首页 > 最新文献

2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)最新文献

英文 中文
Paradigms of Image Compression and Encryption: A Review 图像压缩与加密范式综述
Pratistha Mathur, Anju Yadav, Viveak Kumar Verma, Renuka Purohit
Image compression is a process of reducing size of an images at the time of transmission and at network level we also need some security mechanism for secure data transmission assurance. To provide data security we need a best encryption method for an image so that it does not affect image quality. The image compression schemes are of two types lossy and lossless or combination of both. The both (lossy and lossless) compression schemes can compress and decompress the image but some time compression made some loss of data so it is lossy otherwise lossless. To provide security as we know perform encryption and decryption process, there are two methods for key generation one is symmetric and other asymmetric. If we use same key for encryption and decryption i.e., known as symmetric system otherwise asymmetric cryptography system.In this paper, a detailed review of different Compression and Encryption schemes like CE, EC, Joint compression and Encryption is given and we also analyzed their result on the basis of different parameter like compression ratio, PSNR, NPCR, UACI etc.
图像压缩是在传输时减小图像大小的过程,在网络层面,我们还需要一定的安全机制来保证数据的安全传输。为了保证数据的安全性,我们需要一种最佳的图像加密方法,使其不影响图像质量。图像压缩方案分为有损压缩和无损压缩或两者的组合。两种压缩方案(有损和无损)都可以压缩和解压缩图像,但有时压缩会造成一些数据丢失,因此它是有损的,否则是无损的。为了提供我们所知道的执行加密和解密过程的安全性,密钥生成有两种方法,一种是对称的,另一种是非对称的。如果我们使用相同的密钥进行加密和解密,即称为对称系统或非对称密码系统。本文详细介绍了CE、EC、联合压缩和加密等不同的压缩和加密方案,并根据不同的压缩比、PSNR、NPCR、UACI等参数分析了它们的结果。
{"title":"Paradigms of Image Compression and Encryption: A Review","authors":"Pratistha Mathur, Anju Yadav, Viveak Kumar Verma, Renuka Purohit","doi":"10.1109/ICCT46177.2019.8969039","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969039","url":null,"abstract":"Image compression is a process of reducing size of an images at the time of transmission and at network level we also need some security mechanism for secure data transmission assurance. To provide data security we need a best encryption method for an image so that it does not affect image quality. The image compression schemes are of two types lossy and lossless or combination of both. The both (lossy and lossless) compression schemes can compress and decompress the image but some time compression made some loss of data so it is lossy otherwise lossless. To provide security as we know perform encryption and decryption process, there are two methods for key generation one is symmetric and other asymmetric. If we use same key for encryption and decryption i.e., known as symmetric system otherwise asymmetric cryptography system.In this paper, a detailed review of different Compression and Encryption schemes like CE, EC, Joint compression and Encryption is given and we also analyzed their result on the basis of different parameter like compression ratio, PSNR, NPCR, UACI etc.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114331169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CDFM-based Secure & Efficient Architecture for Data Management in Cloud Computing 基于cdfm的云计算数据管理安全高效架构
Muskaan Singh, Ravinder Kumar, Inderveer Chana
Cloud has become a prominent technology of data storage and computation. This allows user and institutions to depend on Cloud providers for storage and computing to offer system as a service. The growing significance of extensive acquisition and adoption of cloud computing have imposed security assurance on cloud. Security assurance provides integrity, confidentiality and reliability of data by performing computation and retrieving in compliance with the cloud providers. The storage, processing and managing of data for complex application becomes cumbersome and burdensome on cloud provider platforms. A management mechanism is required to manage the resources and reduce the complexity for maximizing performance with minimum human intervention. Even handling security threats occurring with varying workloads and failures in cloud environment is entailed. Motivated from this self management mechanism, we proposed a novel Cuckoo-based Data Fragmentation and Metadata (CDFM) secure and efficient approach. It manages the complex data of Translation and retrieves the translated data securely. In this work, cuckoo pools divide the data into different number of fragments and send it to different data pools. Data pools first encrypt the data fragment and assign color code to this encrypted fragment and then prepare indexing according to this color coding. The performance analysis, exhibit higher performance than existing approach for security and data fragmentation in cloud scenario.
云计算已经成为一种重要的数据存储和计算技术。这使得用户和机构可以依赖云提供商来提供存储和计算,从而提供系统即服务。广泛获取和采用云计算的重要性日益增加,对云的安全性提出了保证。安全保证通过按照云提供商的要求执行计算和检索来提供数据的完整性、机密性和可靠性。在云提供商平台上,复杂应用程序的数据存储、处理和管理变得非常繁琐。需要一种管理机制来管理资源并降低复杂性,以最少的人为干预最大化性能。甚至需要处理云环境中因不同工作负载和故障而发生的安全威胁。基于这种自我管理机制,我们提出了一种新的基于杜鹃的数据碎片和元数据(CDFM)安全高效的方法。它管理翻译的复杂数据,并安全地检索翻译后的数据。在这项工作中,杜鹃池将数据分成不同数量的碎片,发送到不同的数据池中。数据池首先对数据片段进行加密,并为加密后的数据片段分配颜色编码,然后根据该颜色编码准备索引。性能分析显示,在云场景中,安全性和数据碎片比现有的方法性能更高。
{"title":"CDFM-based Secure & Efficient Architecture for Data Management in Cloud Computing","authors":"Muskaan Singh, Ravinder Kumar, Inderveer Chana","doi":"10.1109/ICCT46177.2019.8969017","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969017","url":null,"abstract":"Cloud has become a prominent technology of data storage and computation. This allows user and institutions to depend on Cloud providers for storage and computing to offer system as a service. The growing significance of extensive acquisition and adoption of cloud computing have imposed security assurance on cloud. Security assurance provides integrity, confidentiality and reliability of data by performing computation and retrieving in compliance with the cloud providers. The storage, processing and managing of data for complex application becomes cumbersome and burdensome on cloud provider platforms. A management mechanism is required to manage the resources and reduce the complexity for maximizing performance with minimum human intervention. Even handling security threats occurring with varying workloads and failures in cloud environment is entailed. Motivated from this self management mechanism, we proposed a novel Cuckoo-based Data Fragmentation and Metadata (CDFM) secure and efficient approach. It manages the complex data of Translation and retrieves the translated data securely. In this work, cuckoo pools divide the data into different number of fragments and send it to different data pools. Data pools first encrypt the data fragment and assign color code to this encrypted fragment and then prepare indexing according to this color coding. The performance analysis, exhibit higher performance than existing approach for security and data fragmentation in cloud scenario.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125768977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Biometric Voting Machine Based on Fingerprint Scanner and Arduino 基于指纹扫描仪和Arduino的生物识别投票机
Atharva Jamkar, Omkar Kulkarni, A. Salunke, A. Pljonkin
This paper describes design of Biometric Voting Machine Using Fingerprint Scanner and Arduino for voting in institutes and organizations. Indian constitution empowers its citizen to exercise right to vote. Election decides the future of country, so that the system used for voting should be trustworthy. The conventional system for voting is ballot paper and Electronic voting machine too, has many flaws and trust issues. To eradicate malpractice and defrauding of the above methods of voting, we have designed an advanced system by using arduino and Fingerprint module. In this system, a person has to register a fingerprint ID with the system which will be centrally stored in arduino. In organizations, educational institutes, a co-operative bank, maximum number of votes elect head of organization that holds the office of public interest. For confirmation of voter, the name of the candidate will be displayed on LCD for whom the voter has cast a vote. It has simple hardware design and it is easily accessible. In case user wants to remove any of stored ID then the user need to press DEL key, after pressing DEL key, LED will ask to select ID that is to be deleted. After pressing OK key, the selected ID will be deleted and LCD will display that which ID has been deleted successfully. This system is flexible to use.
本文介绍了一种基于指纹扫描仪和Arduino的生物识别投票机的设计。印度宪法赋予公民行使选举权。选举决定国家的未来,因此投票系统应该是值得信赖的。传统的投票系统也有选票和电子投票机,存在许多缺陷和信任问题。为了杜绝上述投票方式的弊端和欺诈行为,我们利用arduino和指纹模块设计了一个先进的系统。在这个系统中,一个人必须向系统注册一个指纹ID,该指纹ID将集中存储在arduino中。在组织、教育机构、合作银行中,最高票数选举担任公共利益办公室的组织负责人。为了确认投票人,投票人投了票的候选人的名字将显示在液晶显示器上。硬件设计简单,操作方便。如果用户想要删除任何存储的ID,则用户需要按DEL键,按DEL键后,LED会要求选择要删除的ID。按OK键后,所选ID将被删除,LCD上会显示删除成功的ID。这个系统使用起来很灵活。
{"title":"Biometric Voting Machine Based on Fingerprint Scanner and Arduino","authors":"Atharva Jamkar, Omkar Kulkarni, A. Salunke, A. Pljonkin","doi":"10.1109/ICCT46177.2019.8969034","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969034","url":null,"abstract":"This paper describes design of Biometric Voting Machine Using Fingerprint Scanner and Arduino for voting in institutes and organizations. Indian constitution empowers its citizen to exercise right to vote. Election decides the future of country, so that the system used for voting should be trustworthy. The conventional system for voting is ballot paper and Electronic voting machine too, has many flaws and trust issues. To eradicate malpractice and defrauding of the above methods of voting, we have designed an advanced system by using arduino and Fingerprint module. In this system, a person has to register a fingerprint ID with the system which will be centrally stored in arduino. In organizations, educational institutes, a co-operative bank, maximum number of votes elect head of organization that holds the office of public interest. For confirmation of voter, the name of the candidate will be displayed on LCD for whom the voter has cast a vote. It has simple hardware design and it is easily accessible. In case user wants to remove any of stored ID then the user need to press DEL key, after pressing DEL key, LED will ask to select ID that is to be deleted. After pressing OK key, the selected ID will be deleted and LCD will display that which ID has been deleted successfully. This system is flexible to use.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131654728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Decoupling Control of Headbox using Particle Swarm Optimisation (PSO) Algorithm 基于粒子群优化算法的机顶盒解耦控制
P. Saini, R. Kumar, P. Juneja
For multivariable systems, loop interaction is a major issue to be addressed. To reduce loop interaction among various loops in a multivariable system, decouplers are designed. Decouplers act as cross controllers for any multivariable systems. The control of such systems using decouplers, is known as decoupling control. The objective of decoupling control is to minimize control loop dealings. This paper presents design and analysis of decoupling control of headbox using PI controller based on Particle Swarm Optimisation (PSO) algorithm. The performance of PSO based PI controller has been compared with PI controller designed using conventional techniques such as IMC, ZN and TL.
对于多变量系统,回路相互作用是需要解决的主要问题。为了减少多变量系统中各回路之间的相互作用,设计了解耦器。解耦器作为任何多变量系统的交叉控制器。使用解耦器对这类系统进行控制,称为解耦控制。解耦控制的目标是使控制回路的事务最小化。本文设计并分析了基于粒子群优化算法的PI控制器对车头箱的解耦控制。将基于粒子群算法的PI控制器与采用IMC、ZN和TL等传统方法设计的PI控制器的性能进行了比较。
{"title":"Decoupling Control of Headbox using Particle Swarm Optimisation (PSO) Algorithm","authors":"P. Saini, R. Kumar, P. Juneja","doi":"10.1109/ICCT46177.2019.8969044","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969044","url":null,"abstract":"For multivariable systems, loop interaction is a major issue to be addressed. To reduce loop interaction among various loops in a multivariable system, decouplers are designed. Decouplers act as cross controllers for any multivariable systems. The control of such systems using decouplers, is known as decoupling control. The objective of decoupling control is to minimize control loop dealings. This paper presents design and analysis of decoupling control of headbox using PI controller based on Particle Swarm Optimisation (PSO) algorithm. The performance of PSO based PI controller has been compared with PI controller designed using conventional techniques such as IMC, ZN and TL.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125197854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advancements in Reversible Data Hiding in Encrypted Images Using Public Key Cryptography 使用公钥加密技术在加密图像中隐藏可逆数据的研究进展
A. N. Khan, Mingquan Fan, Asad Malik, M. A. Husain
With the evolving needs of cloud-based information exchange, the challenge of a reliable and secure communication channel has also been the center of attention recently. Although cryptography has been a traditional tool for secure communication; yet it also carries a possibility of attacks aimed to gain access to the sensitive information. As an alternative, the use of reversible data hiding (RDH) technique has been proposed. RDH scheme involves concealment of the data in the cover image, both of which are retrieved in a lossless manner at the receiver end. Over an insecure channel in cloud communication, the cover content is encrypted; thus resulting in Reversible Data Hiding in Encrypted Images (RDHEI). RDHEI traditionally uses symmetric key cryptography involving a drawback of key management overhead. Public key cryptography (PKC) offers an alternate and efficient solution for cloud-based environments in which the homomorphic properties of public key are utilized. This paper provides an overview of the recent advancements in research in the context RDHEI based on PKC; discussing several proposed schemes addressing the core challenges of data expansion and complex computations using public key encryption. In addition to this, the shortcomings of the discussed schemes are highlighted along with possible remedies that will also guide new directions for future work.
随着基于云的信息交换需求的不断发展,可靠和安全的通信通道的挑战也成为最近关注的焦点。虽然密码学一直是安全通信的传统工具;然而,它也带来了旨在获取敏感信息的攻击的可能性。作为一种替代方案,已经提出使用可逆数据隐藏(RDH)技术。RDH方案涉及隐藏封面图像中的数据,在接收端以无损的方式检索这两个数据。在云通信中的不安全通道上,对覆盖内容进行加密;从而导致可逆的数据隐藏在加密图像(RDHEI)。rdhi传统上使用涉及密钥管理开销的对称密钥加密。公钥加密(PKC)为利用公钥同态属性的基于云的环境提供了另一种高效的解决方案。本文综述了近年来基于PKC的RDHEI研究进展;讨论了使用公钥加密解决数据扩展和复杂计算的核心挑战的几个方案。除此之外,还强调了所讨论的计划的缺点以及可能的补救措施,这些补救措施也将指导今后工作的新方向。
{"title":"Advancements in Reversible Data Hiding in Encrypted Images Using Public Key Cryptography","authors":"A. N. Khan, Mingquan Fan, Asad Malik, M. A. Husain","doi":"10.1109/ICCT46177.2019.8969030","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969030","url":null,"abstract":"With the evolving needs of cloud-based information exchange, the challenge of a reliable and secure communication channel has also been the center of attention recently. Although cryptography has been a traditional tool for secure communication; yet it also carries a possibility of attacks aimed to gain access to the sensitive information. As an alternative, the use of reversible data hiding (RDH) technique has been proposed. RDH scheme involves concealment of the data in the cover image, both of which are retrieved in a lossless manner at the receiver end. Over an insecure channel in cloud communication, the cover content is encrypted; thus resulting in Reversible Data Hiding in Encrypted Images (RDHEI). RDHEI traditionally uses symmetric key cryptography involving a drawback of key management overhead. Public key cryptography (PKC) offers an alternate and efficient solution for cloud-based environments in which the homomorphic properties of public key are utilized. This paper provides an overview of the recent advancements in research in the context RDHEI based on PKC; discussing several proposed schemes addressing the core challenges of data expansion and complex computations using public key encryption. In addition to this, the shortcomings of the discussed schemes are highlighted along with possible remedies that will also guide new directions for future work.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132874883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Lithological Mapping using Digital Image Processing Techniques on Landsat 8 OLI Remote Sensing Data in Jahajpur, Bhilwara, Rajasthan 基于数字图像处理技术的Landsat 8 OLI遥感数据在印度拉贾斯坦邦贾哈吉普尔的岩性填图
Mahesh Kumar Tripathi, H. Govil, P. Diwan
Lithological mapping is important parameters for interpretation, identification and mapping of minerals. Lithological mapping in the study area defines the characteristics of nature of rock types and their association and formation. In this research study Landsat 8 OLI remote sensing data used for lithological mapping of Jahajpur region of Bhilwara super group. The task of lithological mapping completed by analogical and numerical analysis of digital image processing method which involves several digital image processing techniques such as natural band combination, false color composite, principal component analysis, band ratio and minimum noise fraction. The observed result is verified and validated by field survey and published geological survey of India geological map. The observe result have shown complete correlation and similarity with established map.
岩性填图是矿物解释、识别和填图的重要参数。研究区岩性填图确定了岩石类型的性质特征及其组合和形成。本研究利用Landsat 8 OLI遥感数据对比尔瓦拉超群Jahajpur地区进行岩性填图。通过对数字图像处理方法的类比和数值分析来完成岩性填图的任务,该方法涉及到自然波段组合、假彩色合成、主成分分析、波段比和最小噪声分数等数字图像处理技术。通过野外调查和已发表的印度地质图地质调查,对观测结果进行了验证和验证。观测结果与已建立的图完全相关、相似。
{"title":"Lithological Mapping using Digital Image Processing Techniques on Landsat 8 OLI Remote Sensing Data in Jahajpur, Bhilwara, Rajasthan","authors":"Mahesh Kumar Tripathi, H. Govil, P. Diwan","doi":"10.1109/ICCT46177.2019.8969043","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969043","url":null,"abstract":"Lithological mapping is important parameters for interpretation, identification and mapping of minerals. Lithological mapping in the study area defines the characteristics of nature of rock types and their association and formation. In this research study Landsat 8 OLI remote sensing data used for lithological mapping of Jahajpur region of Bhilwara super group. The task of lithological mapping completed by analogical and numerical analysis of digital image processing method which involves several digital image processing techniques such as natural band combination, false color composite, principal component analysis, band ratio and minimum noise fraction. The observed result is verified and validated by field survey and published geological survey of India geological map. The observe result have shown complete correlation and similarity with established map.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114347865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
MaplDroid: Malicious Android Application Detection based on Naive Bayes using Multiple MaplDroid:基于多重朴素贝叶斯的恶意Android应用检测
P. Bhat, Kamlesh Dutta, Sukhbir Singh
Android is currently the most popular operating system for mobile devices in the market. Android device is being used by every other person for everyday life activities and it has become a centre for storing personal information. Because of these reasons it attracts many hackers, who develop malicious software for attacking the platform; thus a technique that can effectively prevent the system from malware attacks is required. In this paper, an malware detection technique, MaplDroid has been proposed for detecting malware applications on Android platform. The proposed technique statically analyses the application files using features which are extracted from the manifest file. A supervised learning model based on Naive Bayes is used to classify the application as benign or malicious. MaplDroid achieved Recall score 99.12% and F1 score 83.45%.
Android是目前市场上最流行的移动设备操作系统。每个人都在使用安卓设备进行日常生活活动,它已经成为存储个人信息的中心。由于这些原因,它吸引了许多黑客,他们开发恶意软件攻击平台;因此,需要一种能够有效防止系统受到恶意软件攻击的技术。本文提出了一种用于检测Android平台恶意软件的恶意软件检测技术MaplDroid。提出的技术使用从清单文件中提取的特性静态分析应用程序文件。使用基于朴素贝叶斯的监督学习模型对应用程序进行良性或恶意分类。mappldroid的Recall得分为99.12%,F1得分为83.45%。
{"title":"MaplDroid: Malicious Android Application Detection based on Naive Bayes using Multiple","authors":"P. Bhat, Kamlesh Dutta, Sukhbir Singh","doi":"10.1109/ICCT46177.2019.8969041","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969041","url":null,"abstract":"Android is currently the most popular operating system for mobile devices in the market. Android device is being used by every other person for everyday life activities and it has become a centre for storing personal information. Because of these reasons it attracts many hackers, who develop malicious software for attacking the platform; thus a technique that can effectively prevent the system from malware attacks is required. In this paper, an malware detection technique, MaplDroid has been proposed for detecting malware applications on Android platform. The proposed technique statically analyses the application files using features which are extracted from the manifest file. A supervised learning model based on Naive Bayes is used to classify the application as benign or malicious. MaplDroid achieved Recall score 99.12% and F1 score 83.45%.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130026614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scene Understanding: A Survey to See the World at a Single Glance 场景理解:一瞥世界的调查
Prajakta Pawar, V. Devendran
Humans are extremely proficient at visually perceiving natural scenes and understanding high level scene structures. In recent times, scene understanding is a challenging and most important problem in computer vision. Images are visual, however the visual information can be with various features like shape, edges, texture and color. The main objective behind object detection is to identify what are all objects present in an image and where they all located. Understanding a scene integrates meaningful information at multiple levels to extract semantic relationships and patterns. The interaction between various objects is most intuitive and natural to human being. As compared with object recognition, scene understanding identify the target of objects and also the distribution of targets in a scene. Scene understanding have a significant impact in computer vision to perceive, analyze, and interpret the visual scenes which leads to new research areas. In this paper, we review the scene understanding concept including feature extraction, classification and scene recognition and related datasets. At last, we have concluded some challenges of object detection remain unsolved and can be scope for further research work.
人类在视觉上对自然场景的感知和对高水平场景结构的理解是非常熟练的。近年来,场景理解是计算机视觉中最具挑战性和最重要的问题。图像是视觉的,但视觉信息可以具有各种特征,如形状、边缘、纹理和颜色。物体检测背后的主要目标是识别图像中存在的所有物体以及它们的位置。对场景的理解整合了多个层次的有意义信息,以提取语义关系和模式。各种物体之间的相互作用对人类来说是最直观、最自然的。与物体识别相比,场景理解识别的是物体的目标以及目标在场景中的分布。场景理解在计算机视觉中对视觉场景的感知、分析和解释有着重要的影响,并导致了新的研究领域。本文综述了场景理解的概念,包括特征提取、分类和场景识别以及相关的数据集。最后,我们总结了一些目标检测尚未解决的挑战,这些挑战可以作为进一步研究的范围。
{"title":"Scene Understanding: A Survey to See the World at a Single Glance","authors":"Prajakta Pawar, V. Devendran","doi":"10.1109/ICCT46177.2019.8969051","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969051","url":null,"abstract":"Humans are extremely proficient at visually perceiving natural scenes and understanding high level scene structures. In recent times, scene understanding is a challenging and most important problem in computer vision. Images are visual, however the visual information can be with various features like shape, edges, texture and color. The main objective behind object detection is to identify what are all objects present in an image and where they all located. Understanding a scene integrates meaningful information at multiple levels to extract semantic relationships and patterns. The interaction between various objects is most intuitive and natural to human being. As compared with object recognition, scene understanding identify the target of objects and also the distribution of targets in a scene. Scene understanding have a significant impact in computer vision to perceive, analyze, and interpret the visual scenes which leads to new research areas. In this paper, we review the scene understanding concept including feature extraction, classification and scene recognition and related datasets. At last, we have concluded some challenges of object detection remain unsolved and can be scope for further research work.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128818871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Blockchain-Based Smart Contract for E-Bidding System 基于区块链的电子招标系统智能合约
P. Manimaran, R. Dhanalakshmi
Electronic bidding systems have become widespread since the advent of the internet and mobile phones. In the Electronic bidding systems, the seller will sell an item and many buyers will bid for that item and the highest bidder will get the item. One of the main issue with this E-Bidding system is the introduction of third-party mainly a company or set of companies which will develop and host either the website or smartphone application. The Buyers and the Sellers have to trust this company because all the bidding process will be handled by the company. The company can manipulate the bidding process if it wants. So to avoid the trust issues blockchain based electronic bidding system is introduced in this paper. In this model, there is no need for third party. Smart Contract will handle all the bidding transactions. Since blockchains are known for its integrity this system makes sure that the integrity of the bidding process is preserved.
自从互联网和移动电话出现以来,电子投标系统已经变得普遍。在电子投标系统中,卖家将出售一件物品,许多买家将对该物品进行投标,出价最高的人将获得该物品。这个电子投标系统的主要问题之一是引入第三方,主要是一个公司或一组公司将开发和托管网站或智能手机应用程序。买方和卖方必须信任该公司,因为所有的投标过程将由该公司处理。如果该公司愿意,它可以操纵竞标过程。因此,为了避免信任问题,本文引入了基于区块链的电子投标系统。在这种模式下,不需要第三方。智能合约将处理所有投标交易。由于区块链以其完整性而闻名,因此该系统确保了竞标过程的完整性。
{"title":"Blockchain-Based Smart Contract for E-Bidding System","authors":"P. Manimaran, R. Dhanalakshmi","doi":"10.1109/ICCT46177.2019.8969042","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969042","url":null,"abstract":"Electronic bidding systems have become widespread since the advent of the internet and mobile phones. In the Electronic bidding systems, the seller will sell an item and many buyers will bid for that item and the highest bidder will get the item. One of the main issue with this E-Bidding system is the introduction of third-party mainly a company or set of companies which will develop and host either the website or smartphone application. The Buyers and the Sellers have to trust this company because all the bidding process will be handled by the company. The company can manipulate the bidding process if it wants. So to avoid the trust issues blockchain based electronic bidding system is introduced in this paper. In this model, there is no need for third party. Smart Contract will handle all the bidding transactions. Since blockchains are known for its integrity this system makes sure that the integrity of the bidding process is preserved.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125920002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
NLP chatbot for Discharge Summaries 用于出院总结的NLP聊天机器人
Harsh Lal, Priyanshu Lal
One of the most important goals in health-care is improving the quality of health and service rendered by healthcare industry. There has been a growing demand for ease of access to health-care, and this necessitates the development of health-care technology with Human Computer Interaction(HCI) design in mind. HCI usage can help both patients and healthcare providers as well [3]. With a wealth of information available to patients and providers, it can be difficult to find relevant information in a timely manner, especially for providers with busy schedules and patients with limited health literacy. We propose a Human Computer Interaction system that can answer patientś question and help improve the quality of health-care services provided to an individual. We make use of Natural Language Processing, Machine Learning and Big Data technologies to provide a feasible deploy-able solution. for the same.
保健领域最重要的目标之一是提高保健行业提供的保健和服务质量。人们对方便获得保健服务的需求日益增长,这就需要开发考虑到人机交互(HCI)设计的保健技术。HCI的使用对患者和医疗保健提供者都有帮助[3]。患者和提供者可以获得大量信息,但很难及时找到相关信息,特别是对于日程繁忙的提供者和卫生知识有限的患者。我们提出一个人机交互系统,可以回答病人的问题,并帮助提高提供给个人的医疗保健服务的质量。我们利用自然语言处理、机器学习和大数据技术提供可行的可部署解决方案。同样的原因。
{"title":"NLP chatbot for Discharge Summaries","authors":"Harsh Lal, Priyanshu Lal","doi":"10.1109/ICCT46177.2019.8969045","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969045","url":null,"abstract":"One of the most important goals in health-care is improving the quality of health and service rendered by healthcare industry. There has been a growing demand for ease of access to health-care, and this necessitates the development of health-care technology with Human Computer Interaction(HCI) design in mind. HCI usage can help both patients and healthcare providers as well [3]. With a wealth of information available to patients and providers, it can be difficult to find relevant information in a timely manner, especially for providers with busy schedules and patients with limited health literacy. We propose a Human Computer Interaction system that can answer patientś question and help improve the quality of health-care services provided to an individual. We make use of Natural Language Processing, Machine Learning and Big Data technologies to provide a feasible deploy-able solution. for the same.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116272876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1