Pub Date : 2022-08-01DOI: 10.1109/ACM57404.2022.00022
Lingeshwaran B, Avtar Singh
Classic cryptography algorithms have become more fragile and vulnerable to modern attacks. The advancement of quantum computers and its attacks are now a big threat to the classic cryptography which uses hard mathematical calculation for security, that leads to the commence of the post quantum cryptography which are resistant to the quantum attacks. National Institute of Standardization and Technology is in process of standardizing the post quantum cryptography algorithm based on different factors like encapsulation, decapsulation time, keypair generation time, speed etc. In this paper we will discuss about the performance evaluation of post quantum cryptography algorithms especially the power consumption of Classic McEliece algorithm and its different variation which comes under code-based cryptography. The evaluated results are tabulated and categorized based on the different principles used and the factors leading to major power consumption is identified.
{"title":"Performance Evaluation of Classic McEliece Post Quantum Cryptography","authors":"Lingeshwaran B, Avtar Singh","doi":"10.1109/ACM57404.2022.00022","DOIUrl":"https://doi.org/10.1109/ACM57404.2022.00022","url":null,"abstract":"Classic cryptography algorithms have become more fragile and vulnerable to modern attacks. The advancement of quantum computers and its attacks are now a big threat to the classic cryptography which uses hard mathematical calculation for security, that leads to the commence of the post quantum cryptography which are resistant to the quantum attacks. National Institute of Standardization and Technology is in process of standardizing the post quantum cryptography algorithm based on different factors like encapsulation, decapsulation time, keypair generation time, speed etc. In this paper we will discuss about the performance evaluation of post quantum cryptography algorithms especially the power consumption of Classic McEliece algorithm and its different variation which comes under code-based cryptography. The evaluated results are tabulated and categorized based on the different principles used and the factors leading to major power consumption is identified.","PeriodicalId":322569,"journal":{"name":"2022 Algorithms, Computing and Mathematics Conference (ACM)","volume":"48 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125722271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper discusses the concept of Security and Privacy in social media platforms and social networking. First, a brief history and importance of social media will be addressed. Many Security risks associated with social media are explained and how they can affect users' privacy is presented. Present solutions are discussed and based on these discussions a new proposed system will be suggested. At the end of the research, we will understand how critical security hazards such as Identity Theft, Vulgar Content detection, etc. can be resolved using high-tech AI, ML technologies like deep learning, and neural networks to make social media platforms more secure. This research paper will also spread awareness among readers on how the security hazards of social media can be tackled.
{"title":"Security Hazards of Social Media And Their Resolutions","authors":"Narottam Aswal, Atharva Kale, Dhanamma Jagli, Ramesh Solanki","doi":"10.1109/ACM57404.2022.00016","DOIUrl":"https://doi.org/10.1109/ACM57404.2022.00016","url":null,"abstract":"This paper discusses the concept of Security and Privacy in social media platforms and social networking. First, a brief history and importance of social media will be addressed. Many Security risks associated with social media are explained and how they can affect users' privacy is presented. Present solutions are discussed and based on these discussions a new proposed system will be suggested. At the end of the research, we will understand how critical security hazards such as Identity Theft, Vulgar Content detection, etc. can be resolved using high-tech AI, ML technologies like deep learning, and neural networks to make social media platforms more secure. This research paper will also spread awareness among readers on how the security hazards of social media can be tackled.","PeriodicalId":322569,"journal":{"name":"2022 Algorithms, Computing and Mathematics Conference (ACM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/ACM57404.2022.00021
W. Auccahuasi, Sandra Meza, A. Fuentes, Grisi Bernardo, Lucas Herrera, C. Ovalle, Hernando Martín Campos Martinez, K. Rojas, Miryam Inciso-Rojas, Aly Auccahuasi
Information and communication technologies are changing the paradigms in the development of activities and ways of learning, one of these changes in the way of performing academic activities, where today there are many resources on the network available for review, in the case of engineering students, we can indicate as an example activities related to the practice of programming languages, where it is required to visualize the programmed activities, at the same time it is required to analyze programming language manuals, also you can view videos about applications, and also have the language development interface and finally the console where you can view the results in the execution, these requirements make it possible that a single monitor does not meet the requirements needed, in this research work, we present a method to have multiple monitors each with a different task that can meet the technical requirements of engineering students, these features are achieved through the use of virtual reality glasses Oculus Gest II with a software application Immersed, with these tools we obtain as a result the display on the glasses of multiple monitors configured in each of them to the needs of the student, We indicate in the part of the materials and methods the technical requirements of hardware and software as well as the procedures for the installation and configuration where it is necessary a computer with internet access, in the results we present a demonstration of how to use the method and an example of the exploitation of the resources that these tools provide us added to the access that can be had from mobile devices to replicate what is being observed in the virtual reality glasses.
{"title":"Method to Increase Virtual Interactivity, through Virtual Reality Technology, Aplied to Engieering Students","authors":"W. Auccahuasi, Sandra Meza, A. Fuentes, Grisi Bernardo, Lucas Herrera, C. Ovalle, Hernando Martín Campos Martinez, K. Rojas, Miryam Inciso-Rojas, Aly Auccahuasi","doi":"10.1109/ACM57404.2022.00021","DOIUrl":"https://doi.org/10.1109/ACM57404.2022.00021","url":null,"abstract":"Information and communication technologies are changing the paradigms in the development of activities and ways of learning, one of these changes in the way of performing academic activities, where today there are many resources on the network available for review, in the case of engineering students, we can indicate as an example activities related to the practice of programming languages, where it is required to visualize the programmed activities, at the same time it is required to analyze programming language manuals, also you can view videos about applications, and also have the language development interface and finally the console where you can view the results in the execution, these requirements make it possible that a single monitor does not meet the requirements needed, in this research work, we present a method to have multiple monitors each with a different task that can meet the technical requirements of engineering students, these features are achieved through the use of virtual reality glasses Oculus Gest II with a software application Immersed, with these tools we obtain as a result the display on the glasses of multiple monitors configured in each of them to the needs of the student, We indicate in the part of the materials and methods the technical requirements of hardware and software as well as the procedures for the installation and configuration where it is necessary a computer with internet access, in the results we present a demonstration of how to use the method and an example of the exploitation of the resources that these tools provide us added to the access that can be had from mobile devices to replicate what is being observed in the virtual reality glasses.","PeriodicalId":322569,"journal":{"name":"2022 Algorithms, Computing and Mathematics Conference (ACM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121976364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/ACM57404.2022.00019
Dr. V Vinuchakravarthi, S.Srinivasan, Dr. A.Vikraman
The purpose of the study is to identify the awareness about the various harmful practises followed in the food products and the consequences of the same. 187 respondents have been selected using simple random sampling, and to identify the relationship between Age, Gender, Educational Qualification with level of understanding about the various harmful practises followed, Correlation and Mann – Whitney U –Test had been employed to find the relationship between the factors. And it is found that the awareness level on Preservatives, artificial colors, chemicals and pesticides etc are high with increase in age. Education level doesn't have impact on awareness level. There is no difference in awareness level of preservatives, chemicals, artificial colors and pesticides added between the genders, it is also observed that the married respondents have greater awareness level compared to unmarried respondents.
这项研究的目的是确定人们对食品中各种有害做法的认识及其后果。采用简单随机抽样的方法,选取187名调查对象,采用相关检验和Mann - Whitney U - test来确定年龄、性别、教育程度与所遵循的各种有害做法的了解程度之间的关系。随着年龄的增长,对防腐剂、人工色素、化学药品、农药等的认知程度也越来越高。教育水平对意识水平没有影响。两性对添加的防腐剂、化学药品、人工色素和农药的认知水平无差异,已婚受访者的认知水平高于未婚受访者。
{"title":"A study on awareness about the harmful practises followed in the food industry","authors":"Dr. V Vinuchakravarthi, S.Srinivasan, Dr. A.Vikraman","doi":"10.1109/ACM57404.2022.00019","DOIUrl":"https://doi.org/10.1109/ACM57404.2022.00019","url":null,"abstract":"The purpose of the study is to identify the awareness about the various harmful practises followed in the food products and the consequences of the same. 187 respondents have been selected using simple random sampling, and to identify the relationship between Age, Gender, Educational Qualification with level of understanding about the various harmful practises followed, Correlation and Mann – Whitney U –Test had been employed to find the relationship between the factors. And it is found that the awareness level on Preservatives, artificial colors, chemicals and pesticides etc are high with increase in age. Education level doesn't have impact on awareness level. There is no difference in awareness level of preservatives, chemicals, artificial colors and pesticides added between the genders, it is also observed that the married respondents have greater awareness level compared to unmarried respondents.","PeriodicalId":322569,"journal":{"name":"2022 Algorithms, Computing and Mathematics Conference (ACM)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125247155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/ACM57404.2022.00014
Ameya Parkar, Rajni Bhalla
Sentiment Analysis is gathering a lot of attention nowadays as a lot of online data is gathered through blogs, ecommerce websites, product reviews, etc. which people are expressing online. This data is extracted by companies to judge if their products are having a positive outlook or a negative outlook. Sarcasm is a problem faced in sentiment analysis as it flips the polarity of the sentence. This paper provides a survey on different techniques used by researchers to detect sarcasm. At the end, we propose a methodology to detect sarcasm. The proposed framework will give suggestions to different researchers in the detection of sarcasm.
{"title":"A Survey Paper on the Latest Techniques for Sarcasm Detection Using BG Method","authors":"Ameya Parkar, Rajni Bhalla","doi":"10.1109/ACM57404.2022.00014","DOIUrl":"https://doi.org/10.1109/ACM57404.2022.00014","url":null,"abstract":"Sentiment Analysis is gathering a lot of attention nowadays as a lot of online data is gathered through blogs, ecommerce websites, product reviews, etc. which people are expressing online. This data is extracted by companies to judge if their products are having a positive outlook or a negative outlook. Sarcasm is a problem faced in sentiment analysis as it flips the polarity of the sentence. This paper provides a survey on different techniques used by researchers to detect sarcasm. At the end, we propose a methodology to detect sarcasm. The proposed framework will give suggestions to different researchers in the detection of sarcasm.","PeriodicalId":322569,"journal":{"name":"2022 Algorithms, Computing and Mathematics Conference (ACM)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116151000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/ACM57404.2022.00023
W. Auccahuasi, Sandra Meza, Kety Sifuentes, Daysi Mancco, Lucas Herrera, C. Ovalle, Hernando Martín Campos Martinez, K. Rojas, Miryam Inciso-Rojas, Aly Auccahuasi
Information and communication technologies present us with a variety of equipment that can measure physiological signals at affordable costs, which in previous years could pay high costs, one of these equipment is the recording of EEG signals, with a single solid state sensor, the MindWave - NeuroSky equipment, which is normally used to measure the state of meditation and concentration. In the present work we present a not widely used configuration of this device, for recording EEG signals, as a result, we present the EEG signals, in the following order delta, theta, low-alpha, high-alpha, low-beta, high-beta, low-gamma and mid-gamma. As a result we present in graphical mode, each of the signals, the presented method can be used in the diagnosis of different pathologies related to the behavior of the brain.
{"title":"Low-Cost System for Recording Electroencephalography Signals","authors":"W. Auccahuasi, Sandra Meza, Kety Sifuentes, Daysi Mancco, Lucas Herrera, C. Ovalle, Hernando Martín Campos Martinez, K. Rojas, Miryam Inciso-Rojas, Aly Auccahuasi","doi":"10.1109/ACM57404.2022.00023","DOIUrl":"https://doi.org/10.1109/ACM57404.2022.00023","url":null,"abstract":"Information and communication technologies present us with a variety of equipment that can measure physiological signals at affordable costs, which in previous years could pay high costs, one of these equipment is the recording of EEG signals, with a single solid state sensor, the MindWave - NeuroSky equipment, which is normally used to measure the state of meditation and concentration. In the present work we present a not widely used configuration of this device, for recording EEG signals, as a result, we present the EEG signals, in the following order delta, theta, low-alpha, high-alpha, low-beta, high-beta, low-gamma and mid-gamma. As a result we present in graphical mode, each of the signals, the presented method can be used in the diagnosis of different pathologies related to the behavior of the brain.","PeriodicalId":322569,"journal":{"name":"2022 Algorithms, Computing and Mathematics Conference (ACM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129260694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/ACM57404.2022.00015
Prakash Ganesan, P. R, Felix Mathan M, M. M
The rapidly growing trend of online shopping and the increasing surge of global trading has led to major shifts in the way we handle logistics. Logistics is the most important aspect to improve efficiency and warehouses are a core part of logistics. Even today, a vast majority of the warehouses use human labour to move and manage all the items in them. This is not only extremely tiring but also slow and expensive. Therefore, a sure-fire method to improve efficiency is by using robots. This is the concept that this paper suggests and tests. An autonomous robot without any human intervention can map a whole warehouse using its own in-built sensors, in this case, a LIDAR, and use this map to automatically move to its desired position. Simultaneously, it will plan the shortest path to that destination and avoid any obstacles that might come in its path. This robot can replace human sorters and greatly reduce waiting time and costs. This study proves that an autonomous future in any factory is not only easy but also inexpensive and widely obtainable. It also illustrates the vast potential that comes with algorithmic technology applied in traditional fields.
{"title":"Autonomous Guided Vehicle for Smart Warehousing","authors":"Prakash Ganesan, P. R, Felix Mathan M, M. M","doi":"10.1109/ACM57404.2022.00015","DOIUrl":"https://doi.org/10.1109/ACM57404.2022.00015","url":null,"abstract":"The rapidly growing trend of online shopping and the increasing surge of global trading has led to major shifts in the way we handle logistics. Logistics is the most important aspect to improve efficiency and warehouses are a core part of logistics. Even today, a vast majority of the warehouses use human labour to move and manage all the items in them. This is not only extremely tiring but also slow and expensive. Therefore, a sure-fire method to improve efficiency is by using robots. This is the concept that this paper suggests and tests. An autonomous robot without any human intervention can map a whole warehouse using its own in-built sensors, in this case, a LIDAR, and use this map to automatically move to its desired position. Simultaneously, it will plan the shortest path to that destination and avoid any obstacles that might come in its path. This robot can replace human sorters and greatly reduce waiting time and costs. This study proves that an autonomous future in any factory is not only easy but also inexpensive and widely obtainable. It also illustrates the vast potential that comes with algorithmic technology applied in traditional fields.","PeriodicalId":322569,"journal":{"name":"2022 Algorithms, Computing and Mathematics Conference (ACM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134435777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/ACM57404.2022.00010
Gagandeep Kaur, Ajay Sharma
Chatbots have become a prominent element in conversational services since the creation of the ultimate virtual assistants. A chatbot is a computer programme that replicates and identifies textual or verbal human dialogue, allowing users to interact with digital devices in the same way as it is done with actual people. They can be one-line applications that respond to a query, or they could be as virtual assistants that respond and adapt as they collect and analyze data to create increasingly personalized experiences. There are many research areas and opportunities in the domain of medical chatbot. This paper outlines the steps involved in creating a chatbot, the algorithm it uses, and how to get the data set needed to train the chatbots utilized in healthcare communication. The important future directions are also discussed in this paper.
{"title":"AI/ML Sentiment Analysis Model for Medical Chatbot: A Review","authors":"Gagandeep Kaur, Ajay Sharma","doi":"10.1109/ACM57404.2022.00010","DOIUrl":"https://doi.org/10.1109/ACM57404.2022.00010","url":null,"abstract":"Chatbots have become a prominent element in conversational services since the creation of the ultimate virtual assistants. A chatbot is a computer programme that replicates and identifies textual or verbal human dialogue, allowing users to interact with digital devices in the same way as it is done with actual people. They can be one-line applications that respond to a query, or they could be as virtual assistants that respond and adapt as they collect and analyze data to create increasingly personalized experiences. There are many research areas and opportunities in the domain of medical chatbot. This paper outlines the steps involved in creating a chatbot, the algorithm it uses, and how to get the data set needed to train the chatbots utilized in healthcare communication. The important future directions are also discussed in this paper.","PeriodicalId":322569,"journal":{"name":"2022 Algorithms, Computing and Mathematics Conference (ACM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122512746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/ACM57404.2022.00017
A. Sharma, Rajni Bhalla
The aim of the study is to review automatic and advanced techniques for investigating hate and offensive speech from social media (SM) platforms. Finding hateful speech from social media is a text classification problem. In the proposed paper explains the methodology of automatic text classification through the medium of traditional machine learning and advanced deep learning algorithms. On social media, people share their opinion and different content, but some users post hateful and offensive content. Detecting and classifying hate speech from social sites is not a small challenge. There are simply five steps that are collecting the data, data cleaning and pre-processing, applying feature extraction techniques, training and testing data in the classification algorithm, and comparative analysis of the algorithm's performance. This review, analyzes the performance of the confusing metrics concepts using four metrics precision (Pr), recall (Re), F1-score, and accuracy (A). Role of this study is to update the researchers and readers on the state-of-the-art model and technology for hateful speech classification. In the last of, this review paper explains some challenges and research gaps for identifying the hate speech in existing models.
{"title":"Automatic and Advance Techniques for Hate Speech Detection on Social Media: A Review","authors":"A. Sharma, Rajni Bhalla","doi":"10.1109/ACM57404.2022.00017","DOIUrl":"https://doi.org/10.1109/ACM57404.2022.00017","url":null,"abstract":"The aim of the study is to review automatic and advanced techniques for investigating hate and offensive speech from social media (SM) platforms. Finding hateful speech from social media is a text classification problem. In the proposed paper explains the methodology of automatic text classification through the medium of traditional machine learning and advanced deep learning algorithms. On social media, people share their opinion and different content, but some users post hateful and offensive content. Detecting and classifying hate speech from social sites is not a small challenge. There are simply five steps that are collecting the data, data cleaning and pre-processing, applying feature extraction techniques, training and testing data in the classification algorithm, and comparative analysis of the algorithm's performance. This review, analyzes the performance of the confusing metrics concepts using four metrics precision (Pr), recall (Re), F1-score, and accuracy (A). Role of this study is to update the researchers and readers on the state-of-the-art model and technology for hateful speech classification. In the last of, this review paper explains some challenges and research gaps for identifying the hate speech in existing models.","PeriodicalId":322569,"journal":{"name":"2022 Algorithms, Computing and Mathematics Conference (ACM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121662521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}