency variation of [6.26–2.85] GHz with pseudo-NMOS logic. Third design shows frequency variation in the range [4.54–0.77] GHz with phase noise −85.38dBc/Hz @1MHz and tuning range of 141.8% in unsaturated load. Fourth design shows frequency variation of [2.66–2.38] GHz with linear load. Simulations have been performed using SPICE based on 180nm CMOS technology at 1.8V. The proposed designs of 3-Stage, 5-Stage, 7-Stage have been compared with previous work for frequency and power consumption, phase noise, tuning range. Proposed methods show the improvement with low power consumption, low phase noise and wide tuning range.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"14 1","pages":"1470-1476"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85158633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT based smart health care system using CNT electrodes (for continuous ECG monitoring)","authors":"Malti Bansal, Bani Gandhi","doi":"10.1109/CCAA.2017.8230002","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230002","url":null,"abstract":"As the world population is growing at a rapid pace, the demand for better health care facilities is increasing steadily. It has been observed that many health problems are unpredictable; especially heart diseases; hence it is important to monitor heart continuously. Earlier it was not always possible to monitor the patient continuously and for longer durations, but thanks to the latest developments in the domain of Information and Communications Technology (ICT), that facilitate the acquirement, transmission, interpretation and reception of various bio-signals, from permanent or mobile sites. The developments in the sphere of sensing technologies, wireless communication, embedded systems, nano-electronics, etc make it feasible to build intelligent systems to monitor bio-signals especially heart signals (ECG) of the patient; and further with the help of necessary protocols, the information can be promptly sent to the doctor, hospitals, etc. Thanks to the concept of Internet-of-Things (IoT), which provides necessary help in emergency situations. Nanomaterials are now being used in a big way because of their several advantages over the conventional materials. So, getting together the concept of IoT and nanomaterials will restructure the field of health-care, promising economic, technological and social benefits.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"12 1","pages":"1324-1329"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82082334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data security using authenticated encryption and decryption algorithm for Android phones","authors":"A. Vichare, T. Jose, Jagruti Tiwari, U. Yadav","doi":"10.1109/CCAA.2017.8229903","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229903","url":null,"abstract":"With the growing number of mobile applications, secure storage of information is essential. A strong encryption system is required to protect the data stored in android phones at a maximum level. Traditional encryption schemes have the disadvantage that communication overheads and the computation costs are too high. And also there is a possibility that the data is lost after encryption. Hence, it is necessary to implement a “Data Encryption and Decryption” scheme with “Cloud Backup” feature which is more efficient in order to provide high level of data security for android phones. It is necessary to create means which will enable a user to encrypt confidential data present in the mobile phones. Decrypt it to recover the encrypted data. In case of brute force attack, user need not worry about losing the data as “Automatic encryption” is triggered. “Cloud Backup” is another mechanism to prevent the data from being known by an adversary. This paper proposes an Android Application which will provide the features of automatic encryption, data encryption/decryption, and cloud backup all in one single mobile application. AES −256 bit algorithm is used for this purpose. The sole purpose of using AES for encryption/decryption is that it is secure and has high computational complexity. Due to this the intruder will require comparatively more time to decrypt the data.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"31 1","pages":"789-794"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81729432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ant colony optimization routing in mobile adhoc networks — A survey paper","authors":"Mohd. Sharique Khan, Vishnu Sharma","doi":"10.1109/CCAA.2017.8229858","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229858","url":null,"abstract":"This survey paper basically going to represent AODV algorithm to examined or explained ant colony optimization (ACO) in mobile AdHoc networks (MANETs). Here, in network routing we widely used two optimization techniques i.e. ACO and a swarm intelligence based optimization techniques. On-demand routing protocol is very highly potential, adaptive and scalable. These ant colony optimization and swarm intelligence based techniques will use to design the result of swarm ability to engineering and mathematical errors. These types of networks are soft or flexible, these networks will not require any kind of existing central administration or infrastructure or base. Therefore, mobile ad-hoc networks are those type of network which is consist completely of infrastructure less nodes, which is work concurrently in an AdHoc way (i.e., in an air and on fly) and also suitable or appropriate for temporary communication links. The major aim in the designing of these protocols was to decrease the overhead for routing. Mobile ad-hoc networks are a set of mobile nodes which always communicate in the air or fly over radio waves.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"12 1","pages":"529-533"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81806217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suhas Athani, Sharath A Kodli, Mayur N Banavasi, P. Hiremath
{"title":"Student academic performance and social behavior predictor using data mining techniques","authors":"Suhas Athani, Sharath A Kodli, Mayur N Banavasi, P. Hiremath","doi":"10.1109/CCAA.2017.8229794","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229794","url":null,"abstract":"Education can be utilized as a tool to face many problems, overcome many hurdles in life. The knowledge obtained from education helps to enhance opportunities in one's employment development. To extract useful information from the knowledge obtained, Educational Data Mining is widely used. Educational data mining provides the process of applying different data mining tools and techniques to analyze and visualize the data of an institution (school) and can be used to discover a unique pattern of students' academic performance and behavior. The present work intends to enhance students' academic performance in secondary school using data mining techniques. Real data was collected using school reports and questionnaire method by the Portugal school which has been used in this paper. Naive Bayesian algorithm can be easily implemented to predict the students' academic performance and behavior. Classification of students into two classes, pass and fail, involves training phase and testing phase. In training phase, Naive Bayes classifier is built and in the testing phase, Naive Bayes classifier is used to make the prediction. The accuracy of the classifier is calculated using WEKA tool in which confusion matrix is generated. The accuracy of the classifier obtained is 87% which can be further improved by the selection of appropriate attributes. Developing the classification algorithms in this way helps to obtain a more efficient student performance predictor tool using other data mining algorithms and it also helps to improve the quality of education in an educational institution.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"32 1","pages":"170-174"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84401547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment analysis: Approaches and open issues","authors":"Shahnawaz, Parmanand Astya","doi":"10.1109/CCAA.2017.8229791","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229791","url":null,"abstract":"Sentiment Analysis is the process which helps to identify and classifying the opinions or feelings expressed in opinioned data, in order to ascertain whether the attitude of the writer towards a particular service, product etc. is negative, positive or neutral. Sentiment analysis also helps the consumers to identify if the information in the neighborhood of the product or service is satisfactory or not before the customers buy it. The interest of the scientific communities and business world is increasing day by day to gather, process and extract the knowledge from the public opinions available on different types of social media. The main problems that exist in the current techniques are: inability to perform well in different domains, inadequate accuracy and performance in sentiment analysis based on insufficient labeled data, incapability to deal with complex sentences that require more than sentiment words and simple analyzing. This article discusses the different approaches for sentiment analysis and open problems and issues present in performing sentiment analysis.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"17 1","pages":"154-158"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84419169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}