首页 > 最新文献

2022 5th International Conference on Contemporary Computing and Informatics (IC3I)最新文献

英文 中文
LTE Networks with Horizontal T-shaped Patch Antenna for Wearable Medical Devices 可穿戴医疗设备用水平t形贴片天线LTE网络
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073373
Preety Sharma, Rati Sharma
Daily mhealth is among the most frequent and challenging duty in wireless body sensor networking Wsns tech. A low surface oral bioavailability (SAR) value and excellent communication in a sensor system are the main objectives of the important applications. With its distinctive shapes and great discoveries, an antenna has become one of the most popular types of communication devices in the digital age. The design strategy is suitable for adding a new parallel F1 slot to a wearable applications patch antennas UWB microstrip antennas. The antenna been generated using a higher stability simulator employing a textile substrate made of denim. The developed antenna has a 4dB permissible gain and resonates @7.7GHz. Heterodyne measurements of the reflection coefficient revealed that the antenna had such a decent return loss, improved spectrum, high VSWR of 1.05, and a concentration rate SAR number of less than 2W. The result demonstrates that the suggested design complies only with specifications for a cotton wearable antenna in use for continuous healthcare monitoring in the wireless body area net, sports, or commercial applications.
日常移动医疗是无线身体传感器网络Wsns技术中最常见和最具挑战性的任务之一。传感器系统中的低表面口服生物利用度(SAR)值和良好的通信是重要应用的主要目标。由于其独特的形状和伟大的发现,天线已经成为数字时代最受欢迎的通信设备之一。该设计策略适用于在可穿戴应用贴片天线UWB微带天线中增加一个新的并联F1插槽。该天线采用采用牛仔布制成的纺织衬底的高稳定性模拟器产生。该天线的允许增益为4dB,谐振频率为7.7 ghz。反射系数外差测量结果表明,该天线具有良好的回波损耗、改善的频谱、1.05的高驻波比和小于2W的集中率SAR数。结果表明,建议的设计只符合用于无线身体区域网、体育或商业应用中连续医疗监测的棉质可穿戴天线的规格。
{"title":"LTE Networks with Horizontal T-shaped Patch Antenna for Wearable Medical Devices","authors":"Preety Sharma, Rati Sharma","doi":"10.1109/IC3I56241.2022.10073373","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073373","url":null,"abstract":"Daily mhealth is among the most frequent and challenging duty in wireless body sensor networking Wsns tech. A low surface oral bioavailability (SAR) value and excellent communication in a sensor system are the main objectives of the important applications. With its distinctive shapes and great discoveries, an antenna has become one of the most popular types of communication devices in the digital age. The design strategy is suitable for adding a new parallel F1 slot to a wearable applications patch antennas UWB microstrip antennas. The antenna been generated using a higher stability simulator employing a textile substrate made of denim. The developed antenna has a 4dB permissible gain and resonates @7.7GHz. Heterodyne measurements of the reflection coefficient revealed that the antenna had such a decent return loss, improved spectrum, high VSWR of 1.05, and a concentration rate SAR number of less than 2W. The result demonstrates that the suggested design complies only with specifications for a cotton wearable antenna in use for continuous healthcare monitoring in the wireless body area net, sports, or commercial applications.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131607676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensics-as-a-service: A Review of Mobile Forensics 取证即服务:移动取证综述
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072726
Yogesh Kumar Sharma, Syed Shagufta Noval, Arpit Jain, B. Sabitha, T. Ramya
Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media. It is the most intricate step of the cybercrime investigation process often used as the evidence that can be presented in the court of law for most prosecutable cases. This article briefs about one of the branches of Digital forensics which is Mobile forensics that aims to recover digital evidence or relevant data from a mobile device in a way that will preserve evidence. This article aims to provide the review of state-of-art and the brief about the forensic lifecycle, process and methodologies that are used for extracting and preserving the data from Mobile phones or smart phones and also some of the tools and software’s.
数字取证是一门获取、分析和保存包含在电子媒体中的数据的科学。这是网络犯罪调查过程中最复杂的一步,通常被用作在大多数可起诉案件的法庭上出示的证据。本文简要介绍了数字取证的一个分支,即移动取证,旨在以保存证据的方式从移动设备恢复数字证据或相关数据。这篇文章的目的是提供最新的审查和简要的取证生命周期,过程和方法,用于提取和保存数据从移动电话或智能手机和一些工具和软件的。
{"title":"Forensics-as-a-service: A Review of Mobile Forensics","authors":"Yogesh Kumar Sharma, Syed Shagufta Noval, Arpit Jain, B. Sabitha, T. Ramya","doi":"10.1109/IC3I56241.2022.10072726","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072726","url":null,"abstract":"Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media. It is the most intricate step of the cybercrime investigation process often used as the evidence that can be presented in the court of law for most prosecutable cases. This article briefs about one of the branches of Digital forensics which is Mobile forensics that aims to recover digital evidence or relevant data from a mobile device in a way that will preserve evidence. This article aims to provide the review of state-of-art and the brief about the forensic lifecycle, process and methodologies that are used for extracting and preserving the data from Mobile phones or smart phones and also some of the tools and software’s.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132357928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain based digital voting system: A secure and decentralized electoral process 基于区块链的数字投票系统:一个安全和分散的选举过程
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073137
Amitabh Bhargava, A. Rana, D. Bhargava
Voting is the right of every citizen to make significant decisions regarding the selection of their respective government. The contemporary voting techniques such as ballot boxes, Electronic Voting Machines and digital voting systems can be susceptible to security concerns such as DDoS attacks, fraudulent votes, vote tampering and manipulation and virus assaults. The proposed method an attempt to propose a secure electoral process with the use of block chain technology. This article proposes the use of Blockchain Technology to mitigate faults in existing e-voting system and offers more safe, trustworthy, and transparent system. The proposed block chain based digital voting proposes data security and decentralization to address the challenges with the current voting method.
选举权是每个公民在选择各自政府方面作出重大决定的权利。现代投票技术,如投票箱、电子投票机和数字投票系统,可能容易受到DDoS攻击、欺诈投票、投票篡改和操纵以及病毒攻击等安全问题的影响。所提出的方法试图通过使用区块链技术提出一个安全的选举过程。本文建议使用区块链技术来减轻现有电子投票系统中的故障,并提供更安全,可信和透明的系统。提出的基于区块链的数字投票提出了数据安全性和去中心化,以解决当前投票方法的挑战。
{"title":"Blockchain based digital voting system: A secure and decentralized electoral process","authors":"Amitabh Bhargava, A. Rana, D. Bhargava","doi":"10.1109/IC3I56241.2022.10073137","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073137","url":null,"abstract":"Voting is the right of every citizen to make significant decisions regarding the selection of their respective government. The contemporary voting techniques such as ballot boxes, Electronic Voting Machines and digital voting systems can be susceptible to security concerns such as DDoS attacks, fraudulent votes, vote tampering and manipulation and virus assaults. The proposed method an attempt to propose a secure electoral process with the use of block chain technology. This article proposes the use of Blockchain Technology to mitigate faults in existing e-voting system and offers more safe, trustworthy, and transparent system. The proposed block chain based digital voting proposes data security and decentralization to address the challenges with the current voting method.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121755045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unconventional Research on the Consequences of Insulating Material Damage Problem within Distribution Transformers Laminations 配电变压器片内绝缘材料损坏后果的非常规研究
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072629
R. Sikka, Sakshi Sharma
Transformers are the most expensive and strategically vital component of power systems. When the insulation between the power transformers’ laminations deteriorates, it may result in serious failures in big transformers and unintentional outages that can be expensive to fix and cost money. The effects of composite laminates insulation damage on the power transformer laminations for a range of flux intensities and set points are investigated in this research. In the study’s experimental work, inter-lamination deterioration is induced for a variety of sites and for a range of lamination numbers, including 2, 6, and 12. For successful results, flux densities of 0. 5T, 1.0T, 1.5T, 1,7T, and 1. 8T were needed. According to the study’s results, the magnetic characteristics of the cores are dramatically impacted when inter-lamination insulation fails. Temperatures and power loss grow considerably as the number of shorted laminations grows.
变压器是电力系统中最昂贵且具有重要战略意义的部件。当电力变压器片层之间的绝缘恶化时,可能会导致大型变压器的严重故障和意外停机,这可能是昂贵的修复和花费金钱。在一定的磁通强度和设定值范围内,研究了复合材料层合板绝缘损伤对电力变压器层合板的影响。在本研究的实验工作中,不同的位置和不同的层压数(包括2、6和12)都会引起层压间的退化。对于成功的结果,通量密度为0。5T, 1.0T, 1.5T, 1,7T, 1。这是需要的。研究结果表明,当层间绝缘失效时,磁芯的磁性会受到极大的影响。温度和功率损耗随着短片数量的增加而显著增加。
{"title":"Unconventional Research on the Consequences of Insulating Material Damage Problem within Distribution Transformers Laminations","authors":"R. Sikka, Sakshi Sharma","doi":"10.1109/IC3I56241.2022.10072629","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072629","url":null,"abstract":"Transformers are the most expensive and strategically vital component of power systems. When the insulation between the power transformers’ laminations deteriorates, it may result in serious failures in big transformers and unintentional outages that can be expensive to fix and cost money. The effects of composite laminates insulation damage on the power transformer laminations for a range of flux intensities and set points are investigated in this research. In the study’s experimental work, inter-lamination deterioration is induced for a variety of sites and for a range of lamination numbers, including 2, 6, and 12. For successful results, flux densities of 0. 5T, 1.0T, 1.5T, 1,7T, and 1. 8T were needed. According to the study’s results, the magnetic characteristics of the cores are dramatically impacted when inter-lamination insulation fails. Temperatures and power loss grow considerably as the number of shorted laminations grows.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Detailed Review of Implementation of Deep Learning Approaches for Industrial Internet of Things with the Different Opportunities and Challenges 深度学习方法在工业物联网中的应用及其机遇与挑战
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072499
Akash Saxena, Bhasker Pant, Joel Alanya-Beltran, S. Akram, B. Bhaskar, Rohit Bansal
The Industrial Internet of Things (IIoT) has become one of the most rapidly developing innovative technologies in recent years, with the potential to digitize and connect numerous industries for enormous commercial prospects and growth of the global GDP. Industry, logistics, shipping, petroleum and natural gas, mining and metals, power utilities, and aviation are just a few of the diverse industries that employ IIoT. Even while the IIoT offers exciting potential for the creation of many industrial applications, these applications must meet more stringent security standards and are vulnerable to cyberattacks. Since there are so many sensors There is a tone of data in the IIoT networkis produced, which has caught the attention of hackers all around the world. The intrusion detection system (IDS), which monitors network traffic and identifies network activity, is one of the main security solutions for defending IIoT applications from threats. Recent research has shown that deep learning and machine learning techniques can enhance intrusion detection effectiveness and lessen a range of security risks. In this work, we provide an overview of IIoT-focused IDS techniques based on deep learning. Providing a range of deep learning-based IDS detection techniques, datasets, and comparative studies is the major goal of this effort. Ultimately, the goal of the study is to highlight the shortcomings and difficulties of past investigations.as well as possible alternatives and potential trends.
工业物联网(IIoT)已成为近年来发展最快的创新技术之一,具有数字化和连接众多行业的潜力,为全球GDP带来巨大的商业前景和增长。工业、物流、航运、石油和天然气、采矿和金属、电力公用事业和航空只是采用工业物联网的不同行业中的一小部分。尽管工业物联网为创建许多工业应用提供了令人兴奋的潜力,但这些应用必须满足更严格的安全标准,并且容易受到网络攻击。由于有如此多的传感器,在工业物联网网络中产生了大量的数据,这引起了世界各地黑客的注意。入侵检测系统(IDS)监控网络流量并识别网络活动,是保护工业物联网应用免受威胁的主要安全解决方案之一。最近的研究表明,深度学习和机器学习技术可以提高入侵检测的有效性,降低一系列安全风险。在这项工作中,我们概述了基于深度学习的以工业物联网为重点的IDS技术。提供一系列基于深度学习的IDS检测技术、数据集和比较研究是这项工作的主要目标。最终,本研究的目的是突出过去调查的缺点和困难。以及可能的替代方案和潜在趋势。
{"title":"A Detailed Review of Implementation of Deep Learning Approaches for Industrial Internet of Things with the Different Opportunities and Challenges","authors":"Akash Saxena, Bhasker Pant, Joel Alanya-Beltran, S. Akram, B. Bhaskar, Rohit Bansal","doi":"10.1109/IC3I56241.2022.10072499","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072499","url":null,"abstract":"The Industrial Internet of Things (IIoT) has become one of the most rapidly developing innovative technologies in recent years, with the potential to digitize and connect numerous industries for enormous commercial prospects and growth of the global GDP. Industry, logistics, shipping, petroleum and natural gas, mining and metals, power utilities, and aviation are just a few of the diverse industries that employ IIoT. Even while the IIoT offers exciting potential for the creation of many industrial applications, these applications must meet more stringent security standards and are vulnerable to cyberattacks. Since there are so many sensors There is a tone of data in the IIoT networkis produced, which has caught the attention of hackers all around the world. The intrusion detection system (IDS), which monitors network traffic and identifies network activity, is one of the main security solutions for defending IIoT applications from threats. Recent research has shown that deep learning and machine learning techniques can enhance intrusion detection effectiveness and lessen a range of security risks. In this work, we provide an overview of IIoT-focused IDS techniques based on deep learning. Providing a range of deep learning-based IDS detection techniques, datasets, and comparative studies is the major goal of this effort. Ultimately, the goal of the study is to highlight the shortcomings and difficulties of past investigations.as well as possible alternatives and potential trends.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128001683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-Time Signal Processing using AI Integrated Framework for Color and Drawing in Gesture Recognition 基于AI的手势识别颜色与绘图集成框架的实时信号处理
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072448
Geerija Lavania, V. Arya, N. Sharma, Mamoon Rashid, S. Akram
In the realm of image processing and pattern recognition, writing with gestures in the air has grown in popularity and difficulty over the past few years. It contributes significantly to the creation of automation processes and can improve human-machine communication in a range of systems. Many studies focus on cutting-edge methods and techniques that will expedite processing while preserving a high level of identification accuracy. Internally, the area of computer vision considers object tracking to be crucial. Object tracking techniques are credited to modern computers, easy access to good-looking, affordable video cameras, and automated video analytics requirements. The video analysis technique generally consists of three fundamental steps: first, recognizing the object, second, tracking its movement from frame to frame, and third, assessing the behavior of that object. Each of the four takes into account a separate issue: choosing the best item representation, choosing the tracking function, purchasing the item, and tracking the item. Numerous real-world applications, such as autonomous monitoring, video identification, and vehicle navigation, depend heavily on object-tracking algorithms. This area is utilized by the research, which focuses on it to create a prospective text-to-text converter transition. This Research occasionally works as a freelance journalist. Your fingerprint will be tracked by a computer. The created text can be copied and used for a variety of things, including emails and SMS. For the deaf, it will be a potent means to establish this connection. By removing the need for writing, an efficient communication system decreases the use of the phone and laptop.
在图像处理和模式识别领域,在过去几年中,用空中手势书写越来越受欢迎,难度也越来越大。它对自动化过程的创建做出了重大贡献,并可以改善一系列系统中的人机通信。许多研究集中在尖端的方法和技术上,这些方法和技术将加快处理速度,同时保持高水平的识别准确性。在内部,计算机视觉领域认为目标跟踪是至关重要的。目标跟踪技术归功于现代计算机,方便地获得好看的、负担得起的摄像机,以及自动视频分析需求。视频分析技术通常包括三个基本步骤:首先,识别对象,其次,跟踪其从一帧到另一帧的运动,第三,评估该对象的行为。这四种方法中的每一种都考虑一个单独的问题:选择最佳的商品表示、选择跟踪功能、购买商品和跟踪商品。许多现实世界的应用,如自主监控、视频识别和车辆导航,都严重依赖于目标跟踪算法。本研究利用了这一领域,着重于它来创建一个潜在的文本到文本转换器转换。本研究偶尔作为自由记者工作。你的指纹会被电脑追踪。创建的文本可以复制并用于各种各样的事情,包括电子邮件和短信。对于聋人来说,这将是建立这种联系的有力手段。通过消除对书写的需要,高效的通信系统减少了电话和笔记本电脑的使用。
{"title":"Real-Time Signal Processing using AI Integrated Framework for Color and Drawing in Gesture Recognition","authors":"Geerija Lavania, V. Arya, N. Sharma, Mamoon Rashid, S. Akram","doi":"10.1109/IC3I56241.2022.10072448","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072448","url":null,"abstract":"In the realm of image processing and pattern recognition, writing with gestures in the air has grown in popularity and difficulty over the past few years. It contributes significantly to the creation of automation processes and can improve human-machine communication in a range of systems. Many studies focus on cutting-edge methods and techniques that will expedite processing while preserving a high level of identification accuracy. Internally, the area of computer vision considers object tracking to be crucial. Object tracking techniques are credited to modern computers, easy access to good-looking, affordable video cameras, and automated video analytics requirements. The video analysis technique generally consists of three fundamental steps: first, recognizing the object, second, tracking its movement from frame to frame, and third, assessing the behavior of that object. Each of the four takes into account a separate issue: choosing the best item representation, choosing the tracking function, purchasing the item, and tracking the item. Numerous real-world applications, such as autonomous monitoring, video identification, and vehicle navigation, depend heavily on object-tracking algorithms. This area is utilized by the research, which focuses on it to create a prospective text-to-text converter transition. This Research occasionally works as a freelance journalist. Your fingerprint will be tracked by a computer. The created text can be copied and used for a variety of things, including emails and SMS. For the deaf, it will be a potent means to establish this connection. By removing the need for writing, an efficient communication system decreases the use of the phone and laptop.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134010978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting Aggregation Sequentially with M-A-C’s and Detecting Functionality 具有M-A-C和检测功能的顺序重访聚合
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073247
Ritu Shree, Manjeet
A cryptographic tool known as the aggregate message authentication code (aggregate MAC) can condense the MAC’Stags from several messages into a single, condensed aggregate MAC’Stag. The sequentially aggregated MAC’s may additionally verify the (sequential) order of messages in addition to the correctness of multiple messages. In this study, we provide a novel sequentially aggregated MAC’s paradigm in which an aggregation kind of algorithm creates a sequential aggregating based just on any type of various sequences officially describe type of security in this paradigm, which uses separate MAC’Stags without a secret key. Additionally, without altering the MACs’ structure, we provide a general method of building consecutive aggregate MACs beginning from any MAC. By integrating the aggregation algorithm with other MAC’s methods currently present in the given type of networks, this property is helpful to increase the efficiency of the current networks. It also offer a sequential aggregate MAC’s with detecting capabilities by expanding the SAMAC’s findings (SAMD’S). It can define a message which is valid or invalid order for a particular type of message using the SAMD’S. We propose a general type of design of SAMD’S using random type of oracle model from which any MACs and non-adaptive group can be tested and their kind of protocols with formal type of security implementation proofs. We further define the type of security of SAMD’S.
称为聚合消息身份验证码(聚合MAC)的加密工具可以将来自多个消息的MAC标记压缩为一个浓缩的聚合MAC标记。除多个消息的正确性外,顺序聚合的MAC还可以额外验证消息的(顺序)顺序。在本研究中,我们提供了一种新的顺序聚合MAC的范式,在这种范式中,一种聚合算法基于任何类型的各种正式描述安全类型的序列创建顺序聚合,该范式使用单独的MAC 'Stags而没有密钥。此外,在不改变MAC结构的情况下,我们提供了一种从任何MAC开始构建连续聚合MAC的通用方法。通过将聚合算法与给定类型网络中当前存在的其他MAC方法集成,这种特性有助于提高当前网络的效率。它还通过扩展SAMAC的发现(SAMD’s),提供具有检测能力的顺序聚合MAC。它可以使用SAMD 'S为特定类型的消息定义有效或无效的消息顺序。我们提出了一种通用类型的SAMD的设计,使用随机类型的oracle模型,任何mac和非自适应组都可以测试,它们的协议类型具有正式类型的安全实现证明。我们进一步定义了SAMD的安全类型。
{"title":"Revisiting Aggregation Sequentially with M-A-C’s and Detecting Functionality","authors":"Ritu Shree, Manjeet","doi":"10.1109/IC3I56241.2022.10073247","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073247","url":null,"abstract":"A cryptographic tool known as the aggregate message authentication code (aggregate MAC) can condense the MAC’Stags from several messages into a single, condensed aggregate MAC’Stag. The sequentially aggregated MAC’s may additionally verify the (sequential) order of messages in addition to the correctness of multiple messages. In this study, we provide a novel sequentially aggregated MAC’s paradigm in which an aggregation kind of algorithm creates a sequential aggregating based just on any type of various sequences officially describe type of security in this paradigm, which uses separate MAC’Stags without a secret key. Additionally, without altering the MACs’ structure, we provide a general method of building consecutive aggregate MACs beginning from any MAC. By integrating the aggregation algorithm with other MAC’s methods currently present in the given type of networks, this property is helpful to increase the efficiency of the current networks. It also offer a sequential aggregate MAC’s with detecting capabilities by expanding the SAMAC’s findings (SAMD’S). It can define a message which is valid or invalid order for a particular type of message using the SAMD’S. We propose a general type of design of SAMD’S using random type of oracle model from which any MACs and non-adaptive group can be tested and their kind of protocols with formal type of security implementation proofs. We further define the type of security of SAMD’S.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Management Information System based on Artificial Intelligence Technology 基于人工智能技术的管理信息系统
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073285
Swarupa Pelleti, Sahil Bains, A. Bansal, I. Muda, Harish Chowdhary, Yashodhan Mahajan
Personalized suggestions, such as those based on a user’s search history, purchase history, or other online activity, are a common use of artificial intelligence. AI is used a lot in commerce to do things like optimize products, plan inventory, handle logistics, and more. In order to deal with the problems caused by cloud computing, big data, and AI, developers of modern information systems are adding AI to the platform for managing information. Natural language, intelligent processing, and established procedures are all components of artificial intelligence, a subfield of computer science. Since the inception of AI, there has been continuous development in both the underlying technology and the range of potential uses. The purpose of this essay is twofold: first, to investigate how AI may be useful in the management information system of the container transport industry, and second, to offer suggestions for how that system might be enhanced. K-means clustering is an approach that is proposed in this work. The efforts made in building the terminal management system have substantially benefited the fields of automation, intelligent planning, and integrated management. A lot of work has gone into improving the terminal management system, and it has paid off in the form of significant advances in areas like automation, intelligent planning, and integrated management. Mulesoft Anypoint, which relies heavily on the Navic information platform and GPS for its Internet connectivity, is also being implemented at the same time. Therefore, the CCR approach is employed to operate the multimodal transport virtual container while analyzing its performance under coproduction’s management. When sent in containers, as much as 98.5 % of goods arrive in one piece.
个性化建议,例如基于用户的搜索历史、购买历史或其他在线活动的建议,是人工智能的常见用途。人工智能在商业中被广泛用于优化产品、计划库存、处理物流等方面。为了应对云计算、大数据和人工智能带来的问题,现代信息系统的开发人员正在将人工智能添加到管理信息的平台中。自然语言、智能处理和既定程序都是人工智能的组成部分,人工智能是计算机科学的一个分支。自人工智能诞生以来,其基础技术和潜在用途都在不断发展。本文的目的有两个:首先,研究人工智能在集装箱运输业管理信息系统中的作用,其次,为如何加强该系统提供建议。k -均值聚类是在这项工作中提出的一种方法。码头管理系统的建设对自动化、智能规划、综合管理等领域产生了巨大的推动作用。在完善终端管理系统方面做了大量工作,在自动化、智能规划、综合管理等方面取得了重大进展。与此同时,Mulesoft Anypoint也在实施中,该系统在互联网连接方面严重依赖于海军信息平台和GPS。因此,本文采用CCR方法对多式联运虚拟集装箱进行操作,并对其在合产管理下的性能进行分析。当用集装箱发货时,多达98.5%的货物是一件到达的。
{"title":"Management Information System based on Artificial Intelligence Technology","authors":"Swarupa Pelleti, Sahil Bains, A. Bansal, I. Muda, Harish Chowdhary, Yashodhan Mahajan","doi":"10.1109/IC3I56241.2022.10073285","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073285","url":null,"abstract":"Personalized suggestions, such as those based on a user’s search history, purchase history, or other online activity, are a common use of artificial intelligence. AI is used a lot in commerce to do things like optimize products, plan inventory, handle logistics, and more. In order to deal with the problems caused by cloud computing, big data, and AI, developers of modern information systems are adding AI to the platform for managing information. Natural language, intelligent processing, and established procedures are all components of artificial intelligence, a subfield of computer science. Since the inception of AI, there has been continuous development in both the underlying technology and the range of potential uses. The purpose of this essay is twofold: first, to investigate how AI may be useful in the management information system of the container transport industry, and second, to offer suggestions for how that system might be enhanced. K-means clustering is an approach that is proposed in this work. The efforts made in building the terminal management system have substantially benefited the fields of automation, intelligent planning, and integrated management. A lot of work has gone into improving the terminal management system, and it has paid off in the form of significant advances in areas like automation, intelligent planning, and integrated management. Mulesoft Anypoint, which relies heavily on the Navic information platform and GPS for its Internet connectivity, is also being implemented at the same time. Therefore, the CCR approach is employed to operate the multimodal transport virtual container while analyzing its performance under coproduction’s management. When sent in containers, as much as 98.5 % of goods arrive in one piece.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133073080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Powerful Data Mining Method for Locating Sets of High Electricity Items 一种强大的高电项目集定位数据挖掘方法
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072572
T. Mahesh, Devi Kanniga
The Finding usable data in huge, abundant archives is connected to data gathering. The objective is to develop tools that help individuals find key trends in massive volumes of data. Electricity mined is such a crucial technological advancement. Similar data extends mine for things, which are frequently found via the trust and backing of other items with in data set. Through the use of a common miner concept, several scholars too have created a unique idea for the liquidity mine on items. In this study, we aim to identify eligible pieces & item set based on a criterion called weighted transactions utility. In addition, we provide a fresh ultimately greater data mining technique. The novel approach outperforms earlier computation techniques.
在海量、丰富的档案中发现可用的数据,是与数据收集有关的。其目标是开发工具,帮助个人在海量数据中发现关键趋势。电力开采是一项至关重要的技术进步。类似的数据扩展了对事物的挖掘,这些事物通常是通过数据集中其他项目的信任和支持来发现的。几位学者也通过对一般矿工概念的运用,对物品上的流动性矿山提出了独特的构想。在本研究中,我们的目标是基于加权交易效用的标准来识别合格的片段和项目集。此外,我们还提供了一种全新的、最终更强大的数据挖掘技术。这种新方法优于以前的计算技术。
{"title":"A Powerful Data Mining Method for Locating Sets of High Electricity Items","authors":"T. Mahesh, Devi Kanniga","doi":"10.1109/IC3I56241.2022.10072572","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072572","url":null,"abstract":"The Finding usable data in huge, abundant archives is connected to data gathering. The objective is to develop tools that help individuals find key trends in massive volumes of data. Electricity mined is such a crucial technological advancement. Similar data extends mine for things, which are frequently found via the trust and backing of other items with in data set. Through the use of a common miner concept, several scholars too have created a unique idea for the liquidity mine on items. In this study, we aim to identify eligible pieces & item set based on a criterion called weighted transactions utility. In addition, we provide a fresh ultimately greater data mining technique. The novel approach outperforms earlier computation techniques.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133811359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Numerical Simulation of MERVH (Motion and Energy Regulating Vibration Harvester) for different human activities 针对不同人体活动的MERVH(运动与能量调节振动收割机)数值模拟
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072735
Ganesh Korwar, S. Jabade, N. Satpute, Swapnil Arawade
In this paper the numerical simulation of the MERVH is presented. The simulation is mainly intended to investigate the effectiveness of MERVH for human activities such as slow walking, fast walking, jumping, jogging, and running. The MATLAB-Simulink is used to numerically analyze the theoretical model. The results revealed that the MERVH provides average power output varying from 0.04 W to 0.19 W and peak power of 4.41 W. The maximum power was obtained in case of running motion. The MERVH is found to be useful in powering wearable devices and operating the medical sensors.
本文对MERVH进行了数值模拟。模拟主要是为了研究MERVH在慢走、快走、跳跃、慢跑和跑步等人类活动中的有效性。利用MATLAB-Simulink对理论模型进行了数值分析。结果表明,MERVH的平均输出功率为0.04 ~ 0.19 W,峰值功率为4.41 W。在运行运动时获得最大功率。人们发现MERVH在为可穿戴设备供电和操作医疗传感器方面很有用。
{"title":"Numerical Simulation of MERVH (Motion and Energy Regulating Vibration Harvester) for different human activities","authors":"Ganesh Korwar, S. Jabade, N. Satpute, Swapnil Arawade","doi":"10.1109/IC3I56241.2022.10072735","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072735","url":null,"abstract":"In this paper the numerical simulation of the MERVH is presented. The simulation is mainly intended to investigate the effectiveness of MERVH for human activities such as slow walking, fast walking, jumping, jogging, and running. The MATLAB-Simulink is used to numerically analyze the theoretical model. The results revealed that the MERVH provides average power output varying from 0.04 W to 0.19 W and peak power of 4.41 W. The maximum power was obtained in case of running motion. The MERVH is found to be useful in powering wearable devices and operating the medical sensors.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114152156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1