Pub Date : 2021-01-19DOI: 10.1109/iccakm50778.2021.9357764
Asra Kalim, C. K. Jha, D. Tomar, Divya Rishi Sahu
Web applications are providing the front end to the web users and service providers to easily facilitate the on demand access of web services through IP. So, web is repeatedly attracting the attackers to play with majority of web users from the remote end by exploiting its identity. Day by day attackers are exploiting the new web vulnerabilities at any stage of web environment including client side, server side or communication side. From the literature it has been identified that it is required to identify the newly emerging attack vectors and also require an easily updatable detection framework. So, in this paper firstly variants of frame jacking vulnerabilities and its severity have been explored. Secondly, a framework to identify the variants of frame jacking vulnerabilities is proposed. Thereafter, the proposed framework has been analyzed on different attack vectors generated and identified from the standard open source vulnerable projects. The log files generated at various stages of these vulnerable projects are scrutinized to test the accuracy of the developed framework as live dataset. It benefits to train proposed system for newly emerging attack vectors. Further, to perform the depth study, same framework has also been analyzed on existing available dataset. It fits the framework accurately on existing standards. It is observed from the validation of framework that the result of LogitBoost is more accurate on both the datasets rather than the other classification techniques including Naïve Bayes and J48.
{"title":"Novel Detection Technique For Framejacking Vulnerabilities In Web Applications","authors":"Asra Kalim, C. K. Jha, D. Tomar, Divya Rishi Sahu","doi":"10.1109/iccakm50778.2021.9357764","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357764","url":null,"abstract":"Web applications are providing the front end to the web users and service providers to easily facilitate the on demand access of web services through IP. So, web is repeatedly attracting the attackers to play with majority of web users from the remote end by exploiting its identity. Day by day attackers are exploiting the new web vulnerabilities at any stage of web environment including client side, server side or communication side. From the literature it has been identified that it is required to identify the newly emerging attack vectors and also require an easily updatable detection framework. So, in this paper firstly variants of frame jacking vulnerabilities and its severity have been explored. Secondly, a framework to identify the variants of frame jacking vulnerabilities is proposed. Thereafter, the proposed framework has been analyzed on different attack vectors generated and identified from the standard open source vulnerable projects. The log files generated at various stages of these vulnerable projects are scrutinized to test the accuracy of the developed framework as live dataset. It benefits to train proposed system for newly emerging attack vectors. Further, to perform the depth study, same framework has also been analyzed on existing available dataset. It fits the framework accurately on existing standards. It is observed from the validation of framework that the result of LogitBoost is more accurate on both the datasets rather than the other classification techniques including Naïve Bayes and J48.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-19DOI: 10.1109/iccakm50778.2021.9357727
Aparna Agarwal, Raza Hasan, V. R. Naidu, M. Saqib, Shyamala Srinivas, K. Jesrani
The education sector is always facing challenges related to various teaching and learning aspects. With continuous advancements in education technology, students, as well as staff, constantly face issues related to upgrading their knowledge to the next level. During the situation of COVID-19 pandemic, many educational organizations were forced to adopt these technologies very rapidly in order to keep themselves on track and not to lose their students involvement. This research paper has shown the effect of mobile technology and its role in the e-learning process during the online mode of study. A survey was conducted having 206 participants. The questionnaire was having 27 attributes. The research has used association rule mining technique such as CN2 Rule Induction. Principal Component Analysis was used to reduce the components and the gradient approach was used to optimize the results. The study shows a high impact on learning with the usage of mobile phones and better internet infrastructure providing learning anywhere at any time.
{"title":"Educational Association Mining on the Use of Media Platforms for e- Learning","authors":"Aparna Agarwal, Raza Hasan, V. R. Naidu, M. Saqib, Shyamala Srinivas, K. Jesrani","doi":"10.1109/iccakm50778.2021.9357727","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357727","url":null,"abstract":"The education sector is always facing challenges related to various teaching and learning aspects. With continuous advancements in education technology, students, as well as staff, constantly face issues related to upgrading their knowledge to the next level. During the situation of COVID-19 pandemic, many educational organizations were forced to adopt these technologies very rapidly in order to keep themselves on track and not to lose their students involvement. This research paper has shown the effect of mobile technology and its role in the e-learning process during the online mode of study. A survey was conducted having 206 participants. The questionnaire was having 27 attributes. The research has used association rule mining technique such as CN2 Rule Induction. Principal Component Analysis was used to reduce the components and the gradient approach was used to optimize the results. The study shows a high impact on learning with the usage of mobile phones and better internet infrastructure providing learning anywhere at any time.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130944272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-19DOI: 10.1109/iccakm50778.2021.9357734
A. Thahira, S. Sabitha
Nowadays, many people depending on online reviews for the purchasing decision of a product/ service. One of the characteristics of an online review system is that anyone can post a review that allows spammers to compose fake reviews. Recently, these spammers work as groups to intensify their activities and for maximum profit gains. Few works are concentrated on the detection of group spammers compared to individual review/reviewer spamming. This work proposes a framework to detect spammer groups using graph- based algorithms with five group spamming features and also proposes a new group spamming feature, Group Rating Similarity (GRS) based on the review rating score. The results show that the proposed framework performs well with five features when comparing with the existing work having seven features. Also, the proposed feature (GRS) shows better performance in discriminating spam and non-spam when experimented on realworld review datasets from the Yelp website.
{"title":"Graphical Framework For Review Spammer Group Detection Using Metadata","authors":"A. Thahira, S. Sabitha","doi":"10.1109/iccakm50778.2021.9357734","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357734","url":null,"abstract":"Nowadays, many people depending on online reviews for the purchasing decision of a product/ service. One of the characteristics of an online review system is that anyone can post a review that allows spammers to compose fake reviews. Recently, these spammers work as groups to intensify their activities and for maximum profit gains. Few works are concentrated on the detection of group spammers compared to individual review/reviewer spamming. This work proposes a framework to detect spammer groups using graph- based algorithms with five group spamming features and also proposes a new group spamming feature, Group Rating Similarity (GRS) based on the review rating score. The results show that the proposed framework performs well with five features when comparing with the existing work having seven features. Also, the proposed feature (GRS) shows better performance in discriminating spam and non-spam when experimented on realworld review datasets from the Yelp website.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134046700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-19DOI: 10.1109/iccakm50778.2021.9357758
Jaspal Singh, R. K. Tomar, N. Kaushika
In today's construction market, energy efficiency is of great importance, and it is important to understand how it can be integrated into a project's design and construction without compromising on other important aspects, such as aesthetics, space and cost. It is calculated that the energy consumption in buildings is very high as contrasted to the overall energy demand. The design and construction of energy-efficient buildings is gaining momentum, and an integrated design process is necessary. To achieve a home that satisfies the requirements of the owner, a balance between all elements is necessary. Building projects design is a systematic decision-making process in which the properties and actions of the building at later stages are determined by decisions made at an early stage. This article would include complete discussion on solutions to energy storage and conservation methods which concludes that utilizing Phase Change Materials (PCM) for thermal energy storage strategies in buildings can meet the potential thermal comfort requirements when selected properly, A summary of used PCMs and their respective properties is presented in this paper. This article also establishes the possibilities of how to reduce energy consumption and lower the dependency on non-renewable energy sources.
{"title":"Analysis of thermal energy storage system to achieve net zero energy building in Composite Climate","authors":"Jaspal Singh, R. K. Tomar, N. Kaushika","doi":"10.1109/iccakm50778.2021.9357758","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357758","url":null,"abstract":"In today's construction market, energy efficiency is of great importance, and it is important to understand how it can be integrated into a project's design and construction without compromising on other important aspects, such as aesthetics, space and cost. It is calculated that the energy consumption in buildings is very high as contrasted to the overall energy demand. The design and construction of energy-efficient buildings is gaining momentum, and an integrated design process is necessary. To achieve a home that satisfies the requirements of the owner, a balance between all elements is necessary. Building projects design is a systematic decision-making process in which the properties and actions of the building at later stages are determined by decisions made at an early stage. This article would include complete discussion on solutions to energy storage and conservation methods which concludes that utilizing Phase Change Materials (PCM) for thermal energy storage strategies in buildings can meet the potential thermal comfort requirements when selected properly, A summary of used PCMs and their respective properties is presented in this paper. This article also establishes the possibilities of how to reduce energy consumption and lower the dependency on non-renewable energy sources.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122998572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-19DOI: 10.1109/ICCAKM50778.2021.9357712
R. Potluri, Mahwish Anjam
Purpose - This study aims to explore various methods of knowledge Transfer (KT) in the UAE Higher Education Institutions (HEIs) (both pre and post COVD-19 pandemic) and to measure the satisfaction level of instructors and students towards these methods. This study also aims to identify the type of learning most and least supported by online KT process and to identify the challenges faced by instructors and students while using the online KT process during COVID-19 pandemic. The study revealed that more than 92 percent of both students and instructors expressed their satisfaction with the knowledge transfer methods introduced by higher education institutions in the UAE. The outcome of the research is worthwhile for both Emirati and foreign higher education institutions, which are operating in the UAE and even in the middle east, to promote their academic programs in their respective markets during and after the Covid-19 pandemic. This paper provides a through insight for the policy makers at higher institutions in UAE for considering online mode as a substitute/simultaneous approach for knowledge transfer.
{"title":"Knowledge Transfer in UAE Higher Education Institutions During Covid-19 Pandemic: Learners' Cannot Learn Surgery by Watching","authors":"R. Potluri, Mahwish Anjam","doi":"10.1109/ICCAKM50778.2021.9357712","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357712","url":null,"abstract":"Purpose - This study aims to explore various methods of knowledge Transfer (KT) in the UAE Higher Education Institutions (HEIs) (both pre and post COVD-19 pandemic) and to measure the satisfaction level of instructors and students towards these methods. This study also aims to identify the type of learning most and least supported by online KT process and to identify the challenges faced by instructors and students while using the online KT process during COVID-19 pandemic. The study revealed that more than 92 percent of both students and instructors expressed their satisfaction with the knowledge transfer methods introduced by higher education institutions in the UAE. The outcome of the research is worthwhile for both Emirati and foreign higher education institutions, which are operating in the UAE and even in the middle east, to promote their academic programs in their respective markets during and after the Covid-19 pandemic. This paper provides a through insight for the policy makers at higher institutions in UAE for considering online mode as a substitute/simultaneous approach for knowledge transfer.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132033026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-19DOI: 10.1109/iccakm50778.2021.9357706
N. Saqib, Mir Mohammad Yousuf, M. Rashid
Advanced methods like autonomous cars are usually designed as a composition of characteristics which are independent functionality units. Functionalities prefer to interact and unknowingly impact each other's behavior. But the major problem is to detect and handle the functionalities interactions, especially those that breach the system requirements, resulting in failure. In this paper, we will review the current technologies used for autonomous cars including design issues, testing and implementation. Based on our review, we have highlighted the various issues involved in the design and implementation of autonomous vehicles based on the parameters of map, cost and software complexity. We believe that our review will help researchers in the field of autonomous vehicles to refine works in state-of-art towards better implementations.
{"title":"Design and Implementation Issues in Autonomous Vehicles- A Comparative Review","authors":"N. Saqib, Mir Mohammad Yousuf, M. Rashid","doi":"10.1109/iccakm50778.2021.9357706","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357706","url":null,"abstract":"Advanced methods like autonomous cars are usually designed as a composition of characteristics which are independent functionality units. Functionalities prefer to interact and unknowingly impact each other's behavior. But the major problem is to detect and handle the functionalities interactions, especially those that breach the system requirements, resulting in failure. In this paper, we will review the current technologies used for autonomous cars including design issues, testing and implementation. Based on our review, we have highlighted the various issues involved in the design and implementation of autonomous vehicles based on the parameters of map, cost and software complexity. We believe that our review will help researchers in the field of autonomous vehicles to refine works in state-of-art towards better implementations.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121483208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-19DOI: 10.1109/iccakm50778.2021.9357736
T. Varun, G. Suseendran
Aimed at issues with a fixed university asset management, simultaneous funding, construction; poor utilization levels, details on the fixed university's asset database The Internet- Control System of Things is being investigated and developed in. Through using Server in SQL platform in a database, device integrates the Internet of Things technologies with the Computer Internet of Things technologies are applied in the control of computerization the University's fixed asset. In the meanwhile, a systemized, standardized and a science-based asset fixed management system is being developed, this puts together current opportunities and challenges to the transformation of the money administration of the university.
{"title":"Reforming fixed asset database in university using SQL database management system","authors":"T. Varun, G. Suseendran","doi":"10.1109/iccakm50778.2021.9357736","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357736","url":null,"abstract":"Aimed at issues with a fixed university asset management, simultaneous funding, construction; poor utilization levels, details on the fixed university's asset database The Internet- Control System of Things is being investigated and developed in. Through using Server in SQL platform in a database, device integrates the Internet of Things technologies with the Computer Internet of Things technologies are applied in the control of computerization the University's fixed asset. In the meanwhile, a systemized, standardized and a science-based asset fixed management system is being developed, this puts together current opportunities and challenges to the transformation of the money administration of the university.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115182265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-09DOI: 10.1109/iccakm50778.2021.9357724
Abhinav Palia, Caroline Devlin, Megan Yelorda
Any program or a project that is designed to accomplish certain objectives, needs to establish program level controls pertaining to the overall goal. A critical aspect that determines the success of a program is the quality of the controls and their effectiveness in accomplishing the goal. Traditional Control Maturity Models primarily focus on the efficiency, management, and optimization of controls, while only indirectly measuring control effectiveness which neglects an essential aspect of control efficacy. In this paper, we highlight the ineffectiveness of these models, outline an adaptable program controls framework, and provide an approach to define measurable attributes (metrics) that enable a zero-defect program. To the best of our knowledge, we believe this is the first paper that provides a structured approach to defining a controls measurement framework and creation of effectiveness metrics that can be adopted by a variety of program use cases.
{"title":"Program Controls Effectiveness Measurement Framework & Metrics","authors":"Abhinav Palia, Caroline Devlin, Megan Yelorda","doi":"10.1109/iccakm50778.2021.9357724","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357724","url":null,"abstract":"Any program or a project that is designed to accomplish certain objectives, needs to establish program level controls pertaining to the overall goal. A critical aspect that determines the success of a program is the quality of the controls and their effectiveness in accomplishing the goal. Traditional Control Maturity Models primarily focus on the efficiency, management, and optimization of controls, while only indirectly measuring control effectiveness which neglects an essential aspect of control efficacy. In this paper, we highlight the ineffectiveness of these models, outline an adaptable program controls framework, and provide an approach to define measurable attributes (metrics) that enable a zero-defect program. To the best of our knowledge, we believe this is the first paper that provides a structured approach to defining a controls measurement framework and creation of effectiveness metrics that can be adopted by a variety of program use cases.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"16 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114007489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This task overwhelmingly consolidates by the two-study fields-based control frameworks and information gathering procedure, to make an enormous information base framework relying upon the utilized credits to create the introduced information. The fundamental things here have been picked dependent on the sensors that are utilized fiercely to construct the framework to plan an effective climate checking venture. The prescribed sensors are utilized here to gauge and assemble the Temperature and Humidity information. Weather Monitoring proposes of a framework that screens climate progressively over a portable application. This ease or less expensive stage for joining all these electronic gadgets and various sorts of sensors by utilizing the web network is given by Arduino UNO. Recording climate which can be effectively observed distantly with the assistance of Arduino UNO by means of Internet of Things is the primary expectation of the work. This will give clients a more straightforward, solid and expedient approach to screen climate and different boundaries of the climate.
{"title":"IoT Based Weather Monitoring System Using Arduino-UNO","authors":"Lipsa Das, Akhilesh Kumar, Saurav Singh, Ahmad Raheel Ashar, Rishab Jangu","doi":"10.1109/ICCAKM50778.2021.9357748","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357748","url":null,"abstract":"This task overwhelmingly consolidates by the two-study fields-based control frameworks and information gathering procedure, to make an enormous information base framework relying upon the utilized credits to create the introduced information. The fundamental things here have been picked dependent on the sensors that are utilized fiercely to construct the framework to plan an effective climate checking venture. The prescribed sensors are utilized here to gauge and assemble the Temperature and Humidity information. Weather Monitoring proposes of a framework that screens climate progressively over a portable application. This ease or less expensive stage for joining all these electronic gadgets and various sorts of sensors by utilizing the web network is given by Arduino UNO. Recording climate which can be effectively observed distantly with the assistance of Arduino UNO by means of Internet of Things is the primary expectation of the work. This will give clients a more straightforward, solid and expedient approach to screen climate and different boundaries of the climate.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115795977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}