首页 > 最新文献

2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)最新文献

英文 中文
[Confluence 2020 Front Matter] [合流2020前沿事项]
Pub Date : 2020-01-01 DOI: 10.1109/confluence47617.2020.9058231
{"title":"[Confluence 2020 Front Matter]","authors":"","doi":"10.1109/confluence47617.2020.9058231","DOIUrl":"https://doi.org/10.1109/confluence47617.2020.9058231","url":null,"abstract":"","PeriodicalId":180005,"journal":{"name":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent Trends in Nature Inspired Computation with Applications to Deep Learning 自然启发计算的最新趋势及其在深度学习中的应用
Pub Date : 2020-01-01 DOI: 10.1109/Confluence47617.2020.9057841
Vandana Bharti, Bhaskar Biswas, K. K. Shukla
Nature-inspired computations are commonly recognized optimization techniques that provide optimal solutions to a wide spectrum of computational problems. This paper presents a brief overview of current topics in the field of nature-inspired computation along with their most recent applications in deep learning to identify open challenges concerning the most relevant areas. In addition, we highlight some recent hybridization methods of nature-inspired computation used to optimize the hyper-parameters and architectures of a deep learning framework. Future research as well as prospective deep learning issues are also presented.
受自然启发的计算是一种公认的优化技术,它为广泛的计算问题提供了最佳解决方案。本文简要概述了自然启发计算领域的当前主题,以及它们在深度学习中的最新应用,以确定最相关领域的开放挑战。此外,我们重点介绍了一些最近的自然启发计算的杂交方法,用于优化深度学习框架的超参数和架构。未来的研究以及前瞻性的深度学习问题也被提出。
{"title":"Recent Trends in Nature Inspired Computation with Applications to Deep Learning","authors":"Vandana Bharti, Bhaskar Biswas, K. K. Shukla","doi":"10.1109/Confluence47617.2020.9057841","DOIUrl":"https://doi.org/10.1109/Confluence47617.2020.9057841","url":null,"abstract":"Nature-inspired computations are commonly recognized optimization techniques that provide optimal solutions to a wide spectrum of computational problems. This paper presents a brief overview of current topics in the field of nature-inspired computation along with their most recent applications in deep learning to identify open challenges concerning the most relevant areas. In addition, we highlight some recent hybridization methods of nature-inspired computation used to optimize the hyper-parameters and architectures of a deep learning framework. Future research as well as prospective deep learning issues are also presented.","PeriodicalId":180005,"journal":{"name":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130746725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Identification of the most efficient algorithm to find Hamiltonian Path in practical conditions 确定在实际条件下寻找哈密顿路径的最有效算法
Pub Date : 2020-01-01 DOI: 10.1109/Confluence47617.2020.9058283
Karanjot Singh, S. Bedi, P. Gaur
Travelling Salesman Problem (TSP) is a real-world Non-deterministic polynomial-time hard – combinatorial optimization problem. Given several points (cities) to be visited, the objective of the problem is to find the shortest possible route (called Hamiltonian Path) that visits each point exactly once and returns back to the starting point. Several exact, approximate and heuristic algorithms have been proposed to solve the TSP. The objective of this paper is to compare 10 such different algorithms on the basis of cost of the path found and time taken to find that solution in order to identify an algorithm which works most efficiently and thus, can be used in practical scenarios. Therefore, the comparative analysis has been made without time constraints as a preliminary test and then with a constraint of 1 second to determine the most efficient algorithm. This algorithm was then used at the core of the web-based tool (a practical use case) developed for release in public domain which helps users find an optimal round-trip route (i.e. Hamiltonian Path) among the points marked on the map. Google Maps API was used for providing map interface and obtaining real-time distance/duration data (matrix) in the web-application front end.
旅行商问题(TSP)是一个现实世界中的非确定性多项式时间难组合优化问题。给定几个要访问的点(城市),问题的目标是找到最短的可能路线(称为哈密顿路径),该路线只访问每个点一次并返回到起点。提出了几种精确、近似和启发式算法来求解TSP。本文的目的是在找到路径的成本和找到解决方案所需的时间的基础上比较10种不同的算法,以确定一种最有效的算法,从而可以在实际场景中使用。因此,我们先在没有时间约束的情况下进行对比分析,作为初步测试,然后再加上1秒的约束,以确定最有效的算法。该算法随后被用于基于网络的工具(一个实际用例)的核心,该工具开发用于公共领域,帮助用户在地图上标记的点之间找到最佳往返路线(即汉密尔顿路径)。在web应用前端使用Google Maps API提供地图接口,获取实时距离/持续时间数据(矩阵)。
{"title":"Identification of the most efficient algorithm to find Hamiltonian Path in practical conditions","authors":"Karanjot Singh, S. Bedi, P. Gaur","doi":"10.1109/Confluence47617.2020.9058283","DOIUrl":"https://doi.org/10.1109/Confluence47617.2020.9058283","url":null,"abstract":"Travelling Salesman Problem (TSP) is a real-world Non-deterministic polynomial-time hard – combinatorial optimization problem. Given several points (cities) to be visited, the objective of the problem is to find the shortest possible route (called Hamiltonian Path) that visits each point exactly once and returns back to the starting point. Several exact, approximate and heuristic algorithms have been proposed to solve the TSP. The objective of this paper is to compare 10 such different algorithms on the basis of cost of the path found and time taken to find that solution in order to identify an algorithm which works most efficiently and thus, can be used in practical scenarios. Therefore, the comparative analysis has been made without time constraints as a preliminary test and then with a constraint of 1 second to determine the most efficient algorithm. This algorithm was then used at the core of the web-based tool (a practical use case) developed for release in public domain which helps users find an optimal round-trip route (i.e. Hamiltonian Path) among the points marked on the map. Google Maps API was used for providing map interface and obtaining real-time distance/duration data (matrix) in the web-application front end.","PeriodicalId":180005,"journal":{"name":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113935441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach for Isolation of Sinkhole Attack in Wireless Sensor Networks 一种新的无线传感器网络天坑攻击隔离方法
Pub Date : 2020-01-01 DOI: 10.1109/Confluence47617.2020.9057981
P. Kala, A. Agrawal, Rishi Sharma
Maintaining security and energy consumption of wireless sensor networks is a bit difficult due to non-availability of any central controller. They are also self-configuring in nature. Such types of networks are susceptible to several types of attacks. In this paper, we focus on one such attack called sink hole attack in which the malicious nodes spoof identification of base station and act like base station. The sensor nodes start transmitting data to malicious node instead of base station. This paper proposes a new technique to identify and eliminate such malicious nodes using identity verification to provide a secure environment for communication in the network. Proposed technique is implemented in NS2 and extensive simulations are performed to obtain the results. Results indicate the superiority of the proposed approach over existing approaches in terms of (packet loss, energy consumption, delay and throughput).
由于没有任何中央控制器可用,无线传感器网络的安全性和能耗的维护有点困难。它们在本质上也是自配置的。这种类型的网络容易受到几种类型的攻击。本文主要研究了一种恶意节点欺骗基站识别并充当基站的沉洞攻击。传感器节点开始将数据传输给恶意节点,而不是基站。本文提出了一种利用身份验证来识别和消除此类恶意节点的新技术,为网络通信提供安全的环境。在NS2中实现了该技术,并进行了大量的仿真以获得结果。结果表明,该方法在(丢包、能耗、延迟和吞吐量)方面优于现有方法。
{"title":"A Novel Approach for Isolation of Sinkhole Attack in Wireless Sensor Networks","authors":"P. Kala, A. Agrawal, Rishi Sharma","doi":"10.1109/Confluence47617.2020.9057981","DOIUrl":"https://doi.org/10.1109/Confluence47617.2020.9057981","url":null,"abstract":"Maintaining security and energy consumption of wireless sensor networks is a bit difficult due to non-availability of any central controller. They are also self-configuring in nature. Such types of networks are susceptible to several types of attacks. In this paper, we focus on one such attack called sink hole attack in which the malicious nodes spoof identification of base station and act like base station. The sensor nodes start transmitting data to malicious node instead of base station. This paper proposes a new technique to identify and eliminate such malicious nodes using identity verification to provide a secure environment for communication in the network. Proposed technique is implemented in NS2 and extensive simulations are performed to obtain the results. Results indicate the superiority of the proposed approach over existing approaches in terms of (packet loss, energy consumption, delay and throughput).","PeriodicalId":180005,"journal":{"name":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114364843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using Software Metrics to detect Temporary Field code smell 使用软件度量来检测临时字段代码气味
Pub Date : 2020-01-01 DOI: 10.1109/Confluence47617.2020.9058138
Ruchin Gupta, S. Singh
Code smell is a characteristic of the source code which indicates some serious problem in the code which might affect the quality of the source code. There exists a list of 22 code smells as defined by Martin Fowler. But all these code smells have not been worked upon. Temporary field code smell is one of them, which has not been considered for its detection and refactoring. In this paper, we have reconstructed a motivating example of object oriented JAVA code that indicates the impact of code smell and need to remove temporary field based on metrics and rules.We have proposed a method to detect temporary field code smell based on software metrics derived from data flow and control flow graphs. We also proposed the process of refactoring the code to improve the maintainability. Analysis of results has shown that NFM, NMN, NCF metrics can help to detect Temporary field code smell. Extract class is more appropriate refactoring technique than parameter passing to remove Temporary Field code smell.
代码气味是源代码的一种特征,它表明代码中存在一些严重的问题,这些问题可能会影响源代码的质量。Martin Fowler定义了一个包含22种代码气味的列表。但是所有这些代码气味都没有得到处理。临时字段代码气味就是其中之一,它的检测和重构尚未被考虑。在本文中,我们重构了一个具有启动性的面向对象JAVA代码示例,该示例指出了代码气味的影响,以及需要基于度量和规则删除临时字段。我们提出了一种基于数据流和控制流图的软件度量来检测临时字段代码气味的方法。我们还提出了重构代码的过程,以提高可维护性。分析结果表明,NFM, NMN, NCF指标可以帮助检测临时字段代码气味。提取类是比参数传递更合适的重构技术,可以消除临时字段代码的气味。
{"title":"Using Software Metrics to detect Temporary Field code smell","authors":"Ruchin Gupta, S. Singh","doi":"10.1109/Confluence47617.2020.9058138","DOIUrl":"https://doi.org/10.1109/Confluence47617.2020.9058138","url":null,"abstract":"Code smell is a characteristic of the source code which indicates some serious problem in the code which might affect the quality of the source code. There exists a list of 22 code smells as defined by Martin Fowler. But all these code smells have not been worked upon. Temporary field code smell is one of them, which has not been considered for its detection and refactoring. In this paper, we have reconstructed a motivating example of object oriented JAVA code that indicates the impact of code smell and need to remove temporary field based on metrics and rules.We have proposed a method to detect temporary field code smell based on software metrics derived from data flow and control flow graphs. We also proposed the process of refactoring the code to improve the maintainability. Analysis of results has shown that NFM, NMN, NCF metrics can help to detect Temporary field code smell. Extract class is more appropriate refactoring technique than parameter passing to remove Temporary Field code smell.","PeriodicalId":180005,"journal":{"name":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114786568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT in Automobile Sector: State of the Art 汽车领域的物联网:最新进展
Pub Date : 2020-01-01 DOI: 10.1109/Confluence47617.2020.9058202
Aakarsh Shrivastava, Anshul Bhardwaj, Nitasha Hasteer
The world is moving towards new and innovative approaches for making human life much more simpler and easier by automating every task that requires human effort. IoT has been proved to be a boon in this direction. IoT is currently being used in many sectors, automobile being one of them. Need of smart car is not new and various initiatives in research and development has been going on to implement IoT in automobile sector to provide a better vehicular service to consumers. A systematic literature review of IoT in the automobile sector is the major focus of the study. To undertake this review, various studies were taken into consideration. As a result we were able to classify the studies into various sub domains and also were able to identify the current trends and open issues.
世界正朝着新的和创新的方法发展,通过自动化每一项需要人类努力的任务,使人类的生活更简单、更容易。物联网已被证明是这个方向的福音。物联网目前被应用于许多领域,汽车就是其中之一。智能汽车的需求并不新鲜,为了在汽车领域实现物联网,为消费者提供更好的汽车服务,各种研发举措一直在进行。对汽车行业物联网的系统文献综述是本研究的主要重点。为了进行这项审查,我们考虑了各种研究。因此,我们能够将研究分类到不同的子领域,也能够确定当前的趋势和开放的问题。
{"title":"IoT in Automobile Sector: State of the Art","authors":"Aakarsh Shrivastava, Anshul Bhardwaj, Nitasha Hasteer","doi":"10.1109/Confluence47617.2020.9058202","DOIUrl":"https://doi.org/10.1109/Confluence47617.2020.9058202","url":null,"abstract":"The world is moving towards new and innovative approaches for making human life much more simpler and easier by automating every task that requires human effort. IoT has been proved to be a boon in this direction. IoT is currently being used in many sectors, automobile being one of them. Need of smart car is not new and various initiatives in research and development has been going on to implement IoT in automobile sector to provide a better vehicular service to consumers. A systematic literature review of IoT in the automobile sector is the major focus of the study. To undertake this review, various studies were taken into consideration. As a result we were able to classify the studies into various sub domains and also were able to identify the current trends and open issues.","PeriodicalId":180005,"journal":{"name":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124038369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Supervised Machine Learning Algorithms for Credit Card Fraud Detection: A Comparison 信用卡欺诈检测的监督机器学习算法:比较
Pub Date : 2020-01-01 DOI: 10.1109/Confluence47617.2020.9057851
Samidha Khatri, Aishwarya Arora, A. Agrawal
In today’s economic scenario, credit card use has become extremely commonplace. These cards allow the user to make payments of large sums of money without the need to carry large sums of cash. They have revolutionized the way of making cashless payments and made making any sort of payments convenient for the buyer. This electronic form of payment is extremely useful but comes with its own set of risks. With the increasing number of users, credit card frauds are also increasing at a similar pace. The credit card information of a particular individual can be collected illegally and can be used for fraudulent transactions. Some Machine Learning Algorithms can be applied to collect data to tackle this problem. This paper presents a comparison of some established supervised learning algorithms to differentiate between genuine and fraudulent transactions.
在今天的经济情况下,信用卡的使用已经变得非常普遍。这些卡允许用户支付大笔的钱,而不需要携带大量的现金。他们彻底改变了无现金支付的方式,让买家可以方便地进行任何形式的支付。这种电子支付方式非常有用,但也有其自身的风险。随着用户数量的增加,信用卡诈骗也在以类似的速度增长。特定个人的信用卡信息可能被非法收集,并可能被用于欺诈交易。一些机器学习算法可以用来收集数据来解决这个问题。本文介绍了一些已建立的监督学习算法的比较,以区分真实交易和欺诈交易。
{"title":"Supervised Machine Learning Algorithms for Credit Card Fraud Detection: A Comparison","authors":"Samidha Khatri, Aishwarya Arora, A. Agrawal","doi":"10.1109/Confluence47617.2020.9057851","DOIUrl":"https://doi.org/10.1109/Confluence47617.2020.9057851","url":null,"abstract":"In today’s economic scenario, credit card use has become extremely commonplace. These cards allow the user to make payments of large sums of money without the need to carry large sums of cash. They have revolutionized the way of making cashless payments and made making any sort of payments convenient for the buyer. This electronic form of payment is extremely useful but comes with its own set of risks. With the increasing number of users, credit card frauds are also increasing at a similar pace. The credit card information of a particular individual can be collected illegally and can be used for fraudulent transactions. Some Machine Learning Algorithms can be applied to collect data to tackle this problem. This paper presents a comparison of some established supervised learning algorithms to differentiate between genuine and fraudulent transactions.","PeriodicalId":180005,"journal":{"name":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122144183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Comparative Analysis of OpenCV Recognisers for Face Recognition 用于人脸识别的OpenCV识别器的比较分析
Pub Date : 2020-01-01 DOI: 10.1109/Confluence47617.2020.9058014
Lokesh Khurana, Arun Chauhan, Prabhishek Singh
In today’s world, face recognition has turned out to be one of the key aspects of Computer Vision. People are truly adept at perceiving faces and computer complex figures. Indeed, even an entry of time doesn’t influence this ability and along these lines, it would help become as hearty as people in face acknowledgment. Machine acknowledgment of human countenances from still or video pictures has pulled in a lot of consideration in the brain research, picture handling, design acknowledgment, neural science, computer security, and computer vision networks. Face recognition is presumably a standout amongst the most non-meddlesome and easy to use biometric validation techniques right now accessible; a screensaver furnished with face recognition innovation can naturally open the screen at whatever point the approved client approaches the machine. Tech organizations are utilizing these uncommon advances in their items nowadays in all respects now and again. The face is a significant piece of our identity and how individuals recognize us. Face recognition has been one of the fast-growing, exacting and very keen areas in real-time applications. It is seemingly an individual’s most extraordinary physical trademark. While people have had the intrinsic capacity to perceive and recognize various faces for many years, computers are a little difficult to perform so while it’s getting up to speed. Facial recognition programming is intended to pinpoint a face and measure its highlights or various components. Each face has a certain breakthrough, which makes up the distinctive facial highlights. These milestones are implied as nodal focuses. There are around 80 nodal focuses on a human face.
在当今世界,人脸识别已经成为计算机视觉的一个关键方面。人们真的很擅长感知人脸和计算机复杂的图形。事实上,即使时间的流逝也不会影响这种能力,沿着这条线,它会帮助你变得像人们一样真诚。从静止或视频图像中识别人脸,在大脑研究、图像处理、设计识别、神经科学、计算机安全、计算机视觉网络等领域引起了广泛关注。人脸识别可能是目前最不受干扰、最容易使用的生物识别验证技术之一;具有面部识别创新功能的屏幕保护程序可以在客户接近机器的任何点上自然地打开屏幕。如今,科技公司在各个方面都在利用这些不寻常的进步。脸是我们身份的重要组成部分,也是人们如何识别我们的方式。人脸识别已经成为实时应用中发展最快、要求最高、应用最为活跃的领域之一。它似乎是一个人最非凡的身体标志。虽然多年来人们已经有了感知和识别各种面孔的内在能力,但计算机在加速发展的过程中,要做到这一点有点困难。面部识别程序旨在精确定位面部并测量其亮点或各种组成部分。每一张脸都有一定的突破,构成了与众不同的面部亮点。这些里程碑隐含为节点焦点。人脸上大约有80个节点焦点。
{"title":"Comparative Analysis of OpenCV Recognisers for Face Recognition","authors":"Lokesh Khurana, Arun Chauhan, Prabhishek Singh","doi":"10.1109/Confluence47617.2020.9058014","DOIUrl":"https://doi.org/10.1109/Confluence47617.2020.9058014","url":null,"abstract":"In today’s world, face recognition has turned out to be one of the key aspects of Computer Vision. People are truly adept at perceiving faces and computer complex figures. Indeed, even an entry of time doesn’t influence this ability and along these lines, it would help become as hearty as people in face acknowledgment. Machine acknowledgment of human countenances from still or video pictures has pulled in a lot of consideration in the brain research, picture handling, design acknowledgment, neural science, computer security, and computer vision networks. Face recognition is presumably a standout amongst the most non-meddlesome and easy to use biometric validation techniques right now accessible; a screensaver furnished with face recognition innovation can naturally open the screen at whatever point the approved client approaches the machine. Tech organizations are utilizing these uncommon advances in their items nowadays in all respects now and again. The face is a significant piece of our identity and how individuals recognize us. Face recognition has been one of the fast-growing, exacting and very keen areas in real-time applications. It is seemingly an individual’s most extraordinary physical trademark. While people have had the intrinsic capacity to perceive and recognize various faces for many years, computers are a little difficult to perform so while it’s getting up to speed. Facial recognition programming is intended to pinpoint a face and measure its highlights or various components. Each face has a certain breakthrough, which makes up the distinctive facial highlights. These milestones are implied as nodal focuses. There are around 80 nodal focuses on a human face.","PeriodicalId":180005,"journal":{"name":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115478300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Machine Learning Based Recommendation System 基于机器学习的推荐系统
Pub Date : 2020-01-01 DOI: 10.1109/Confluence47617.2020.9058196
Subhankar Ganguli, Sanjeev Thakur
Recommender system helps people in decision making by asking their preferences about various items and recommends other items that have not been rated yet and are similar to their taste. A traditional recommendation system aims at generating a set of recommendations based on inter-user similarity that will satisfy the target user. Positive preferences as well as negative preferences of the users are taken into account so as to find strongly related users. Weighted entropy is usedz as a similarity measure to determine the similar taste users. The target user is asked to fill in the ratings so as to identify the closely related users from the knowledge base and top N recommendations are produced accordingly. Results show a considerable amount of improvement in accuracy after using weighted entropy and opposite preferences as a similarity measure.
推荐系统通过询问人们对各种商品的偏好来帮助人们做出决定,并推荐其他尚未评级但与他们的口味相似的商品。传统的推荐系统旨在根据用户间的相似度生成一组满足目标用户的推荐。考虑用户的积极偏好和消极偏好,从而找到强相关的用户。使用加权熵作为相似性度量来确定相似口味的用户。要求目标用户填写评分,以便从知识库中识别出密切相关的用户,并相应地产生top N推荐。结果表明,在使用加权熵和相反偏好作为相似性度量后,准确度有相当大的提高。
{"title":"Machine Learning Based Recommendation System","authors":"Subhankar Ganguli, Sanjeev Thakur","doi":"10.1109/Confluence47617.2020.9058196","DOIUrl":"https://doi.org/10.1109/Confluence47617.2020.9058196","url":null,"abstract":"Recommender system helps people in decision making by asking their preferences about various items and recommends other items that have not been rated yet and are similar to their taste. A traditional recommendation system aims at generating a set of recommendations based on inter-user similarity that will satisfy the target user. Positive preferences as well as negative preferences of the users are taken into account so as to find strongly related users. Weighted entropy is usedz as a similarity measure to determine the similar taste users. The target user is asked to fill in the ratings so as to identify the closely related users from the knowledge base and top N recommendations are produced accordingly. Results show a considerable amount of improvement in accuracy after using weighted entropy and opposite preferences as a similarity measure.","PeriodicalId":180005,"journal":{"name":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127521145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection and Prevention using Honeypot Network for Cloud Security 基于蜜罐网络的云安全入侵检测与防御
Pub Date : 2020-01-01 DOI: 10.1109/Confluence47617.2020.9057961
Poorvika Singh Negi, A. Garg, Roshan Lal
With the rapid increase in the number of users, there is a rise in issues related to hardware failure, web hosting, space and memory allocation of data, which is directly or indirectly leading to the loss of data. With the objective of providing services that are reliable, fast and low in cost, we turn to cloud-computing practices. With a tremendous development in this technology, there is ever increasing chance of its security being compromised by malicious users. A way to divert malicious traffic away from systems is by using Honeypot. It is a colossal strategy that has shown signs of improvement in security of systems. Keeping in mind the various legal issues one may face while deploying Honeypot on third-party cloud vendor servers, the concept of Honeypot is implemented in a file-sharing application which is deployed on cloud server. This paper discusses the detection attacks in a cloud-based environment as well as the use of Honeypot for its security, thereby proposing a new technique to do the same.
随着用户数量的迅速增加,与硬件故障、web托管、数据的空间和内存分配相关的问题也随之增多,直接或间接地导致数据的丢失。为了提供可靠、快速和低成本的服务,我们转向云计算实践。随着该技术的飞速发展,其安全性被恶意用户破坏的可能性也越来越大。将恶意流量从系统转移的一种方法是使用蜜罐。这是一项巨大的战略,在系统安全方面已经显示出改善的迹象。考虑到在第三方云服务器上部署蜜罐时可能面临的各种法律问题,蜜罐的概念是在部署在云服务器上的文件共享应用程序中实现的。本文讨论了基于云的环境下的检测攻击以及蜜罐的安全使用,从而提出了一种新的检测攻击技术。
{"title":"Intrusion Detection and Prevention using Honeypot Network for Cloud Security","authors":"Poorvika Singh Negi, A. Garg, Roshan Lal","doi":"10.1109/Confluence47617.2020.9057961","DOIUrl":"https://doi.org/10.1109/Confluence47617.2020.9057961","url":null,"abstract":"With the rapid increase in the number of users, there is a rise in issues related to hardware failure, web hosting, space and memory allocation of data, which is directly or indirectly leading to the loss of data. With the objective of providing services that are reliable, fast and low in cost, we turn to cloud-computing practices. With a tremendous development in this technology, there is ever increasing chance of its security being compromised by malicious users. A way to divert malicious traffic away from systems is by using Honeypot. It is a colossal strategy that has shown signs of improvement in security of systems. Keeping in mind the various legal issues one may face while deploying Honeypot on third-party cloud vendor servers, the concept of Honeypot is implemented in a file-sharing application which is deployed on cloud server. This paper discusses the detection attacks in a cloud-based environment as well as the use of Honeypot for its security, thereby proposing a new technique to do the same.","PeriodicalId":180005,"journal":{"name":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127898306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1