Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728519
Inthiyaz Basha Kattubadi, Dr. Rama Murthy Garimella
Emotion Classification is an important task for the machines to understand the emotional changes in human beings. In this research paper, we utilize a combination of Convolutional Neural Networks and Auto-Encoders to extract features for Emotion Classification. We proposed a total of six architectures. Among them, two architectures are trained on JAFFE (Japanese Female Facial Expressions), remaining four architectures are trained with Berlin Database of Emotional Speech. Good classification accuracy is attained with these architectures.
情绪分类是机器理解人类情绪变化的一项重要任务。在这篇研究论文中,我们利用卷积神经网络和自动编码器的组合来提取情感分类的特征。我们总共提出了六个架构。其中2个架构使用JAFFE (Japanese Female Facial expression)进行训练,其余4个架构使用Berlin Database of Emotional Speech进行训练。使用这些体系结构可以获得良好的分类精度。
{"title":"Emotion Classification: Novel Deep Learning Architectures","authors":"Inthiyaz Basha Kattubadi, Dr. Rama Murthy Garimella","doi":"10.1109/ICACCS.2019.8728519","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728519","url":null,"abstract":"Emotion Classification is an important task for the machines to understand the emotional changes in human beings. In this research paper, we utilize a combination of Convolutional Neural Networks and Auto-Encoders to extract features for Emotion Classification. We proposed a total of six architectures. Among them, two architectures are trained on JAFFE (Japanese Female Facial Expressions), remaining four architectures are trained with Berlin Database of Emotional Speech. Good classification accuracy is attained with these architectures.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121281243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728462
M. Harikrishnan, K. Lakshmy
Performing a fair exchange without a Trusted Third Party (TTP) was considered to be impossible. With multi party computation and practices like Proof-of-Work (PoW), blockchain accomplishes a fair exchange in a trustless network. Data confidentiality is a key challenge that has to be resolved before adopting blockchain for enterprise applications where tokenized assets will be transferred. Protocols like Zcash are already providing the same for financial transactions but lacks flexibility required to apply in most of the potential use cases of blockchain. Most of the real world application work in a way where a transaction is carried out when a particular action is performed. Also, the zero knowledge proof method used in Zcash, ZKSNARK has certain weaknesses restricting its adoption. One of the major drawbacks of ZKSNARK is that it requires an initial trust setup phase which is difficult to achieve in blockchain ecosystem. ZKSTARK, an interactive zero knowledge proof does not require this phase and also provides security against post quantum attacks. We propose a system that uses two indistinguishable hash functions along with ZKSTARK to improve the flexibility of blockchain platforms. The two indistinguishable hash functions are chosen from SHA3-finalists based on their security, performance and inner designs.
{"title":"Secure Digital Service Payments using Zero Knowledge Proof in Distributed Network","authors":"M. Harikrishnan, K. Lakshmy","doi":"10.1109/ICACCS.2019.8728462","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728462","url":null,"abstract":"Performing a fair exchange without a Trusted Third Party (TTP) was considered to be impossible. With multi party computation and practices like Proof-of-Work (PoW), blockchain accomplishes a fair exchange in a trustless network. Data confidentiality is a key challenge that has to be resolved before adopting blockchain for enterprise applications where tokenized assets will be transferred. Protocols like Zcash are already providing the same for financial transactions but lacks flexibility required to apply in most of the potential use cases of blockchain. Most of the real world application work in a way where a transaction is carried out when a particular action is performed. Also, the zero knowledge proof method used in Zcash, ZKSNARK has certain weaknesses restricting its adoption. One of the major drawbacks of ZKSNARK is that it requires an initial trust setup phase which is difficult to achieve in blockchain ecosystem. ZKSTARK, an interactive zero knowledge proof does not require this phase and also provides security against post quantum attacks. We propose a system that uses two indistinguishable hash functions along with ZKSTARK to improve the flexibility of blockchain platforms. The two indistinguishable hash functions are chosen from SHA3-finalists based on their security, performance and inner designs.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126732321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728461
K. Revathi, A. Samydurai, N. Kumar, K. Keerthana
The World Health Organization (WHO) in their statistical report on 2018 stated that the heart and pulmonary diseases are continuing to be at the top global causes of death. These diseases are known as non- communicable diseases (NCD) as it progresses slowly and exists for long duration of time. The early detection of NCD diseases could help in saving the life of human especially the aged ones. The continuous monitoring of crucial signs of human body like heart rate, blood oxygen level, blood pressure and blood glucose level assists in timely discovery and also provides room for the proposed treatment. Evolution of technologies like wireless sensor network, embedded systems, computing and storage which are grouped under the name of one umbrella technology called as ‘Internet of Things’ (IoT), brought various health trackers that monitors the physiological measures of human and also keep track of their daily activities in real without the need of the person to be in hospital, but those measures are updated to the medical experts concern time-to-time for their valuable suggestions and follow-ups. This paper is aimed to present the detailed study of such health trackers in the recent market and the scope for improvements owing to the medical equipment’s widely used in the hospital are also addressed.
{"title":"Health Trackers in Current Market: A Systematic Review, Trends and Challenges","authors":"K. Revathi, A. Samydurai, N. Kumar, K. Keerthana","doi":"10.1109/ICACCS.2019.8728461","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728461","url":null,"abstract":"The World Health Organization (WHO) in their statistical report on 2018 stated that the heart and pulmonary diseases are continuing to be at the top global causes of death. These diseases are known as non- communicable diseases (NCD) as it progresses slowly and exists for long duration of time. The early detection of NCD diseases could help in saving the life of human especially the aged ones. The continuous monitoring of crucial signs of human body like heart rate, blood oxygen level, blood pressure and blood glucose level assists in timely discovery and also provides room for the proposed treatment. Evolution of technologies like wireless sensor network, embedded systems, computing and storage which are grouped under the name of one umbrella technology called as ‘Internet of Things’ (IoT), brought various health trackers that monitors the physiological measures of human and also keep track of their daily activities in real without the need of the person to be in hospital, but those measures are updated to the medical experts concern time-to-time for their valuable suggestions and follow-ups. This paper is aimed to present the detailed study of such health trackers in the recent market and the scope for improvements owing to the medical equipment’s widely used in the hospital are also addressed.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130449863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728487
Vishal Wudaru, Nikhil Koditala, A. Reddy, R. Mamidi
In this paper we present our work in building Natural Language Interface to Database (NLIDB) system using Intermediate query approach. This approach is demonstrated using Movie domain chatbot and can also be extended to different domains. The need of NLIDB System has increased in this fast paced world where more number of users are accessing databases through their Smart phones and web browsers.NLIDB System maps user’s Natural Language query to database query allowing user to extract information without any prior experience with databases. Results obtained are very promising and can tackle most of the user queries regarding target database.
{"title":"Question Answering on Structured Data using NLIDB Approach","authors":"Vishal Wudaru, Nikhil Koditala, A. Reddy, R. Mamidi","doi":"10.1109/ICACCS.2019.8728487","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728487","url":null,"abstract":"In this paper we present our work in building Natural Language Interface to Database (NLIDB) system using Intermediate query approach. This approach is demonstrated using Movie domain chatbot and can also be extended to different domains. The need of NLIDB System has increased in this fast paced world where more number of users are accessing databases through their Smart phones and web browsers.NLIDB System maps user’s Natural Language query to database query allowing user to extract information without any prior experience with databases. Results obtained are very promising and can tackle most of the user queries regarding target database.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128120189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728362
A. Rajkumar, M. Ganesan, R. Lavanya
In this paper, an intellectual based electrocardiogram (ECG) signal classification approach utilizing Deep Learning(DL) is being developed. ECG plays important role in diagnosing various Cardiac ailments. The ECG signal with irregular rhythm is known as Arrhythmia such as Atrial Fibrillation, Ventricular Tachycardia, Ventricular Fibrillation, and so on. The main aspire of this task is to screen and distinguish the patient with various cardio vascular arrhythmia. This examination encourages us to recognize diverse kinds of arrhythmia utilizing Deep Learning algorithm. Here we use Convolutional Neural Network(CNN) a DL algorithm which is efficient in classifying signals. Utilizing CNN, features are learned Automatically from the time domain ECG signals which are acquired from MIT-BIH Database from Physiobank.com. The feature adapted specifically replaces manually extracted features and this analysis will help the Cardiologists in screening the patient with Cardiac illness effectively. The CNN is trained, tested using ECG Dataset obtained from MIT-BIH Database and from the signal 7 of arrhythmia were classified. The proposed system is compared for Various Activation function by varying the number of epochs. From the result obtained we came to know that ELU activation function gives better result with an accuracy of 93.6% and with a loss of 0.2.
{"title":"Arrhythmia classification on ECG using Deep Learning","authors":"A. Rajkumar, M. Ganesan, R. Lavanya","doi":"10.1109/ICACCS.2019.8728362","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728362","url":null,"abstract":"In this paper, an intellectual based electrocardiogram (ECG) signal classification approach utilizing Deep Learning(DL) is being developed. ECG plays important role in diagnosing various Cardiac ailments. The ECG signal with irregular rhythm is known as Arrhythmia such as Atrial Fibrillation, Ventricular Tachycardia, Ventricular Fibrillation, and so on. The main aspire of this task is to screen and distinguish the patient with various cardio vascular arrhythmia. This examination encourages us to recognize diverse kinds of arrhythmia utilizing Deep Learning algorithm. Here we use Convolutional Neural Network(CNN) a DL algorithm which is efficient in classifying signals. Utilizing CNN, features are learned Automatically from the time domain ECG signals which are acquired from MIT-BIH Database from Physiobank.com. The feature adapted specifically replaces manually extracted features and this analysis will help the Cardiologists in screening the patient with Cardiac illness effectively. The CNN is trained, tested using ECG Dataset obtained from MIT-BIH Database and from the signal 7 of arrhythmia were classified. The proposed system is compared for Various Activation function by varying the number of epochs. From the result obtained we came to know that ELU activation function gives better result with an accuracy of 93.6% and with a loss of 0.2.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116660689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728428
R. Jayabarathi, R. Sivaramakrishnan, S. Sruthi, M. Raakesh, B. Manoj
As the grid supply is not reliable and the price of electricity is increasing, it is necessary to introduce renewable energy sources like solar into the grid .The impact of solar penetrations into the grid has to be studied and analyzed. This paper deals with the simulation and hardware implementation of solar panel penetration in an IEEE 5 bus system. The simulation has been performed for different conditions with the help of ETAP (Electrical Transient Analysis Program) software. The power flow in the bus system is analyzed and impact of solar penetration in the system has been observed. Transient stability of the system is performed by creating a fault and observing the response of system in the absence of PV panels and also with different levels of PV penetration. The hardware implementation is conducted on a laboratory model of a 5 bus system with and without PV penetration to the grid. The power flow in the various buses and transmission lines are analyzed.
{"title":"Simulation and Implementation of Solar Power Penetration in an IEEE 5 bus System","authors":"R. Jayabarathi, R. Sivaramakrishnan, S. Sruthi, M. Raakesh, B. Manoj","doi":"10.1109/ICACCS.2019.8728428","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728428","url":null,"abstract":"As the grid supply is not reliable and the price of electricity is increasing, it is necessary to introduce renewable energy sources like solar into the grid .The impact of solar penetrations into the grid has to be studied and analyzed. This paper deals with the simulation and hardware implementation of solar panel penetration in an IEEE 5 bus system. The simulation has been performed for different conditions with the help of ETAP (Electrical Transient Analysis Program) software. The power flow in the bus system is analyzed and impact of solar penetration in the system has been observed. Transient stability of the system is performed by creating a fault and observing the response of system in the absence of PV panels and also with different levels of PV penetration. The hardware implementation is conducted on a laboratory model of a 5 bus system with and without PV penetration to the grid. The power flow in the various buses and transmission lines are analyzed.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115658535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728397
M. V. Lakshmi, B. Kanmani
Telecommunication field is emerging rapidly with the huge demand for data communication and orthogonal frequency division multiplexing is one such modulation. The efficiency of an OFDM technique is high and multipath fading is improved to a greater extent. In spite of these benefits with an OFDM technique the instantaneous increase in the power output is the major drawback of an OFDM which results in high Peak to average power ratio. Due to this high PAPR the signal quality will degrade and reduces the efficiency. To reduce the PAPR in the OFDM symbol, a Lossy Coding method was proposed and implemented in Lab VIEW. OFDM symbols are generated for different symbol lengths and peak power is calculated for all possible combinations of the symbol lengths. The observation made was that only four combinations had high value of peak power compared with the other possible combinations. The proposed method reduces the peak power of the four combinations which in turn reduces the PAPR but with the signal distortion. This enforces Bit error rate. We also observed that as the length of the symbol increases the bit error rate will decrease.
{"title":"Digital circuit simulation study of Lossy source coding for PAPR reduction","authors":"M. V. Lakshmi, B. Kanmani","doi":"10.1109/ICACCS.2019.8728397","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728397","url":null,"abstract":"Telecommunication field is emerging rapidly with the huge demand for data communication and orthogonal frequency division multiplexing is one such modulation. The efficiency of an OFDM technique is high and multipath fading is improved to a greater extent. In spite of these benefits with an OFDM technique the instantaneous increase in the power output is the major drawback of an OFDM which results in high Peak to average power ratio. Due to this high PAPR the signal quality will degrade and reduces the efficiency. To reduce the PAPR in the OFDM symbol, a Lossy Coding method was proposed and implemented in Lab VIEW. OFDM symbols are generated for different symbol lengths and peak power is calculated for all possible combinations of the symbol lengths. The observation made was that only four combinations had high value of peak power compared with the other possible combinations. The proposed method reduces the peak power of the four combinations which in turn reduces the PAPR but with the signal distortion. This enforces Bit error rate. We also observed that as the length of the symbol increases the bit error rate will decrease.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133820047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728450
S. Kalaivani, A. Vikram, G. Gopinath
Most of the swarm optimization techniques are inspired by the characteristics as well as behaviour of flock of birds whereas Artificial Bee Colony is based on the foraging characteristics of the bees. However, certain problems which are solved by ABC do not yield desired results in-terms of performance. ABC is a new devised swarm intelligence algorithm and predominately employed for optimization of numerical problems. The main reason for the success of ABC algorithm is that it consists of feature such as fathomable and flexibility when compared to other swarm optimization algorithms and there are many possible applications of ABC. Cloud computing has their limitation in their application and functionality. The cloud computing environment experiences several security issues such as Dos attack, replay attack, flooding attack. In this paper, an effective classifier is proposed based on Artificial Bee Colony for cloud computing. It is evident in the evaluation results that the proposed classifier achieved a higher accuracy rate.
{"title":"An Effective Swarm Optimization Based Intrusion Detection Classifier System for Cloud Computing","authors":"S. Kalaivani, A. Vikram, G. Gopinath","doi":"10.1109/ICACCS.2019.8728450","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728450","url":null,"abstract":"Most of the swarm optimization techniques are inspired by the characteristics as well as behaviour of flock of birds whereas Artificial Bee Colony is based on the foraging characteristics of the bees. However, certain problems which are solved by ABC do not yield desired results in-terms of performance. ABC is a new devised swarm intelligence algorithm and predominately employed for optimization of numerical problems. The main reason for the success of ABC algorithm is that it consists of feature such as fathomable and flexibility when compared to other swarm optimization algorithms and there are many possible applications of ABC. Cloud computing has their limitation in their application and functionality. The cloud computing environment experiences several security issues such as Dos attack, replay attack, flooding attack. In this paper, an effective classifier is proposed based on Artificial Bee Colony for cloud computing. It is evident in the evaluation results that the proposed classifier achieved a higher accuracy rate.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129696042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728377
M. S, S. Verma
Diabetes Mellitus is a syndrome that occurs due to insulin deficiency but there is no absolute cure for diabetes. There are larger effects of long term diabetes on human body such as eyes as cataracts, kidney failures, nerve damaging, ulcers in feet and gangrene. Hence there is need to understand that, this disease can be prevented through normal physiological process for avoiding greater damage. Thermography is identified as a potential tool to predict and detect the disease progression in an earlier stage in automated way. Actually this type of imaging maps the superficial temperature from the human body and able to identify the disease complications accurately. This paper discusses the recent literature studies with different intervention and comparison of appropriate methods used in detection of diabetes mellitus accurately. The intervention features of different works have been carried out with suitable analysis in identifying the issues and problems associated in medical diagnosis of Diabetic foot neuropathy. This work summarizes the use of thermography in diagnosis process and defines the scope for further improvement in the related research work.
{"title":"A Systematic Literature Review for Early Detection of Type II Diabetes","authors":"M. S, S. Verma","doi":"10.1109/ICACCS.2019.8728377","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728377","url":null,"abstract":"Diabetes Mellitus is a syndrome that occurs due to insulin deficiency but there is no absolute cure for diabetes. There are larger effects of long term diabetes on human body such as eyes as cataracts, kidney failures, nerve damaging, ulcers in feet and gangrene. Hence there is need to understand that, this disease can be prevented through normal physiological process for avoiding greater damage. Thermography is identified as a potential tool to predict and detect the disease progression in an earlier stage in automated way. Actually this type of imaging maps the superficial temperature from the human body and able to identify the disease complications accurately. This paper discusses the recent literature studies with different intervention and comparison of appropriate methods used in detection of diabetes mellitus accurately. The intervention features of different works have been carried out with suitable analysis in identifying the issues and problems associated in medical diagnosis of Diabetic foot neuropathy. This work summarizes the use of thermography in diagnosis process and defines the scope for further improvement in the related research work.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":" 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114051321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-15DOI: 10.1109/ICACCS.2019.8728512
S. Rafi, N. Kumar, D. J. Kumar
Aadhaar is a unique identification issued by the Indian government to every resident of India. The Unique Identification Authority of India (UIDAI), which functions under the planning commission of India, is responsible for managing Aadhaar identification cards. The Aadhaar project was initiated as an attempt to have a unique identification document which would capture all the details including the demographic and biometric (fingerprints and iris scan) information. In some cases Biometric verification can even be faked remotely, with no product or equipment hack. Fingerprints can be duplicated from an assortment of surfaces and used to make a fake finger. Also, iris picture could be skimmed from photos and supplanted on a simulated eye-like protest. DNA (deoxyribonucleic acid), is the hereditary material and is unique in every person. As the DNA can’t be duplicated by any morphing techniques it will be more useful if we interlink the DNA samples to Aadhaar cards as an identification criteria.
{"title":"Survey for Interlinking of DNA Models with Aadhaar Real-Time Records for Enhanced Authentication","authors":"S. Rafi, N. Kumar, D. J. Kumar","doi":"10.1109/ICACCS.2019.8728512","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728512","url":null,"abstract":"Aadhaar is a unique identification issued by the Indian government to every resident of India. The Unique Identification Authority of India (UIDAI), which functions under the planning commission of India, is responsible for managing Aadhaar identification cards. The Aadhaar project was initiated as an attempt to have a unique identification document which would capture all the details including the demographic and biometric (fingerprints and iris scan) information. In some cases Biometric verification can even be faked remotely, with no product or equipment hack. Fingerprints can be duplicated from an assortment of surfaces and used to make a fake finger. Also, iris picture could be skimmed from photos and supplanted on a simulated eye-like protest. DNA (deoxyribonucleic acid), is the hereditary material and is unique in every person. As the DNA can’t be duplicated by any morphing techniques it will be more useful if we interlink the DNA samples to Aadhaar cards as an identification criteria.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116739565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}