Venue : Coral Deira - Dubai, Deira, Dubai, UAE..  &  Date : April 24 ~ 25, 2015

Accepted papers

  • A New Car-Following Model Based on Epsilon-SVR Method Using Parameters Tuning and Data Scaling Techniques
    Poor Arab.M, Pahlavani.P and Hasanlou M, University of Tehran, Iran
    Traffic simulation is a powerful tool for analyzing and solving several transportation issues and traffic problems. However, all traffic micro-simulation models require a suitable car-following model to show the real situation in the best way possible. Several car-following models have been proposed. An obvious disadvantage of the former models is the great number of parameters which are difficult to calibrate. Moreover, any (even slight) change in these parameters creates considerable disturbances. In this paper, a car-following model was proposed using the Epsilon -Support Vector Regression (e-SVR) method whose output is the acceleration of the following car. Radial Basis Function (RBF) was used as the kernel of the e-SVR method, and the model parameters were tuned using the Grid Search method. The best values for the parameters were obtained. Furthermore, scaling in the interval [-1, 1] was used for the input data, and the method was proven to more accurate than the case where no scaling was used. Accordingly, a car-following model with the MSE (mean squared error) =0.002 and the R2 (Squared correlation coefficient) =0.998 was proposed using the function estimation method through the e-SVR method. Finally, the e-SVR output was compared to results of both the Helly linear model and the GHR model, and it was shown that, when using the scaling technique, the proposed method was more accurate compared to both of those models.
  • Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm
    Prakash Kuppuswamy1 and S.Nithya Rekha2, 1Jazan University, KSA and 2Qassim Private Colleges, KSA
    This research study proposes Hybrid Encryption System using new public key algorithm and private key algorithm. A hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem. Here, we propose a provably two way secured data encryption system, which addresses the concerns of user?s privacy, authentication and accuracy. This system has two different encryption algorithms have been used both in the Encryption and decryption sequence. One is public key cryptography based on linear block cipher another one is private key cryptography based on simple symmetric algorithm. This cryptography algorithm provides more security as well as authentication comparing to other existing hybrid algorithm.
  • Extracting news content based on visual and text features
    Wenhao Zhu, Song Dai, Yang Song, Zhiguo Lu, Shanghai University, China
    The Document Object Model (DOM) provides a tree structure called the DOM tree for representing with objects in HTML. Many researchers have considered using leaf nodes of DOM tree as basic objects in extracting information from web pages. However, web pages are more of information blocks which each have a consistent visual format rather than individual DOM tree nodes. And those information blocks do not necessarily have a direct map to DOM tree nodes. In this paper, we propose a visual oriented extraction method that extracts news content by visual unit (vu, for short). The visual units are identified by a top down approach based on visual features and text features. After that, page content is extracted according to domain characteristic. In our experiments, the proposed approach achieves 94.86% accuracy over 700 news web pages from 7 different news sites. The result demonstrates that our method represents a promising approach for news content extraction with visual units and domain characteristic.
  • Mining Time Series Data
    T.Soni Madhulatha1, Alluri1 and S.Sameen Fatima2, 1Institute of Management Sciences, Telangana and 2University College of Engineering, Telangana
    In a foreign exchange market where different currencies are bought and sold,so it is essential to know the factors influencing exchange rate. The foreign exchange market is very large hence forecasting exchange rates is a difficult task. Exchange rates play a vital role in country’s level of trade, which is critical to almost every free market economy in the world. Therefore exchange rates are among the most monitored analyzed and governmentally manipulated economic measures. The analysis of data is done using regression and anova model on the Indian Rupee and generates appropriate trading signals. This paper aims to explore the factors influencing and effects of fluctuations in the exchange rate of Indian Rupee.
  • Enhancing Privacy Preservation of Stature System Through Homomorphic System
    Ankita Thadani and Vinit Gupta, Hasmukh Goswami College of Engineering, India
    There are various websites presently used by us where people transact with unknown agents and take decision for these agents for by considering the stature score. In the paper we have proposed homomorphic cryptosystem to preserve the privacy of an agent’s message value which can be used as for e voting that is particularly suitable for the peer to peer network. Proposed algorithm It does not require any centralized trusted third parties, or specialized platforms and trusted hardware. Initially Paillier system was used for it which will be replaced by updated elgamal approach. We can increase privacy of submitted score of user by increasing the complexity and trade off with time is also kept in consideration.
  • Improvising Technique of Privacy Preserving in Outsourced Transaction Database
    Jinal Parmar and Vinit Gupta, Hasmukh Goswami Collage of Engineering, India
    Database Outsourcing is promising data storage and management system in which data-owner stores the important information at third party service provider’s site. The service-provider collect, manages and administers the database and avails the ready-made services to the data owner and their clients to create, update, delete and access the database. Although database security is required because more service providers are not trustworthiness.

    In this paper we have proposed a novel approach of preserving privacy in outsourced transaction database based on fake tuple adding in original database using different cryptographic techniques. Additionally we have proposed RSA algorithm at server side which provides encryption of data and protect against forging the contents of the communication between data-owner and server. Our scheme ensures that it enhances security services like privacy and integrity and increase complexity in the structure of original TDB to confused an attacker. This algorithm enhances the “corporate privacy”.
  • The Parallel Distributed On-the-Fly State Space Construction based on the Strict Strong Coloring without Elimination of Replication states
    Nousseiba Guidoum, Meriem Bensouyad and Djamel Eddine Saidouni, Constantine 2 university, Algeria
    We consider the problem of generating a large state space of finite state transition systems in a distributed fashion. In this paper, we propose a novel parallel distributed algorithm for constructing state spaces on a network of workstations. Each node in the network builds a part of the state space. All parts being merged to form the whole state space upon termination. Unlike pre-viously proposed solutions that use a partition function to assign states, this approach relies on the use of the SSCGDA based algorithm (for Strict Strong Coloring Graph Distribution Algorithm) proposed in [1] which investi-gates a new graph coloring parameter, named the strict strong coloring, to dis-tribute the state space. The quality of the proposed algorithm is illustrated by comparison with other existing algorithms. The obtained results show good load balancing between network workers and an optimal rate of local connections.
  • Prototyping an NFC based Personal Health Device
    Javaid Nabi, Abhijit R D and Raghav Lakhoia, Samsung Research Institute, India
    Near field Communication, an emerging player in the healthcare sector offers tremendous potential for penetrating the healthcare and medical fields driven by the smartphone boom. NFC Forum’s recently released technical specification for Personal Health Device Communication (PHDC) addresses the role of NFC in personal health management. This specification enables medical devices like blood pressure monitors, weighing scales and glucose meters to exchange health data via NFC technology with external computers for monitoring and analysis by physicians. As of writing this paper there is no known implementation or medical device in the market supporting the NFC forum’s PHDC. In this paper we demonstrate a prototype of a health device based on Tizen platform wherein simulated health data is exchanged using NFC PHDC specification.