G. Shiva Kumar, P. Lakshmi Sruthi, P. Rajasekhar, F. Karaer
{"title":"Eutrophication assessment of a shallow lake using GIS","authors":"G. Shiva Kumar, P. Lakshmi Sruthi, P. Rajasekhar, F. Karaer","doi":"10.1109/ICCCT2.2014.7066701","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066701","url":null,"abstract":"Because of the rapidly increasing pollution in Lake Uluabat, which is one of the significant shallow lakes of Turkey and has been announced to be a Ramsar Area, eutrophic state evaluation based on geographic information system was performed. The eutrophication level of the lake is determined with the help of a 0 - 100 scale based on TSI calculations and secchi disc depth (SD), chlorophyll-a (Chl-a), total phosphorus (TP) and total nitrogen (TN) parameters. The TSI maps of four parameters were created using the Inverse Distance Weight (IDW) interpolation method. The final map showing the spatial distribution of trophic level was generated by synthesising the thematic maps of each indicator on the cell basis with the overlay technique. From the final map, the trophic level of the entire lake was characterized as eutrophic or more in all seasons studied during the year.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"71 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79183230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated updates mailing system for an organization:using named-entity recognition and tree based indexing database","authors":"Sreenivasulu Sadineni, Bindhu Madhavi Kilaru, Eshwar Aluguri","doi":"10.1109/ICCCT2.2014.7066725","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066725","url":null,"abstract":"The current trend for communicating information in an organization is by using letters/ circulars; whereby the letter is prepared for a certain work and then forwarded on to all regardless of whether or not each employee has an interest or need for it. If the organization decides to send the letters to the respective/ interested employees, the job for the person assigned this task would be long and hard in the conventional mailing system. This paper proposes Automated Updates Mailing System (AUMS), a mailing system which identifies all the interested recipients' automatically to forward the letters/circulars in an organization using named-entity recognition and tree based indexing database, instead of an exhaustive manual search for all interested recipients' by mail administrator/sender. Our AUMS mailing scheme is straightforward to establish, fully compatible with any existing mailing systems, yet achieves an efficient way to construct an organization's mailing system. This process will result in a savings in time and money for the organization.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"401 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77126786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduction of the order of anti-aliasing filters in embedded avionics data acquisition","authors":"J. Satyanarayana, A. G. Ramakrishnan","doi":"10.1109/ICCCT2.2014.7066704","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066704","url":null,"abstract":"Research on the applications of compressed sensing has been mainly directed towards sub-Nyquist acquisition of a sparse signal followed by reconstruction, using different recovery algorithms, to get the original signal. In this paper, we present a scheme of compressed acquisition of a set of sparse signals and subsequent reconstruction of the signals at an effective sampling rate which is a multiple of the rated sampling rate of the analog to digital converters employed for data acquisition. We demonstrate that with a higher effective sampling rate the frequency specifications of the front-end anti-aliasing (AA) filter can be relaxed and it is possible to use a lower order AA filter, thereby simplifying the analog design on the embedded board. To verify the proof of concept we test the proposed acquisition architecture for sampling voltages proportional to the deflection of control surfaces of an in-flight aerospace vehicle.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"42 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77206346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing information by performing forensic and network analysis on hosted virtualization","authors":"Nenavath Srinivas Naik, K. P. Kumar, D. Vasumathi","doi":"10.1109/ICCCT2.2014.7066717","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066717","url":null,"abstract":"A Hypervisor at the same time agrees a single system to run two or additional operating systems. To gather forensic proof of examined activities or attacks against the system, the evidence kept in logs of a system plays an important role. In this paper, we have analyzed logs, snapshots and also the network connectivity of guest and host operating systems. We have studied different virtualization systems and analyzed their logs, snapshots of hypervisor with dissimilar case studies to find the actions done on virtual systems. We have analyzed the deleted and formatted files information with the help of Encase forensic tool on some of the open source virtualization technologies like virtual box and qemu to ensure that the information existing in the system is always secure.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"2016 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86475700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weighted Ranked Queries for secure search in cost-effective clouds","authors":"V. Anand, Ahmed Abdul, Moiz Qyser","doi":"10.1109/ICCCT2.2014.7066718","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066718","url":null,"abstract":"Cloud computing has emerged as a major way of reducing the information technology costs incurred by organizations. For a cost-sensitive organization which stores its data in the cloud and retrieves files via keyword search, the primary focus is on the issues of cost effectiveness as well as privacy. Three keyword-based secure search protocols, namely Ostrovsky protocol, Cooperative Private Searching (COPS) protocol and Efficient Information Retrieval for Ranked Queries (EIRQ) protocol are reviewed in this paper. Each protocol offers an improvement over the basic keyword search used by today's cloud users. After discussing the limitations of EIRQ, a new protocol named Weighted Ranked Queries (WRQ) is proposed. A comparison of the performance of these protocols is presented. The future work that could be carried out in this area is mentioned in the conclusion.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"59 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82884647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Rao, Suresh Patidar, P. Balaji, P. Arumugam, S. Satyamurty
{"title":"Design and implementation of Intelligent Employee Authentication System[IEAS]","authors":"G. Rao, Suresh Patidar, P. Balaji, P. Arumugam, S. Satyamurty","doi":"10.1109/ICCCT2.2014.7066709","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066709","url":null,"abstract":"The Strategic organizations need highly secure methods for identity verification and to control physical access to various facilities. In addition to improving overall security, an integrated identity system helps to make Strategic operations more efficient and builds trust that can be leveraged throughout interagency programs. This paper discusses a detailed view of design, development and implementation of the LPC 2478 ARM microcontroller based Intelligent Employee Authentication System for the employees possessing Radio Frequency IDentity[RFID] cards. Customised firmware is developed using KEIL μVision IDE to accomplish the objectives. Human Machine Interface[HMI] has been developed using Visual Basic, wherever required. The utility of this system in other areas are also presented.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"15 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81019481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personalized collaborative filtering recommender system using domain knowledge","authors":"M. Venu Gopalachari, P. Sammulal","doi":"10.1109/ICCCT2.2014.7066693","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066693","url":null,"abstract":"In the current era of web applications such as e-retail business, the web services focused to provide personalized search systems to the targeted user intents based on the navigation patterns. Intelligent collaborative filtering recommender system tries to recommend the web pages considering the similar patterns of the other users along with the usage knowledge of the current user session. This recommender systems strategy lacks of the domain knowledge in comparing the usage patterns of the other users in serving with recommendations. This paper mainly focused on incorporating the domain knowledge and usage knowledge in personalization as well as in comparing the similar user patterns for recommender systems. This novel strategy builds a model to recommend the web pages that can help the new search scenarios and can improve the likelihood of a user towards the host website. Experimental results shown that the proposed novel strategy yields to gain in performance of the recommender system in terms of the quality of the web page recommendations.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"62 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90099054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Single Sign on based secure remote user authentication scheme for Multi-Server Environments","authors":"S. Binu, M. Misbahuddin, P. Raj","doi":"10.1109/ICCCT2.2014.7066715","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066715","url":null,"abstract":"A Multi-Server Architecture comprises of a server environment having many different servers which provides the user the flexibility of accessing resources from multiple Service Providing Servers using the same credential. The primary objective of a Multi Server Environment (MSE) is to provide services of different Service Providers (SPs) without repeating registration at each SP server, and to get a unique single credential for all the servers in MSE. However, the conventional MSEs, proposed by various researchers, proposes the individual authentication service by each SP on their respective server using the credential issued by the Registration Authority of MSE. The mechanism requires the user to access each SP by keying the same credentials for every SP separately. Single Sign On (SSO) is an authentication mechanism that enables a user to sign-on once and access the services of various SPs in the same session. SAML is generally used as a Single Sign-On protocol. This work analyzes the smart card based authentication scheme for Multi-Server Environment proposed by Li et al.'s and discuss various security attacks on the said scheme. The paper also proposes a Secure Dynamic-ID based scheme using smart cards or crypto cards which do not require a verifier table and implements Single Sign On feature using SAML protocol, thus allowing the user to enjoy all the features of an MSE along with SSO.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82071120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time embedded software design for onboard computer of Anti-Ballistic missile system","authors":"Hemant Kumar Rathore, Mahender Katukuri, Dl Seshagiri Rao, Bhvs Narayana Murthy","doi":"10.1109/ICCCT2.2014.7066741","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066741","url":null,"abstract":"The Missile Onboard Computer (OBC) is an embedded computer to perform control, guidance, target data estimation, mission sequencing and various other critical operations during flight. The real-time embedded software for the OBC must be designed to achieve deterministic response times and quite minimal jitters (in the order of 50-100μs) for the accurate control and guidance operations and precise scheduling of computational modules and IO messages subsequently. The synchronization mechanisms of OBC with all other avionics subsystems has to ensure that it gets the latest updates of the data from sensors and outputs the latest command to actuators within specified bounds of time. For the specific case of Anti-Ballistic missile system, these requirements become further challenging to achieve because of the higher velocities of the moving target and the interceptor missile which demands higher data update rates from sensors, high frequent commands to control system. This paper discusses the design issues of the OBC software of Anti-Ballistic Air defense missile system.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"714 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76907144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of the scope of negation in online news articles","authors":"S. Padmaja, S. Fatima, Sasidhar Bandu, B. Sowmya","doi":"10.1109/ICCCT2.2014.7066744","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066744","url":null,"abstract":"Electronic detection of linguistic negation in free text is a challenging need for many text handling applications including sentiment analysis. Our system uses online news archives from two different resources namely NDTV and The Hindu to predict the scope of negation in the text. In this paper, our main target was on determining the scope of negation in news articles for two political parties namely BJP and UPA by using three existing methodologies. They were Rest of the Sentence (RoS), Fixed Window Length (FWL) and Dependency Analysis (DA). The F measures for each one of them were 0.58, 0.69 and 0.75 respectively. We observed that DA was performing better than the other two. Among 1675 sentences in the corpus, according to annotator I, 1,137 were positive and 538 were negative whereas according to annotator II, 1,130 were positive and 545 were negative. Further we also identified the score of each sentence and calculated the accuracy on the basis of average score of both the annotators. The scope of negation detection was limited to specific rather than implicit negations within single sentences.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"85 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82204953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}