首页 > 最新文献

2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)最新文献

英文 中文
Investigating TikTok as an AI user platform 将TikTok作为人工智能用户平台进行调查
Mark Eugine Z. Francisco, Sonakshi Ruhela
The year 2020 started with an increase in usage of social media platforms specifically TikTok, an AI powered platform during the global pandemic. The study explored the relationship between behaviors and motivations of TikTok users and the role of artificial intelligence. An online survey was administered to 67 TikTok users to identify behaviors and motivations and to investigate the correlation between users' behaviors and motivations. The study found out patterns between behaviors and motivations which were tested by using correlational coefficient and one sample t-test. Based on the study there is a significant relationship between behaviors and motivations in using TikTok application and an increase in usage of TikTok during the year 2020. The study enlightened both TikTok users and non-users about its unforeseen benefits during the time of pandemic. Further, Artificial Intelligence enables the social platforms to have personalized content, prediction technology, and online mental health facility which can take over the world.
2020年伊始,社交媒体平台尤其是TikTok的使用量有所增加,TikTok是全球大流行期间的一个人工智能平台。该研究探讨了抖音用户的行为和动机与人工智能的作用之间的关系。对67名抖音用户进行了在线调查,以确定用户的行为和动机,并调查用户行为和动机之间的相关性。研究发现了行为与动机之间的关系模式,并采用相关系数和单样本t检验进行了检验。根据这项研究,2020年使用TikTok应用程序的行为和动机与TikTok使用量的增长之间存在显著关系。这项研究让抖音用户和非用户都意识到,在疫情期间,抖音带来了意想不到的好处。此外,人工智能使社交平台能够拥有个性化的内容,预测技术和可以接管世界的在线心理健康设施。
{"title":"Investigating TikTok as an AI user platform","authors":"Mark Eugine Z. Francisco, Sonakshi Ruhela","doi":"10.1109/iccakm50778.2021.9357752","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357752","url":null,"abstract":"The year 2020 started with an increase in usage of social media platforms specifically TikTok, an AI powered platform during the global pandemic. The study explored the relationship between behaviors and motivations of TikTok users and the role of artificial intelligence. An online survey was administered to 67 TikTok users to identify behaviors and motivations and to investigate the correlation between users' behaviors and motivations. The study found out patterns between behaviors and motivations which were tested by using correlational coefficient and one sample t-test. Based on the study there is a significant relationship between behaviors and motivations in using TikTok application and an increase in usage of TikTok during the year 2020. The study enlightened both TikTok users and non-users about its unforeseen benefits during the time of pandemic. Further, Artificial Intelligence enables the social platforms to have personalized content, prediction technology, and online mental health facility which can take over the world.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114757097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Securing Vehicular Ad-Hoc Networks: A DDoS Case Study 保护车载Ad-Hoc网络:DDoS案例研究
Wedad Ahmed Al-Dhuraibi, M. Elhadef
Vehicular Ad-Hoc Network is an intelligent transportation system that provides wireless communication between vehicles and different objects in the road to increase human safety. Vehicular Ad-Hoc Networks are ideal target to many attacks due to the large number of vehicles communicating with each other continually and instantly through a wireless medium. Security is one of the safety aspects where saving human lives is very critical. Denial of Service Attack is one of the most dangerous attacks since it targets the availability of the network services. The goal of any type of Denial of Service Attack is to interrupt the services for legitimate users or prevent them from accessing the network resources. In this paper, we simulate Dynamic Distributed Denial of Service Attack in different scenarios using the VEINS framework, SUMO and OMNET++.
车辆自组织网络是一种智能交通系统,它提供车辆与道路上不同物体之间的无线通信,以提高人类的安全。由于大量车辆通过无线媒介持续、即时地相互通信,车载自组织网络成为许多攻击的理想目标。安全是安全方面的一个方面,拯救人类的生命是非常关键的。拒绝服务攻击是最危险的攻击之一,因为它的目标是网络服务的可用性。任何类型的拒绝服务攻击的目标都是中断合法用户的服务或阻止他们访问网络资源。本文利用vein框架、SUMO和omnet++对不同场景下的动态分布式拒绝服务攻击进行了仿真。
{"title":"Securing Vehicular Ad-Hoc Networks: A DDoS Case Study","authors":"Wedad Ahmed Al-Dhuraibi, M. Elhadef","doi":"10.1109/iccakm50778.2021.9357733","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357733","url":null,"abstract":"Vehicular Ad-Hoc Network is an intelligent transportation system that provides wireless communication between vehicles and different objects in the road to increase human safety. Vehicular Ad-Hoc Networks are ideal target to many attacks due to the large number of vehicles communicating with each other continually and instantly through a wireless medium. Security is one of the safety aspects where saving human lives is very critical. Denial of Service Attack is one of the most dangerous attacks since it targets the availability of the network services. The goal of any type of Denial of Service Attack is to interrupt the services for legitimate users or prevent them from accessing the network resources. In this paper, we simulate Dynamic Distributed Denial of Service Attack in different scenarios using the VEINS framework, SUMO and OMNET++.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128578472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Speaker Recognition using Deep Neural Network Classifiers 基于深度神经网络分类器的自动说话人识别
Abdikarim Ali Moumin, Smitha S Kumar
The advances in modern computing technologies have achieved a breakthrough in the fields of artificial intelligence (AI) and the Internet of Things (IoT). One of the major achievements in the recent history is the ability of the computer software to classify and recognize some of the objects or sounds by learning data. In this paper, we have trained the software to recognize people using their voice utterances using TIMIT Acoustic Phonetic Continuous Speech Corpus. The speaker identity is enrolled by acquiring voice samples of the speaker. Relevant features are extracted, and a model is built using the extracted feature vectors. A pattern matching classification is applied to the model using artificial neural network techniques. Speaker verification system is built using Kaldi libraries to analyze acoustic features, while x-vector training is implemented using Tensor Flow. To achieve better performance, we have implemented a combination of multiple layers of TDNN (Time Delay Neural Networks) and LSTM (Long Short-Term Memory) deep neural networks.
现代计算技术的进步在人工智能(AI)和物联网(IoT)领域取得了突破。计算机软件通过学习数据对某些物体或声音进行分类和识别的能力是近代史上的主要成就之一。在本文中,我们使用TIMIT声学语音连续语料库对软件进行了语音识别。通过获取说话人的语音样本登记说话人身份。提取相关特征,并利用提取的特征向量构建模型。采用人工神经网络技术对模型进行模式匹配分类。使用Kaldi库构建说话人验证系统,分析声学特征,使用Tensor Flow实现x向量训练。为了获得更好的性能,我们实现了多层TDNN(时间延迟神经网络)和LSTM(长短期记忆)深度神经网络的组合。
{"title":"Automatic Speaker Recognition using Deep Neural Network Classifiers","authors":"Abdikarim Ali Moumin, Smitha S Kumar","doi":"10.1109/iccakm50778.2021.9357699","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357699","url":null,"abstract":"The advances in modern computing technologies have achieved a breakthrough in the fields of artificial intelligence (AI) and the Internet of Things (IoT). One of the major achievements in the recent history is the ability of the computer software to classify and recognize some of the objects or sounds by learning data. In this paper, we have trained the software to recognize people using their voice utterances using TIMIT Acoustic Phonetic Continuous Speech Corpus. The speaker identity is enrolled by acquiring voice samples of the speaker. Relevant features are extracted, and a model is built using the extracted feature vectors. A pattern matching classification is applied to the model using artificial neural network techniques. Speaker verification system is built using Kaldi libraries to analyze acoustic features, while x-vector training is implemented using Tensor Flow. To achieve better performance, we have implemented a combination of multiple layers of TDNN (Time Delay Neural Networks) and LSTM (Long Short-Term Memory) deep neural networks.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126340183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recent Routing Approaches for WMN's: A State of Art WMN的最新路由方法:一个艺术的状态
Bhanu Sharma, Amar Singh, Jimmy Singla
WMN's or Wireless Mesh Network is a communication network that has features like self-healing., self-organizing and the ability to create a network automatically in its dynamic environment. It mainly consists of mesh routers., mesh clients and gateways which results in building a rich connection among the devices and nodes. Considering the functionalities of it., this paper presents an overview of different routing protocols for WMN's. In this paper., we analyzed the performances of soft computing and hard computing protocols i.e. AODV., DSR and BBBC. From simulations., we observed that on large networks BBBC based approach outperformed the performances of AODV and DSR.
无线网状网络(Wireless Mesh Network,简称WMN)是一种具有自愈等特性的通信网络。在动态环境中自动创建网络的能力。它主要由网状路由器组成。,网状客户端和网关,从而在设备和节点之间建立丰富的连接。考虑到它的功能。,本文概述了WMN的不同路由协议。在本文中。分析了软计算协议和硬计算协议AODV的性能。, DSR和bbc。从模拟。在大型网络上,我们观察到基于BBBC的方法优于AODV和DSR的性能。
{"title":"Recent Routing Approaches for WMN's: A State of Art","authors":"Bhanu Sharma, Amar Singh, Jimmy Singla","doi":"10.1109/ICCAKM50778.2021.9357747","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357747","url":null,"abstract":"WMN's or Wireless Mesh Network is a communication network that has features like self-healing., self-organizing and the ability to create a network automatically in its dynamic environment. It mainly consists of mesh routers., mesh clients and gateways which results in building a rich connection among the devices and nodes. Considering the functionalities of it., this paper presents an overview of different routing protocols for WMN's. In this paper., we analyzed the performances of soft computing and hard computing protocols i.e. AODV., DSR and BBBC. From simulations., we observed that on large networks BBBC based approach outperformed the performances of AODV and DSR.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121269501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic Block Chain and it's linkage with Artificial Intelligence: A new Approach 法医区块链及其与人工智能的联系:一种新方法
N. Mani, Soham Sanjay Parab, S. Manaswini, S. Philip, Parli B. Hari, Nrashant Singh
Forensic block chain is an emerging technique in the field of forensic science. It is a system integrated tool that helps in maintaining and representing the chain of custody, which ought to be maintained throughout the investigation. Forensic block chain is an approach wherein the investigators or law enforcement officials store the history of criminal case in a digitalized form on block chains which in turn stores the information on remote servers. The data regarding the criminal records are highly encrypted providing less probability for intruders to gain access into the system. Implementing artificial intelligence will help to manage and sort the data related to case records/criminal profile. AI helps in creating and analyzing a case report, and further processing of evidence. This will help the investigator to create more efficient hypothesis. Present study aims to link Artificial Intelligence to forensic block chain and develop a digitalize chain of custody of evidences that will help the forensic investigators to link the cases worldwide and help in solving crimes efficiently.
司法区块链是司法科学领域的一项新兴技术。它是一个系统综合工具,有助于维持和代表监管链,这应该在整个调查过程中保持。法医区块链是一种调查人员或执法人员将刑事案件的历史以数字化形式存储在区块链上的方法,而区块链又将信息存储在远程服务器上。有关犯罪记录的数据是高度加密的,从而减少了入侵者进入系统的可能性。实施人工智能将有助于管理和分类与案件记录/犯罪档案相关的数据。人工智能有助于创建和分析案例报告,并进一步处理证据。这将有助于研究者创造更有效的假设。本研究旨在将人工智能与法医区块链联系起来,开发一个数字化的证据保管链,帮助法医调查员将全球案件联系起来,帮助有效地解决犯罪问题。
{"title":"Forensic Block Chain and it's linkage with Artificial Intelligence: A new Approach","authors":"N. Mani, Soham Sanjay Parab, S. Manaswini, S. Philip, Parli B. Hari, Nrashant Singh","doi":"10.1109/ICCAKM50778.2021.9357739","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357739","url":null,"abstract":"Forensic block chain is an emerging technique in the field of forensic science. It is a system integrated tool that helps in maintaining and representing the chain of custody, which ought to be maintained throughout the investigation. Forensic block chain is an approach wherein the investigators or law enforcement officials store the history of criminal case in a digitalized form on block chains which in turn stores the information on remote servers. The data regarding the criminal records are highly encrypted providing less probability for intruders to gain access into the system. Implementing artificial intelligence will help to manage and sort the data related to case records/criminal profile. AI helps in creating and analyzing a case report, and further processing of evidence. This will help the investigator to create more efficient hypothesis. Present study aims to link Artificial Intelligence to forensic block chain and develop a digitalize chain of custody of evidences that will help the forensic investigators to link the cases worldwide and help in solving crimes efficiently.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121681257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Annular liquid sheets and its dynamics - A review 环形液片及其动力学综述
Raveendran Meloth Swaroop, K. S. Siddharth
Injectors exiting annular liquid sheets and its subsequent atomization find relevance in rocket propulsion applications. Numerous studies have been performed by researchers in the past for understanding the dynamics of disintegration of annular liquid sheets into droplets under the influence of various factors. The factors mainly include the instabilities on the sheet caused by the effect of surrounding gas flow, in particular. The article abridges the findings from the prominent studies done in this field with a focus on how imaging was used a tool in quantifying the same.
射出环形液片的喷射器及其随后的雾化在火箭推进应用中具有相关性。为了了解在各种因素的影响下,环形液片分解成液滴的动力学过程,研究人员过去已经进行了大量的研究。这些因素主要包括由于周围气流的影响而引起的薄板不稳定。这篇文章删节了在这个领域做的突出研究的发现,重点是如何使用成像工具来量化相同的。
{"title":"Annular liquid sheets and its dynamics - A review","authors":"Raveendran Meloth Swaroop, K. S. Siddharth","doi":"10.1109/iccakm50778.2021.9357721","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357721","url":null,"abstract":"Injectors exiting annular liquid sheets and its subsequent atomization find relevance in rocket propulsion applications. Numerous studies have been performed by researchers in the past for understanding the dynamics of disintegration of annular liquid sheets into droplets under the influence of various factors. The factors mainly include the instabilities on the sheet caused by the effect of surrounding gas flow, in particular. The article abridges the findings from the prominent studies done in this field with a focus on how imaging was used a tool in quantifying the same.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115792022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review and analysis of data security using image steganography 回顾和分析使用图像隐写术的数据安全性
Bharat Kapila, T. Thind
Development innovation and speedy Network make it simple and monetary to spread data across the globe. This leads people to think about their safety and their jobs. Steganography is a methodology that stops unwanted consumers from going towards simple information. Steganography and sophisticated watermarking offer procedures for consumers to hide and blend their data with other details that makes it impossible for attackers to see them. In this paper the main purpose is to research a couple of steganography and mechanized watermarking systems in both spatial and repeat spaces.
发展创新和快速网络使得在全球范围内传播数据变得简单和经济。这导致人们考虑他们的安全和他们的工作。隐写术是一种阻止不受欢迎的消费者获取简单信息的方法。隐写术和复杂的水印为消费者提供了隐藏数据的程序,并将其与其他细节混合在一起,使攻击者无法看到它们。本文的主要目的是研究空间和重复空间的隐写和机械化水印系统。
{"title":"Review and analysis of data security using image steganography","authors":"Bharat Kapila, T. Thind","doi":"10.1109/iccakm50778.2021.9357730","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357730","url":null,"abstract":"Development innovation and speedy Network make it simple and monetary to spread data across the globe. This leads people to think about their safety and their jobs. Steganography is a methodology that stops unwanted consumers from going towards simple information. Steganography and sophisticated watermarking offer procedures for consumers to hide and blend their data with other details that makes it impossible for attackers to see them. In this paper the main purpose is to research a couple of steganography and mechanized watermarking systems in both spatial and repeat spaces.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128614678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Emotion Recognition from Cross-lingual Speech: Arabic, English, and Urdu 跨语言语音的情绪识别分析:阿拉伯语、英语和乌尔都语
Moomal Farhad, H. Ismail, S. Harous, M. Masud, A. Beg
In a system which involves interaction be- tween machines and humans, the recognition of emotion from audio has always been a focus of research. Emotion recognition can play an essential role in many fields, such as medicine, law, psychology, and customer services. In this paper, we present an empirical comparative analysis of several machine learning classifiers for emotion recognition in audio data. Evaluations are performed for a set of predefined emotions such as happy, sad, and angry from Arabic, English, and Urdu languages. Pitch and cepstral features are extracted from audio files and principal component analysis is applied for dimensionality reduction. Experiments show that random forest outperformed other classifiers on Urdu dataset with an accuracy of 78.75%. However, the performance of Meta iterative classifier on Arabic dataset was better than random forest and neural network with the accuracy of 70%. Classification of emotions on the English dataset, which do not differ much in terms of pitch and MFCC features, generated the lowest accuracies at or below 31%.
在人机交互的系统中,声音情感识别一直是研究的热点。情感识别在医学、法律、心理学和客户服务等许多领域发挥着重要作用。在本文中,我们对几种用于音频数据情感识别的机器学习分类器进行了实证比较分析。对来自阿拉伯语、英语和乌尔都语的一组预定义的情绪(如快乐、悲伤和愤怒)执行评估。从音频文件中提取音调和倒谱特征,并应用主成分分析进行降维。实验表明,随机森林在乌尔都语数据集上的分类准确率达到78.75%,优于其他分类器。然而,Meta迭代分类器在阿拉伯语数据集上的性能优于随机森林和神经网络,准确率达到70%。在英语数据集上的情绪分类,在音高和MFCC特征方面没有太大差异,产生的准确率最低,在31%或以下。
{"title":"Analysis of Emotion Recognition from Cross-lingual Speech: Arabic, English, and Urdu","authors":"Moomal Farhad, H. Ismail, S. Harous, M. Masud, A. Beg","doi":"10.1109/iccakm50778.2021.9357726","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357726","url":null,"abstract":"In a system which involves interaction be- tween machines and humans, the recognition of emotion from audio has always been a focus of research. Emotion recognition can play an essential role in many fields, such as medicine, law, psychology, and customer services. In this paper, we present an empirical comparative analysis of several machine learning classifiers for emotion recognition in audio data. Evaluations are performed for a set of predefined emotions such as happy, sad, and angry from Arabic, English, and Urdu languages. Pitch and cepstral features are extracted from audio files and principal component analysis is applied for dimensionality reduction. Experiments show that random forest outperformed other classifiers on Urdu dataset with an accuracy of 78.75%. However, the performance of Meta iterative classifier on Arabic dataset was better than random forest and neural network with the accuracy of 70%. Classification of emotions on the English dataset, which do not differ much in terms of pitch and MFCC features, generated the lowest accuracies at or below 31%.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"692 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115116367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Second Round of FinTech - Trends and Challenges 第二轮金融科技——趋势与挑战
Anupam Mehrotra, S. Menon
Banking and Financial services landscape is characterized by a parallel growth of FinTech on the one hand and Iot, Big Data, block chain, Artificial Intelligence (AI) and Machine Learning on the other. While the first round of challenges involved adapting to phenomenal FinTech growth and strategizing either by creating FinTech capability in house or collaborating with the Fin Tech companies. The next round of challenges as they are coming up are to fuse the fourth generation technologies like IoT, block chain, AI and robotics into the FinTech architecture so as to generate a holistic package of services primarily to meet the fast changing demand pattern of millennial customers through solutions like mobile payments, budgeting, crowd funding, Robo Advising, Insurance, crypto currency, block chain, etc. The intricacy of the challenge involves introducing the latest technologies within the FinTech framework to make banking and financial services nimble, smooth and more customer centric than ever. What logically follows is meeting adequately the regulatory demands and defeating cyber-threats in the process. The instant paper attempts to analyze the impact of newer technological innovations within the financial services sector and the need to unlock the potential of FinTech that it may offer in the years to come.
银行和金融服务领域的特点是金融科技与物联网、大数据、区块链、人工智能(AI)和机器学习并行发展。而第一轮的挑战涉及适应惊人的金融科技增长,并通过在内部创建金融科技能力或与金融科技公司合作来制定战略。他们即将面临的下一轮挑战是将物联网、区块链、人工智能和机器人等第四代技术融合到金融科技架构中,从而通过移动支付、预算、众筹、机器人咨询、保险、加密货币、区块链等解决方案,产生一套全面的服务,主要满足千禧一代客户快速变化的需求模式。这一挑战的复杂性涉及在金融科技框架内引入最新技术,使银行和金融服务比以往任何时候都更加灵活、顺畅和以客户为中心。顺理成章的是充分满足监管要求,并在此过程中击败网络威胁。这篇即时论文试图分析新技术创新对金融服务行业的影响,以及在未来几年释放金融科技潜力的必要性。
{"title":"Second Round of FinTech - Trends and Challenges","authors":"Anupam Mehrotra, S. Menon","doi":"10.1109/ICCAKM50778.2021.9357759","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357759","url":null,"abstract":"Banking and Financial services landscape is characterized by a parallel growth of FinTech on the one hand and Iot, Big Data, block chain, Artificial Intelligence (AI) and Machine Learning on the other. While the first round of challenges involved adapting to phenomenal FinTech growth and strategizing either by creating FinTech capability in house or collaborating with the Fin Tech companies. The next round of challenges as they are coming up are to fuse the fourth generation technologies like IoT, block chain, AI and robotics into the FinTech architecture so as to generate a holistic package of services primarily to meet the fast changing demand pattern of millennial customers through solutions like mobile payments, budgeting, crowd funding, Robo Advising, Insurance, crypto currency, block chain, etc. The intricacy of the challenge involves introducing the latest technologies within the FinTech framework to make banking and financial services nimble, smooth and more customer centric than ever. What logically follows is meeting adequately the regulatory demands and defeating cyber-threats in the process. The instant paper attempts to analyze the impact of newer technological innovations within the financial services sector and the need to unlock the potential of FinTech that it may offer in the years to come.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128951311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Review of Cyber Securities in Smart Grid Technology 智能电网技术中的网络安全研究综述
Asif Iqbal Kawoosa, D. Prashar
A Smart Grid (SG) is an electrical infrastructure much like legacy power grid with scalable and pervasive two-way communications, timely control capabilities, large scale integration of distributed resources and efficient use of resources. The SG provides the features of pervasive smart monitoring technologies, automatic equipment fault sensing and self-healing. The features like ‘Wireless Automatic Meter Reading’ (WAMR), monitoring of power system stability, distributed energy resources optimization and applications of Demand Response system makes it intelligent infrastructure. Given some of these salient features, SGs without any doubt are the future power infrastructure of energy world. A smart grid has ability to connect millions of consumers and devices in a network which demand it to be highly robust, reliable and secure. Security is considered as one of the major challenges in the present-day smart grid systems because of its long-range communication on open networks. Cybercriminals, hackers, terrorists are trying to attack this national infrastructure due to their malicious intensions or to get control on the automated energy monitoring and remote controlling for personal gains. This review paper offers a comprehensive survey of understanding of Smart Grids, architecture of SGs, methodologies used, the communication protocols but the focus is mainly on the cyber-attacks carried out and solutions recommended on the smart grids. We finally discuss the various challenges in cyber security, the issues that still exist in the literature and current solution space with future research gap.
智能电网(SG)是一种类似传统电网的电力基础设施,具有可扩展和普遍的双向通信、及时控制能力、大规模集成分布式资源和有效利用资源。SG具有普适智能监控技术、设备故障自动感知和自愈等特点。无线自动抄表(WAMR)、电力系统稳定性监测、分布式能源优化和需求响应系统应用等功能使其成为智能基础设施。鉴于这些突出的特点,SGs无疑是能源世界未来的电力基础设施。智能电网有能力将数百万消费者和设备连接到一个网络中,这就要求它具有高度的健壮性、可靠性和安全性。由于智能电网在开放网络上进行远程通信,其安全性成为当前智能电网系统面临的主要挑战之一。网络犯罪分子、黑客、恐怖分子正试图攻击这些国家基础设施,因为他们的恶意意图或控制自动化能源监控和远程控制,以谋取个人利益。这篇综述文章提供了对智能电网的理解,SGs架构,使用的方法,通信协议的全面调查,但重点主要是在智能电网上进行的网络攻击和建议的解决方案。最后讨论了网络安全面临的各种挑战,文献中仍然存在的问题以及当前的解决方案空间和未来的研究差距。
{"title":"A Review of Cyber Securities in Smart Grid Technology","authors":"Asif Iqbal Kawoosa, D. Prashar","doi":"10.1109/iccakm50778.2021.9357698","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357698","url":null,"abstract":"A Smart Grid (SG) is an electrical infrastructure much like legacy power grid with scalable and pervasive two-way communications, timely control capabilities, large scale integration of distributed resources and efficient use of resources. The SG provides the features of pervasive smart monitoring technologies, automatic equipment fault sensing and self-healing. The features like ‘Wireless Automatic Meter Reading’ (WAMR), monitoring of power system stability, distributed energy resources optimization and applications of Demand Response system makes it intelligent infrastructure. Given some of these salient features, SGs without any doubt are the future power infrastructure of energy world. A smart grid has ability to connect millions of consumers and devices in a network which demand it to be highly robust, reliable and secure. Security is considered as one of the major challenges in the present-day smart grid systems because of its long-range communication on open networks. Cybercriminals, hackers, terrorists are trying to attack this national infrastructure due to their malicious intensions or to get control on the automated energy monitoring and remote controlling for personal gains. This review paper offers a comprehensive survey of understanding of Smart Grids, architecture of SGs, methodologies used, the communication protocols but the focus is mainly on the cyber-attacks carried out and solutions recommended on the smart grids. We finally discuss the various challenges in cyber security, the issues that still exist in the literature and current solution space with future research gap.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116303057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1