{"title":"Risk for big data in the cloud","authors":"Nayan Chitransh, C. Mehrotra, A. Singh","doi":"10.1109/CCAA.2017.8229815","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229815","url":null,"abstract":"With a lot of technological advancements in recent years the data generation has increased as an outcome, large amount of data is being generated which is a major issue to the organization, as an example social media is flooding data each day, which is unmanageable. Here in this paper we would discuss the various risks and issues which are associated with big data. Big Data as itself describes the large volume of data, either structured or unstructured, in now a day's data came from so many sources that usual database systems are not able to handle that data so we need Big Data, but Big Data requires a huge assurance of hardware and processing resources which make Big Data costly. In order to provide Big Data services to every user we take help form Cloud computing which offer Big Data implementation cheaper. Cloud Computing is a technology which offers sharing of computing resources such as servers, devices etc instead of having personal one, services over Cloud Computing are delivered via Internet.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"83 1","pages":"277-282"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85971913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on finger vein feature extraction methods","authors":"Rahul Dev, Ruqaiya Khanam","doi":"10.1109/CCAA.2017.8229983","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229983","url":null,"abstract":"In today's era, personal information security is major topic of concern. In this regard many advanced techniques are used but still in all of those biometric is most reliable. Biometric technologies are based on individual's biological and behavioural characteristics. These system includes human finger, vein, iris, hand and many other as its identifiers. Biometric system using finger-vein as one of its trait is most widely accepted. This paper reviews the various method of feature extraction in finger vein recognition. Most of the existing work is functionally described and compared in three parts i.e., Finger vein image acquisition, pre-processing and feature extraction.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"11 6 1","pages":"1209-1213"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84025399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nanocavity coupled waveguide photonic crystal biosensor for detection of different blood components","authors":"Shivani Ameta, Arvind Sharma, P. Inaniya","doi":"10.1109/CCAA.2017.8230049","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230049","url":null,"abstract":"Biosensor is an analytical device used to detect the biological analyte, which can be antibodies enzymes cells or biomolecules. Biosensors have many applications like in environmental monitoring, biomedical research, and healthcare. In this paper we have proposed a nano-cavity coupled waveguide 2D photonic crystal biosensor which can be able to detect different blood components. This structure has a hexagonal symmetry that has area of 19×15μm2. Over the wafer of air dielectric rods of Si are introduced, which has refractive index of 3.6730, lattice constant of 690nm and radius of 220nm. Biosensor can detect Acetone, Tocopherol, Blood plasma, Cytop, Ethanol, Sylgard184, and Water. Simulation and analysis has been done and peak has been observed. For the analysis, FDTD method is used. A spectral shift has been occurred in transmission spectra due to change in refractive index. With the consideration of different components having different refractive indices, this property is expedient in the sensing application. In this paper design is allowed to operate in the wavelength range of 1500–1700nm.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"1 1","pages":"1554-1557"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78571232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comment on efficient certificateless aggregate signature scheme","authors":"Pankaj Kumar, Vishnu Sharma","doi":"10.1109/CCAA.2017.8229854","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229854","url":null,"abstract":"Certificateless signature scheme provides the solution of key escrow problem inherit in ID based public key cryptography. Aggregate signature allows aggregating of n signature in one single short signature which is very efficient in ad-hoc networks, PDA, mobile computation and more. A certificateless aggregate signature scheme solves not only the certification problem and key escrow problem but also done aggregation of n user's signatures. Recently, Deng et al proposed a certificateless aggregate signature scheme in “Concurrency and Computation: Practice and Experience” [doi: 10.1002/cpe.3551] in 2015 and claims that it is unforgeable under some concrete attacks but during security analysis we found it is insecure by some concrete attacks. In this paper, we show that proposed scheme is forged by universal adversary.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"20 1","pages":"515-519"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90455015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"General study of intrusion detection system and survey of agent based intrusion detection system","authors":"A. Saxena, S. Sinha, P. Shukla","doi":"10.1109/CCAA.2017.8229866","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229866","url":null,"abstract":"In today's world one of the most severe threat to computer security is the illegal intrusion into a computer system. As the network applications are growing rapidly, new sort of network attacks are rising continuously. The intrusion detection system IDS is used for the detection of the intrusion activity extends over the public network. IDS may need to deal with different audit record format. IDS have turn out to be essential security tool for detecting the attacks on computer network and resources. Due to this, we presented a review (general study) on IDS. First, we will discuss about intrusion detection later will discuss the type of IDS. We have emphasize on the range of type of IDS like anomaly, misuse, host based, network based and hybrid IDS, specifically IDS based on the anomaly or behavior based IDS along with Agent based technology in real network. At last, the contribution of every single type of IDS is described.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"59 1","pages":"471-421"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90461057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of EF-MAC protocol to optimize WSN communication","authors":"Rai Pal, R. Singh, Sanjoy Das","doi":"10.1109/CCAA.2017.8229876","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229876","url":null,"abstract":"In a sensor network, the sensor devices are the most critical resources that contribute in the network communication. The physical features of the network including node energy, coverage capability and channel strength can affect the network communication. In this paper, a novel MAC protocol called EF-MAC is introduced to utilize the restricted capabilities and the communication features to optimize the network life. In this protocol, the featured attributes are applied at two layers. In first layer, the effective neighbours are shortlisted based on zone driven analysis. In second layer, the fading vector and the failure analysis is applied to identify effective intermediate node. The featured layered analysis is applied on each zone to generate the effective and reliable route. The comparative analysis shows that the method has improved the network life and reduced the error rate.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"23 1","pages":"625-629"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90909369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Govind Singh Jethi, N. Belwal, S. Sunori, P. Juneja
{"title":"Improvement in BER performance of BPSK system using diversity techniques","authors":"Govind Singh Jethi, N. Belwal, S. Sunori, P. Juneja","doi":"10.1109/CCAA.2017.8229790","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229790","url":null,"abstract":"Multiple antennas are used with suitable signaling methods in space time diversity techniques. A significant performance gains are achieved in presence of multipath fading with the use of diversity techniques. The signals on both the transmitter and receiver sides of the antennas are combined in such a way that the BER is improved. In this paper we discussed about diversity techniques to overcome the problem of multipath fading as we have taken three conditions i.e. no diversity, maximal ratio combining and ostbc and we have find that by diversity techniques the BER is being minimized. In the present paper, the performance of a BPSK system has been investigated for three different cases, one without using diversity technique, second using OSTBC diversity technique and the third with maximal ratio combining using MATLAB.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"14 1","pages":"6-10"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91162471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of dynamic metrics to measure component based software","authors":"Parveen Kumar, P. Tomar","doi":"10.1109/CCAA.2017.8229922","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229922","url":null,"abstract":"This paper defines the different categories of dynamic metric which are designed to measure component at run time based on the some parametric values. These parametric values help to define the execution flow of all components required to get the desired result. This paper focuses on dynamic metrics of component integration at run time. The dependency function measure the Component-Usage Metric and Component Interface Metric results the number of components called and executed during the rendering process. The aim of the paper is to enhance the performance and predict the quality of CBS in real-time dynamically.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"1151 1","pages":"753-757"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91457305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruchika Chaudhary, A. Patel, Sushil Kumar, S. Tomar
{"title":"Edge detection using particle swarm optimization technique","authors":"Ruchika Chaudhary, A. Patel, Sushil Kumar, S. Tomar","doi":"10.1109/CCAA.2017.8229843","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229843","url":null,"abstract":"Handwriting recognition has been a major topic of research since past many years. There have been several approaches to handwriting recognition but the recognition of handwritten characters using deep learning has been a hot topic of research in the past five years. This paper proposes a method of converting handwritten text into speech at real time using the concept of deep neural networks. Moreover the pre-processing is improved by using an enhanced edge detection method for thinning the boundaries of the segmented characters. The recognized text is converted into speech. This system provides the benefit of reducing the hectic task of manually going through the handwritten documents in places such as banks and post offices. It can have various applications such as the audio based checking of exam sheets of students in schools and colleges preventing the task of recognizing the handwritten characters, would be beneficial for the blind, for the people who are illiterate and do not know reading but know a specific language. It proposes to reduce the human effort in understanding one's handwriting and easily they can listen to the speech converted. It can be beneficial for the students as well as they can simple listen to their notes and learn better.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"6 1","pages":"363-367"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90990651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for assessing the evolvability characteristics along with sub-characteristics in AOSQ model using fuzzy logic tool","authors":"Pankaj Kumar, S. K. Singh","doi":"10.1109/CCAA.2017.8229839","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229839","url":null,"abstract":"Over the past few decades, IT industry has faced the difficulties of evolving their software systems in order to live on the market and to compete with similar software systems. For software systems to live on market, they should derived new additional design requirements and concert themselves to the new evolving environment. Evolvability is most crucial and essential attribute to evaluate the software development. Due to gradual development of system, the AOP-based software moves closer to researcher and practitioner. It is sufficient straightforward to reuse the system than developing the new system. Evolvability reduces the different factors like development cost, time (i.e. installation and access), maintenance and effort of software system. This paper explores a framework to assess and verification of evolvability in AOSQ model using fuzzy logic toolbox. All the values of evolvability and its related characteristics are calculated by analytic hierarchy process (AHP) tool.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"28 1","pages":"339-344"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83380757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}