首页 > 最新文献

2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)最新文献

英文 中文
Designing a Low-Cost and Portable Infusion Pump 低成本便携式输液泵的设计
Muhammad Irfan Ali
This document describes the prototyping of a low-cost and portable infusion pump, which is used to provide a certain dose of a drug in certain time. This device uses the principles of electronics, mechanics and fluid mechanics to drive a syringe-based infusion pump, which delivers the prescribed amount of drug in required time to the patient. The designed device can deliver drug up-to 1 ml/hour with an adjustable range. The device detects and maintains flow of drug according to the input provided by the user. The most prominent feature of the device is its ability to detect bubble in the liquid. Whenever an air bubble is detected in the device it will instantly stop the flow. It is a low-cost and portable device which can be operated on a 12-volt battery and directly from the power socket. The cost of this prototype is only about $200 which will further diminish if the units are produced on an industrial scale.
本文档描述了一种低成本便携式输液泵的原型,用于在一定时间内提供一定剂量的药物。该装置利用电子学、力学和流体力学原理驱动注射器输液泵,在规定时间内将规定剂量的药物输送给患者。设计的装置可以输送药物高达1毫升/小时,可调范围。该装置根据用户提供的输入检测并维持药物的流量。该装置最突出的特点是能够检测液体中的气泡。每当在设备中检测到气泡时,它将立即停止流动。这是一种低成本的便携式设备,可以用12伏的电池直接从电源插座上运行。这种原型机的成本仅为200美元左右,如果进行工业规模生产,成本还会进一步降低。
{"title":"Designing a Low-Cost and Portable Infusion Pump","authors":"Muhammad Irfan Ali","doi":"10.1109/ICEEST48626.2019.8981680","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981680","url":null,"abstract":"This document describes the prototyping of a low-cost and portable infusion pump, which is used to provide a certain dose of a drug in certain time. This device uses the principles of electronics, mechanics and fluid mechanics to drive a syringe-based infusion pump, which delivers the prescribed amount of drug in required time to the patient. The designed device can deliver drug up-to 1 ml/hour with an adjustable range. The device detects and maintains flow of drug according to the input provided by the user. The most prominent feature of the device is its ability to detect bubble in the liquid. Whenever an air bubble is detected in the device it will instantly stop the flow. It is a low-cost and portable device which can be operated on a 12-volt battery and directly from the power socket. The cost of this prototype is only about $200 which will further diminish if the units are produced on an industrial scale.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122405152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Challenges in Adoption of Blockchain in Developing Countries 在发展中国家采用区块链面临的挑战
Rakesh Kumar, Muhammad Faizan Tahir, Surendar Kumar, A. Zia, Hallar Memon, Waqas Mahmood
In today’s world of globalization where industries are becoming paperless, where robots are replacing human’s hard-core labor intensive work, where the whole world is connected with just one click, where predictive modeling and artificial intelligence AI is helping in tracking any big disaster and where biotech is helping in curing any disease in no time, Block-chain, one of the major innovations of today’s time, is all set to help humans in reaching to new heights of advancements in almost every field. But like other technologies, Blockchain is also facing some challenges, which must be addressed before widespread integration can take place. The mitigation these issues and all the obstacles in the adoption of Blockchain will have positive effects on the overall economy. This research, a questionnaire-based approach was adopted, aims to conclude and summarize the challenges faced by top-management of tech companies in the adoption of block-chain technology in developing countries.
在全球化的今天,工业正在走向无纸化,机器人正在取代人类的核心劳动密集型工作,整个世界只需点击一下就可以连接起来,预测建模和人工智能人工智能正在帮助追踪任何大灾难,生物技术正在帮助治愈任何疾病,区块链,当今时代的主要创新之一,这一切都是为了帮助人类在几乎每个领域达到新的高度。但与其他技术一样,区块链也面临着一些挑战,这些挑战必须在广泛整合之前得到解决。缓解这些问题以及采用区块链的所有障碍将对整体经济产生积极影响。本研究采用基于问卷的方法,旨在总结和总结科技公司高层管理人员在发展中国家采用区块链技术所面临的挑战。
{"title":"Challenges in Adoption of Blockchain in Developing Countries","authors":"Rakesh Kumar, Muhammad Faizan Tahir, Surendar Kumar, A. Zia, Hallar Memon, Waqas Mahmood","doi":"10.1109/ICEEST48626.2019.8981674","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981674","url":null,"abstract":"In today’s world of globalization where industries are becoming paperless, where robots are replacing human’s hard-core labor intensive work, where the whole world is connected with just one click, where predictive modeling and artificial intelligence AI is helping in tracking any big disaster and where biotech is helping in curing any disease in no time, Block-chain, one of the major innovations of today’s time, is all set to help humans in reaching to new heights of advancements in almost every field. But like other technologies, Blockchain is also facing some challenges, which must be addressed before widespread integration can take place. The mitigation these issues and all the obstacles in the adoption of Blockchain will have positive effects on the overall economy. This research, a questionnaire-based approach was adopted, aims to conclude and summarize the challenges faced by top-management of tech companies in the adoption of block-chain technology in developing countries.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"129 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114050574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhancing the Authentication Mechanism of Social Media Websites using Face Detection 基于人脸检测的社交媒体网站认证机制改进
Usman Ahmad, Anees Baqir, Faizan ul Mustafa, Sayyam Malik, Sana Ahmad Sani, S. Z. Shah
This paper includes different models used for the authentication of social media account. Importance of security in authentication is described in paper. Different security and privacy models and techniques for authentication are used over the social media. These techniques have limitations. In order to minimize the security risk of authentication and validation, a methodology called face detection and facial recognition is discussed in this paper. It provides the facility to improve security and to avoid unauthorized access of social media accounts.
本文包含了用于社交媒体账户认证的不同模型。本文阐述了安全在身份验证中的重要性。在社交媒体上使用了不同的安全和隐私模型和身份验证技术。这些技术都有局限性。为了最大限度地降低身份认证和验证的安全风险,本文讨论了一种称为人脸检测和人脸识别的方法。它提供了提高安全性和避免未经授权访问社交媒体帐户的设施。
{"title":"Enhancing the Authentication Mechanism of Social Media Websites using Face Detection","authors":"Usman Ahmad, Anees Baqir, Faizan ul Mustafa, Sayyam Malik, Sana Ahmad Sani, S. Z. Shah","doi":"10.1109/ICEEST48626.2019.8981692","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981692","url":null,"abstract":"This paper includes different models used for the authentication of social media account. Importance of security in authentication is described in paper. Different security and privacy models and techniques for authentication are used over the social media. These techniques have limitations. In order to minimize the security risk of authentication and validation, a methodology called face detection and facial recognition is discussed in this paper. It provides the facility to improve security and to avoid unauthorized access of social media accounts.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129384474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identifying Trends in Data Science Articles using Text Mining 使用文本挖掘识别数据科学文章的趋势
Syed Hasan Adil, Mansoor Ebrahim, S. Ali, Kamran Raza
The research conducted in this paper presents a detailed analysis of the latest research publications related to Data Science using information retrieval and text mining approach. The database used in this study was created by collecting the latest research papers from well-reputed Journals and Conference proceedings published by IEEE and Springer. This comprehensive study shows the significance of information retrieval and text mining in the identification of key insight from textual documents.
本文采用信息检索和文本挖掘的方法对数据科学相关的最新研究成果进行了详细的分析。本研究中使用的数据库是通过收集IEEE和Springer出版的知名期刊和会议论文集中的最新研究论文而创建的。这一综合研究显示了信息检索和文本挖掘在从文本文档中识别关键洞察力方面的重要性。
{"title":"Identifying Trends in Data Science Articles using Text Mining","authors":"Syed Hasan Adil, Mansoor Ebrahim, S. Ali, Kamran Raza","doi":"10.1109/ICEEST48626.2019.8981702","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981702","url":null,"abstract":"The research conducted in this paper presents a detailed analysis of the latest research publications related to Data Science using information retrieval and text mining approach. The database used in this study was created by collecting the latest research papers from well-reputed Journals and Conference proceedings published by IEEE and Springer. This comprehensive study shows the significance of information retrieval and text mining in the identification of key insight from textual documents.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123279824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Synonym-based Attack to Confuse Machine Learning Classifiers Using Black-box Setting 基于同义词的黑盒设置攻击混淆机器学习分类器
Aasher Khan, Suriya Rehman, Muhammad U. S. Khan, Mazhar Ali
Twitter being the most popular content sharing platform is giving rise to automated accounts called “bots”. Majority of the users on Twitter are bots. Various machine learning (ML) algorithms are designed to detect bots avoiding the vulnerability constraints of ML-based models. This paper contributes to exploit vulnerabilities of machine learning (ML) algorithms through black-box attack. An adversarial text sequence misclassifies the results of deep learning (DL) classifiers for bot detection. Literature shows that ML models are vulnerable to attacks. The aim of this paper is to compromise the accuracy of ML-based bot detection algorithms by replacing original words in tweets with their synonyms. Our results show 7.2% decrease in the accuracy for bot tweets, therefore classifying bot tweets as legitimate tweets.
作为最受欢迎的内容分享平台,推特催生了被称为“机器人”的自动账户。Twitter上的大多数用户都是机器人。各种机器学习(ML)算法被设计用来检测机器人,以避免基于ML的模型的漏洞约束。本文致力于通过黑盒攻击来利用机器学习算法的漏洞。一个对抗性文本序列错误地分类了深度学习(DL)分类器用于机器人检测的结果。文献表明,ML模型容易受到攻击。本文的目的是通过用同义词替换推文中的原始单词来降低基于ml的机器人检测算法的准确性。我们的结果显示,机器人推文的准确性降低了7.2%,因此将机器人推文分类为合法推文。
{"title":"Synonym-based Attack to Confuse Machine Learning Classifiers Using Black-box Setting","authors":"Aasher Khan, Suriya Rehman, Muhammad U. S. Khan, Mazhar Ali","doi":"10.1109/ICEEST48626.2019.8981685","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981685","url":null,"abstract":"Twitter being the most popular content sharing platform is giving rise to automated accounts called “bots”. Majority of the users on Twitter are bots. Various machine learning (ML) algorithms are designed to detect bots avoiding the vulnerability constraints of ML-based models. This paper contributes to exploit vulnerabilities of machine learning (ML) algorithms through black-box attack. An adversarial text sequence misclassifies the results of deep learning (DL) classifiers for bot detection. Literature shows that ML models are vulnerable to attacks. The aim of this paper is to compromise the accuracy of ML-based bot detection algorithms by replacing original words in tweets with their synonyms. Our results show 7.2% decrease in the accuracy for bot tweets, therefore classifying bot tweets as legitimate tweets.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121610286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Camera and Laser Scanner based 3D Point Cloud 基于相机和激光扫描仪的三维点云比较
Yawar Rehman, Hafiz M. Ameem Uddin, Taha Hasan Masood Siddique, Haris, S. R. U. N. Jafri, Anas Ahmed
Three-dimensional (3D) modeling of objects play an important role in quality assurance, re-engineering of an object, and mapping of interior design for quality measurements. Hence, this field proves to be one of the hot research topics in the field of robotics. Although, using laser scanner is the most common method for 3D point cloud, the camera-based methods are also introduced in this field. In this paper, we propose and analyze two methods for making 3D point cloud for any given object. First one is camera-based 3D point cloud using structure from motion technique and secondly the laser scanner-based 3D point cloud. The result shows that camera-based 3D point cloud method produced dense point cloud but prone to outliers, whereas the laser scanner method is robust. It should also be noted that the camera is multiple times cost effective than laser scanner.
物体的三维(3D)建模在质量保证、物体的再工程以及室内设计的映射以进行质量测量方面发挥着重要作用。因此,该领域被证明是机器人领域的研究热点之一。虽然激光扫描仪是三维点云最常用的方法,但基于相机的方法也被引入该领域。本文提出并分析了任意物体三维点云的两种生成方法。首先是基于摄像机的基于运动结构的三维点云,其次是基于激光扫描仪的三维点云。结果表明,基于相机的三维点云方法产生密集的点云,但容易产生异常值,而激光扫描仪方法具有鲁棒性。还应该指出的是,相机的成本效益是激光扫描仪的数倍。
{"title":"Comparison of Camera and Laser Scanner based 3D Point Cloud","authors":"Yawar Rehman, Hafiz M. Ameem Uddin, Taha Hasan Masood Siddique, Haris, S. R. U. N. Jafri, Anas Ahmed","doi":"10.1109/ICEEST48626.2019.8981708","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981708","url":null,"abstract":"Three-dimensional (3D) modeling of objects play an important role in quality assurance, re-engineering of an object, and mapping of interior design for quality measurements. Hence, this field proves to be one of the hot research topics in the field of robotics. Although, using laser scanner is the most common method for 3D point cloud, the camera-based methods are also introduced in this field. In this paper, we propose and analyze two methods for making 3D point cloud for any given object. First one is camera-based 3D point cloud using structure from motion technique and secondly the laser scanner-based 3D point cloud. The result shows that camera-based 3D point cloud method produced dense point cloud but prone to outliers, whereas the laser scanner method is robust. It should also be noted that the camera is multiple times cost effective than laser scanner.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116152437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance of distributed multiple turbo code with MIMO antennas over frequency selective Rayleigh fading channels 基于MIMO天线的分布式多turbo码在频率选择瑞利衰落信道上的性能
R. Umar, Fengfan Yang, S. Mughal
This paper presents multiple turbo coded cooperative orthogonal frequency division multiplexing (MTCC-OFDM) scheme over a quasi-static frequency selective Rayleigh fading channel. The MTCC-OFDM scheme is composed of multiple input and multiple output antennas. As, in practical coded cooperative scenario, the relay terminal is mostly in outage due to noisy source to relay channel which causes an erroneous transmission towards the destination terminal that eventually results in a very low bit-error rate (BER) performance of the communication system. Therefore, in the proposed scheme, a turbo iterative decoding is being performed at the relay terminal that considerably improves the BER performance of the communication system. The numerical simulated results confirm that the proposed scheme not only out-performs its related coded non-cooperative scheme i.e., turbo coded OFDM scheme under a similar conditions in terms of bit error-correction performance but also offers robustness in a noisy (practical) source to relay channel scenario.
提出了一种基于准静态瑞利衰落信道的多重turbo编码协同正交频分复用(MTCC-OFDM)方案。MTCC-OFDM方案由多输入多输出天线组成。由于在实际的编码协作场景中,中继终端往往由于中继信道的噪声源而处于中断状态,从而导致向目的终端的错误传输,最终导致通信系统的误码率(BER)性能很低。因此,在所提出的方案中,在中继终端进行turbo迭代解码,大大提高了通信系统的误码率性能。数值仿真结果表明,该方案不仅在纠错性能上优于其相关的编码非合作方案,即在相似条件下的turbo编码OFDM方案,而且在噪声(实际)源到中继信道场景中具有鲁棒性。
{"title":"Performance of distributed multiple turbo code with MIMO antennas over frequency selective Rayleigh fading channels","authors":"R. Umar, Fengfan Yang, S. Mughal","doi":"10.1109/ICEEST48626.2019.8981689","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981689","url":null,"abstract":"This paper presents multiple turbo coded cooperative orthogonal frequency division multiplexing (MTCC-OFDM) scheme over a quasi-static frequency selective Rayleigh fading channel. The MTCC-OFDM scheme is composed of multiple input and multiple output antennas. As, in practical coded cooperative scenario, the relay terminal is mostly in outage due to noisy source to relay channel which causes an erroneous transmission towards the destination terminal that eventually results in a very low bit-error rate (BER) performance of the communication system. Therefore, in the proposed scheme, a turbo iterative decoding is being performed at the relay terminal that considerably improves the BER performance of the communication system. The numerical simulated results confirm that the proposed scheme not only out-performs its related coded non-cooperative scheme i.e., turbo coded OFDM scheme under a similar conditions in terms of bit error-correction performance but also offers robustness in a noisy (practical) source to relay channel scenario.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124540932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic of Things: Revisiting Digital Forensic Investigations in Internet of Things 物联网取证:重新审视物联网中的数字取证调查
Taimur Bakhshi
The emerging paradigm of Internet of Things (IoT) promises automation, real-time monitoring and management of critical infrastructure(s) allowing optimized productivity in consumer and commercial concerns. Diversity in IoT devices, communication protocols, and the extensive data generated by IoT-ware requires robust incident response primitives to counter IoT related cyber-attacks and deter cybercrimes. Although substantial work is underway in improving IoT security, there is a fundamental requirement to address the forensic requisites that may aid forensic investigators and law enforcement agencies (LEAs) in prosecuting IoT related cybercrimes. IoT presents substantial forensic challenges in terms of evidence source identification, artefact acquisition, insufficiency of IoT-specific forensic tools and techniques, and issues in multijurisdictional litigation. To this effect, the present papers comprehensively reviews the applicability of traditional, cloud and network forensics in the IoT domain. State-of-the-art IoT forensic models are critically discussed to highlight their practical applicability. Furthermore, employment of recent enabling technologies including software defined networking and blockchaining is examined in a forensic of things context. The study also discusses and makes recommendations towards the multi-faceted challenges faced by IoT forensic investigators due to non-validated methodologies, leading to deficiencies in operational readiness.
新兴的物联网(IoT)模式有望实现关键基础设施的自动化、实时监控和管理,从而优化消费者和商业方面的生产力。物联网设备、通信协议和物联网软件生成的大量数据的多样性需要强大的事件响应原语来应对物联网相关的网络攻击和阻止网络犯罪。尽管在提高物联网安全性方面正在进行大量工作,但仍有一个基本要求,即解决可能有助于法医调查人员和执法机构(LEAs)起诉物联网相关网络犯罪的法医必要条件。物联网在证据来源识别、人工制品获取、物联网专用法医工具和技术不足以及多司法管辖区诉讼问题方面提出了实质性的法医挑战。为此,本文全面回顾了传统、云和网络取证在物联网领域的适用性。对最先进的物联网取证模型进行了批判性讨论,以突出其实际适用性。此外,在取证环境中研究了包括软件定义网络和区块链在内的最新使能技术的使用。该研究还讨论了由于未经验证的方法导致操作准备不足而导致物联网取证调查员面临的多方面挑战,并提出了建议。
{"title":"Forensic of Things: Revisiting Digital Forensic Investigations in Internet of Things","authors":"Taimur Bakhshi","doi":"10.1109/ICEEST48626.2019.8981675","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981675","url":null,"abstract":"The emerging paradigm of Internet of Things (IoT) promises automation, real-time monitoring and management of critical infrastructure(s) allowing optimized productivity in consumer and commercial concerns. Diversity in IoT devices, communication protocols, and the extensive data generated by IoT-ware requires robust incident response primitives to counter IoT related cyber-attacks and deter cybercrimes. Although substantial work is underway in improving IoT security, there is a fundamental requirement to address the forensic requisites that may aid forensic investigators and law enforcement agencies (LEAs) in prosecuting IoT related cybercrimes. IoT presents substantial forensic challenges in terms of evidence source identification, artefact acquisition, insufficiency of IoT-specific forensic tools and techniques, and issues in multijurisdictional litigation. To this effect, the present papers comprehensively reviews the applicability of traditional, cloud and network forensics in the IoT domain. State-of-the-art IoT forensic models are critically discussed to highlight their practical applicability. Furthermore, employment of recent enabling technologies including software defined networking and blockchaining is examined in a forensic of things context. The study also discusses and makes recommendations towards the multi-faceted challenges faced by IoT forensic investigators due to non-validated methodologies, leading to deficiencies in operational readiness.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131962056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Basic Security Challenges in Cloud Computing 云计算中的基本安全挑战
Syed Rizwan, M. Zubair
With the advancement in information technology, everyone moves towards pleasure, ease, and luxury. From which the most advanced and usable field is Cloud Computing which uses the internet and gives access to storing the data to the user. It has many characteristics like elasticity, extensibility, smartness and lower cost, which causes companies to address the clients’ requirements. In spite of this, associations are delayed in accommodating it because of security issues and difficulties related with it. The development of cloud is affected by the security. This paper gives ongoing advances in cloud computing and highlights on some challenges, security issues, and solutions. It also incorporates the basics of cloud computing to make itself contained so that pursuers can have a reasonable comprehension of the subject and cloud computing security.
随着信息技术的进步,每个人都在追求快乐、安逸和奢侈。其中最先进和可用的领域是云计算,它使用互联网并为用户提供存储数据的途径。它具有弹性、可扩展性、智能性和低成本等特点,使企业能够满足客户的需求。尽管如此,由于安全问题和与之相关的困难,协会推迟了接纳它。云的发展受到安全问题的影响。本文给出了云计算的最新进展,并重点介绍了一些挑战、安全问题和解决方案。它还包含了云计算的基础知识,以便读者能够对主题和云计算安全性有一个合理的理解。
{"title":"Basic Security Challenges in Cloud Computing","authors":"Syed Rizwan, M. Zubair","doi":"10.1109/ICEEST48626.2019.8981695","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981695","url":null,"abstract":"With the advancement in information technology, everyone moves towards pleasure, ease, and luxury. From which the most advanced and usable field is Cloud Computing which uses the internet and gives access to storing the data to the user. It has many characteristics like elasticity, extensibility, smartness and lower cost, which causes companies to address the clients’ requirements. In spite of this, associations are delayed in accommodating it because of security issues and difficulties related with it. The development of cloud is affected by the security. This paper gives ongoing advances in cloud computing and highlights on some challenges, security issues, and solutions. It also incorporates the basics of cloud computing to make itself contained so that pursuers can have a reasonable comprehension of the subject and cloud computing security.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133834757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Image Analysis for MRI Based Brain Tumor Detection 基于MRI的脑肿瘤检测图像分析
Sidra Akbar, S. Nasim, Sarwar Wasi, Syed Muhammad Ussama Zafar
Brain tumor is an irregular mass of tissue with inept expansion/enlargement inside the skull that attack and harm nerves and other sound tissues. The multiplication/ expansion of neurons can cause undesirable cell advancement. Brain Tumor is a testing errand as symptoms show up in the progressive phases of tumor. To provide accuracy in cerebrum tumor location MRI (Magnetic Resonance Image) is widely preferred imaging modality. To give better revelation of tumor without affecting a normal tissue is extremely difficult process. This research paper provided a solution to detect tumor using image processing technique, that include the image acquisition, preprocessing, enhancement, image segmentation, classification and volume calculation. This segmented image is further utilized for the evaluation of brain tumor in early stage.
脑肿瘤是一种不规则的组织团块,在颅骨内扩张/增大,攻击和伤害神经和其他听觉组织。神经元的增殖/扩张会导致不良的细胞进展。脑肿瘤是一项检测任务,因为症状出现在肿瘤的进展阶段。为了提供脑部肿瘤定位的准确性,MRI(磁共振成像)是广泛首选的成像方式。在不影响正常组织的情况下更好地显示肿瘤是一个非常困难的过程。本文提出了一种利用图像处理技术进行肿瘤检测的解决方案,包括图像采集、预处理、增强、图像分割、分类和体积计算。该分割图像进一步用于早期脑肿瘤的评估。
{"title":"Image Analysis for MRI Based Brain Tumor Detection","authors":"Sidra Akbar, S. Nasim, Sarwar Wasi, Syed Muhammad Ussama Zafar","doi":"10.1109/ICEEST48626.2019.8981681","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981681","url":null,"abstract":"Brain tumor is an irregular mass of tissue with inept expansion/enlargement inside the skull that attack and harm nerves and other sound tissues. The multiplication/ expansion of neurons can cause undesirable cell advancement. Brain Tumor is a testing errand as symptoms show up in the progressive phases of tumor. To provide accuracy in cerebrum tumor location MRI (Magnetic Resonance Image) is widely preferred imaging modality. To give better revelation of tumor without affecting a normal tissue is extremely difficult process. This research paper provided a solution to detect tumor using image processing technique, that include the image acquisition, preprocessing, enhancement, image segmentation, classification and volume calculation. This segmented image is further utilized for the evaluation of brain tumor in early stage.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129881194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1