首页 > 最新文献

2021 International Conference on Computing Sciences (ICCS)最新文献

英文 中文
A Pre-processing Model for Feature Extraction Based on K-mean, PSO and ABC 基于k -均值、粒子群和ABC的特征提取预处理模型
Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00031
Mrinalini Rana, Jimmy Singla
To achieve efficient rule mining feature selection or preprocessing is need to be handled before the implementing the optimization technique. For these different methods are available. In the proposed model $K$ means clustering is used to generate the clusters. Then PSO-ABC hybrid approach is for feature optimization. For the obtained result, PSO-ABC represent more normalized features as compared to using PSO only.
为了实现高效的规则挖掘,需要在优化技术实现之前进行特征选择或预处理。对于这些不同的方法是可用的。在提出的模型中,使用$K$ means聚类来生成聚类。然后采用PSO-ABC混合方法进行特征优化。对于得到的结果,与仅使用PSO相比,PSO- abc表示更多的规范化特征。
{"title":"A Pre-processing Model for Feature Extraction Based on K-mean, PSO and ABC","authors":"Mrinalini Rana, Jimmy Singla","doi":"10.1109/ICCS54944.2021.00031","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00031","url":null,"abstract":"To achieve efficient rule mining feature selection or preprocessing is need to be handled before the implementing the optimization technique. For these different methods are available. In the proposed model $K$ means clustering is used to generate the clusters. Then PSO-ABC hybrid approach is for feature optimization. For the obtained result, PSO-ABC represent more normalized features as compared to using PSO only.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127214971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reviewers: ICCS 2021 审稿人:ICCS 2021
Pub Date : 2021-12-01 DOI: 10.1109/iccs54944.2021.00060
{"title":"Reviewers: ICCS 2021","authors":"","doi":"10.1109/iccs54944.2021.00060","DOIUrl":"https://doi.org/10.1109/iccs54944.2021.00060","url":null,"abstract":"","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116090268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On a Way Together - Database and Machine Learning for Performance Tuning 在一起的路上-数据库和机器学习的性能调优
Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00032
Cherry Khosla, B. Saini
Database Management systems are the crucial components in data intensive applications. For efficiently processing and analyzing the data, the database systems should be at par in terms of performance. Tuning the database is nowadays the major goal to improve DBMS's operations. Optimizing the databases to increase the performance and to meet the needs of an application has surpassed the abilities of the humans. Therefore, the researchers have explored how machine learning can be used to tune the databases automatically. In this paper, we have reviewed and discussed various areas of the database tuning, and how machine learning is used to automatically tune the configurations. We have also discussed the various approaches that can be used to integrate the machine learning with database systems. Lastly, we discussed the open problem in tuning database systems.
数据库管理系统是数据密集型应用程序的关键组件。为了有效地处理和分析数据,数据库系统应该在性能方面达到同等水平。调优数据库是目前改善DBMS操作的主要目标。优化数据库以提高性能并满足应用程序的需求已经超出了人类的能力。因此,研究人员已经探索了如何使用机器学习来自动调优数据库。在本文中,我们回顾并讨论了数据库调优的各个领域,以及如何使用机器学习来自动调优配置。我们还讨论了可用于将机器学习与数据库系统集成的各种方法。最后,我们讨论了调优数据库系统中的开放问题。
{"title":"On a Way Together - Database and Machine Learning for Performance Tuning","authors":"Cherry Khosla, B. Saini","doi":"10.1109/ICCS54944.2021.00032","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00032","url":null,"abstract":"Database Management systems are the crucial components in data intensive applications. For efficiently processing and analyzing the data, the database systems should be at par in terms of performance. Tuning the database is nowadays the major goal to improve DBMS's operations. Optimizing the databases to increase the performance and to meet the needs of an application has surpassed the abilities of the humans. Therefore, the researchers have explored how machine learning can be used to tune the databases automatically. In this paper, we have reviewed and discussed various areas of the database tuning, and how machine learning is used to automatically tune the configurations. We have also discussed the various approaches that can be used to integrate the machine learning with database systems. Lastly, we discussed the open problem in tuning database systems.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126405295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Intelligence Techniques Using Data Analytics: An Overview 使用数据分析的商业智能技术:概述
Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00059
Pooja Mallam, Ashu Ashu, Baljeet Singh
Business intelligence and data analytics areas identify areas where business is at stake or performing well. A much better view of where business may be dropping short is observed. Business Analytics and Data analytics use evidence accumulated over years and get useful information to know where is deformity in businesses. This means that the info is organized and presented that allows it to be visualized. While raw numbers are important, once information becomes valuable and demonstrate value, making insights more straight forward to understand. This paper gives you a brief review of development of business intelligence over course of time using Data Analytics.
商业智能和数据分析领域确定业务处于危险或表现良好的领域。对于企业可能在哪些方面有所欠缺,人们的看法要好得多。商业分析和数据分析使用多年积累的证据,并获得有用的信息,以了解业务中的畸形。这意味着信息被组织和呈现,允许它可视化。虽然原始数据很重要,但一旦信息变得有价值并显示出价值,就可以更直接地理解见解。本文简要回顾了使用数据分析的商业智能在一段时间内的发展。
{"title":"Business Intelligence Techniques Using Data Analytics: An Overview","authors":"Pooja Mallam, Ashu Ashu, Baljeet Singh","doi":"10.1109/ICCS54944.2021.00059","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00059","url":null,"abstract":"Business intelligence and data analytics areas identify areas where business is at stake or performing well. A much better view of where business may be dropping short is observed. Business Analytics and Data analytics use evidence accumulated over years and get useful information to know where is deformity in businesses. This means that the info is organized and presented that allows it to be visualized. While raw numbers are important, once information becomes valuable and demonstrate value, making insights more straight forward to understand. This paper gives you a brief review of development of business intelligence over course of time using Data Analytics.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122255413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods of Sentiment Analysis for Hindi and English Languages 印地语和英语情感分析方法
Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00065
Aarsh Agrawal, Vinay Bhardwaj
Social media is widely regarded as one of the most important unstructured data. Analyzing and extracting meaning from such data is a time-consuming process. Because of the enormous data available on social media platforms, sentiment extraction has gotten a lot of attention. Microblogging is a relatively new phenomenon, with Twitter being the most widely utilized. It's one of the most comprehensive free and open data sources available. Today's society sees a lot of differing viewpoints on Twitter. Researchers can use opinion mining to obtain the present emotion and mood of the public. Sentiment Analysis is defined as the technique of extracting and finding the polarity of a given material to get insight into the hidden information, emotion, feeling contained within a text. The ultimate objective of sentiment analysis is to extract meaningful material from various sources of information. The first analysis of tweets was done using the Natural Language Processing (NLP) method. For further analysis of the opinionated data, two approaches are available: the Lexicon Based Approach (LBA) and the Machine Learning Approach (MLA) based on supervised learning. The LBA approach employs a resource dictionary, namely the Hindi SentiWordNet, and a Hybrid Based Approach (HBA) that joins the Lexicon based and Machine learning for categorizing tweets as positive or negative
社交媒体被广泛认为是最重要的非结构化数据之一。从这些数据中分析和提取意义是一个耗时的过程。由于社交媒体平台上有大量可用的数据,情感提取得到了很多关注。微博是一个相对较新的现象,Twitter是使用最广泛的。它是最全面的免费和开放的数据源之一。今天的社会在推特上看到了很多不同的观点。研究人员可以利用意见挖掘来获取公众当前的情绪和情绪。情感分析被定义为提取和发现给定材料的极性,以深入了解文本中包含的隐藏信息,情感和感觉的技术。情感分析的最终目的是从各种信息来源中提取有意义的材料。对推文的第一次分析是使用自然语言处理(NLP)方法完成的。为了进一步分析固执己见的数据,有两种方法可用:基于词典的方法(LBA)和基于监督学习的机器学习方法(MLA)。LBA方法使用了一个资源字典,即印地语SentiWordNet,以及一种基于混合的方法(HBA),该方法将基于Lexicon的方法和机器学习结合起来,将推文分类为积极或消极
{"title":"Methods of Sentiment Analysis for Hindi and English Languages","authors":"Aarsh Agrawal, Vinay Bhardwaj","doi":"10.1109/ICCS54944.2021.00065","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00065","url":null,"abstract":"Social media is widely regarded as one of the most important unstructured data. Analyzing and extracting meaning from such data is a time-consuming process. Because of the enormous data available on social media platforms, sentiment extraction has gotten a lot of attention. Microblogging is a relatively new phenomenon, with Twitter being the most widely utilized. It's one of the most comprehensive free and open data sources available. Today's society sees a lot of differing viewpoints on Twitter. Researchers can use opinion mining to obtain the present emotion and mood of the public. Sentiment Analysis is defined as the technique of extracting and finding the polarity of a given material to get insight into the hidden information, emotion, feeling contained within a text. The ultimate objective of sentiment analysis is to extract meaningful material from various sources of information. The first analysis of tweets was done using the Natural Language Processing (NLP) method. For further analysis of the opinionated data, two approaches are available: the Lexicon Based Approach (LBA) and the Machine Learning Approach (MLA) based on supervised learning. The LBA approach employs a resource dictionary, namely the Hindi SentiWordNet, and a Hybrid Based Approach (HBA) that joins the Lexicon based and Machine learning for categorizing tweets as positive or negative","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133131454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Network Attacks at Data Link Layer and its Mitigation 数据链路层网络攻击分析及防范
Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00061
Ravi Shanker, Aman Singh
Various packet capturing tools are available to capture packets in the form of datasets and several well-known datasets available now a day for benchmarking the network attacks for intrusion detection system and attracted the researchers to further analyse these attacks for future attacks also. These datasets contain several parameters that can be utilized for identification of attack at cross layers. Here the cross layer refers the data link layer, network layer, transport layer and application layer. These datasets can be used in research for identification and automation of novel attack. This paper concentrates on the attack types and classification of network attacks on data link layer. Post analysis will investigate the possibility of using Snort as intrusion detection tool for identifying attack at data link layer. Snort generally works at network layer and above so not all data link layer attack can be identified by IDS. For the current work a various solution already researched will be put together to analyse attack at data link layer with the help of Snort. This analysis will help in understanding the possibility to put together various attack at data link layer using Snort or provide already suggested solution done by various researcher.
各种数据包捕获工具可以捕获数据集形式的数据包,现在可以使用几个知名的数据集来对入侵检测系统的网络攻击进行基准测试,并吸引研究人员进一步分析这些攻击,以备将来的攻击。这些数据集包含几个参数,可用于识别跨层攻击。这里的交叉层是指数据链路层、网络层、传输层和应用层。这些数据集可用于新型攻击的识别和自动化研究。本文重点研究了数据链路层网络攻击的类型和分类。后期分析将探讨使用Snort作为入侵检测工具识别数据链路层攻击的可能性。Snort通常在网络层及以上工作,因此并非所有数据链路层攻击都可以由IDS识别。对于目前的工作,将把已经研究的各种解决方案放在一起,借助Snort分析数据链路层的攻击。此分析将有助于理解使用Snort在数据链路层组合各种攻击的可能性,或者提供各种研究人员已经提出的解决方案。
{"title":"Analysis of Network Attacks at Data Link Layer and its Mitigation","authors":"Ravi Shanker, Aman Singh","doi":"10.1109/ICCS54944.2021.00061","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00061","url":null,"abstract":"Various packet capturing tools are available to capture packets in the form of datasets and several well-known datasets available now a day for benchmarking the network attacks for intrusion detection system and attracted the researchers to further analyse these attacks for future attacks also. These datasets contain several parameters that can be utilized for identification of attack at cross layers. Here the cross layer refers the data link layer, network layer, transport layer and application layer. These datasets can be used in research for identification and automation of novel attack. This paper concentrates on the attack types and classification of network attacks on data link layer. Post analysis will investigate the possibility of using Snort as intrusion detection tool for identifying attack at data link layer. Snort generally works at network layer and above so not all data link layer attack can be identified by IDS. For the current work a various solution already researched will be put together to analyse attack at data link layer with the help of Snort. This analysis will help in understanding the possibility to put together various attack at data link layer using Snort or provide already suggested solution done by various researcher.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117261090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning-Based Heart Patient Scanning, Visualization, and Monitoring 基于机器学习的心脏病人扫描、可视化和监测
Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00049
Ahmed Al Ahdal, D. Prashar, Manik Rakhra, Ankita Wadhawan
Heart diseases leading most causes of death globally according to World Health Organization cardiovascular or all heart related disease are responsible for 17.9 million death every year. An early detection and diagnosis of the disease is very important and maybe it's the key of cure. The major challenge is to predict the disease in early stages therefor most of scientists and researches focus on Machine learning techniques which have the capability of detection with accurate result for large and complex data and apply those techniques to help in health care. The purpose of this work is to detect heart diseases at early stage and avoid consequences by implementing different Machine Learning Algorithm for example, KNN Decision Tree (DT), Logistic Regression, SVM, Random Forest (RF), and Naïve Bayes (NB).
据世界卫生组织称,心脏病是全球最主要的死亡原因,心血管疾病或所有心脏相关疾病每年造成1790万人死亡。早期发现和诊断是非常重要的,可能是治愈的关键。主要的挑战是在早期阶段预测疾病,因此大多数科学家和研究都集中在机器学习技术上,这些技术能够对大而复杂的数据进行准确的检测,并将这些技术应用于医疗保健。这项工作的目的是通过实现不同的机器学习算法,例如KNN决策树(DT),逻辑回归,支持向量机,随机森林(RF)和Naïve贝叶斯(NB),在早期发现心脏病并避免后果。
{"title":"Machine Learning-Based Heart Patient Scanning, Visualization, and Monitoring","authors":"Ahmed Al Ahdal, D. Prashar, Manik Rakhra, Ankita Wadhawan","doi":"10.1109/ICCS54944.2021.00049","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00049","url":null,"abstract":"Heart diseases leading most causes of death globally according to World Health Organization cardiovascular or all heart related disease are responsible for 17.9 million death every year. An early detection and diagnosis of the disease is very important and maybe it's the key of cure. The major challenge is to predict the disease in early stages therefor most of scientists and researches focus on Machine learning techniques which have the capability of detection with accurate result for large and complex data and apply those techniques to help in health care. The purpose of this work is to detect heart diseases at early stage and avoid consequences by implementing different Machine Learning Algorithm for example, KNN Decision Tree (DT), Logistic Regression, SVM, Random Forest (RF), and Naïve Bayes (NB).","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129416104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Face Spoof Detection Using Gray Level Co-Occurrence Matrix and Discrete Wavelet Transform Feature Extractor 基于灰度共生矩阵和离散小波变换特征提取的人脸欺骗检测
Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00011
Amal Mathew, Kaushik Daiv, Polkumpally Rohan Goud, Piyush Talreja, Sai Sanjana Reddy Vatte
Face identification using ML (machine learning) is well-known. Attendance structures may benefit from this method. Using this method, you may achieve the desired area, as well as beneficial attributes and a dataset, by preparing two sets of data again for test and training phases. To distinguish between a testing set and a test sets, a photograph is used as a testing set. An ensemble classification method is used to sort the test images into categories like “identified” and “unidentified.” This model can't provide reliable findings since it simply divides data into two categories. The development of GLCM was motivated by the need to use texture properties to identify faces. The existence of the query picture is noted once face detection has taken place. In simulation findings, the new model outperforms the baseline models in terms of accuracy. Keywords—Ensemble classifier, GLCM, Face Spoof, SVM, DWT
使用ML(机器学习)的人脸识别是众所周知的。出勤结构可以从这种方法中受益。使用这种方法,您可以通过再次为测试和训练阶段准备两组数据来获得所需的区域,以及有益的属性和数据集。为了区分测试集和测试集,使用照片作为测试集。使用集成分类方法将测试图像分类为“已识别”和“未识别”等类别。这个模型不能提供可靠的结果,因为它简单地把数据分成两类。GLCM的发展是由于需要使用纹理属性来识别人脸。一旦进行了人脸检测,就会注意到查询图片的存在。在模拟结果中,新模型在准确性方面优于基线模型。关键词:集成分类器,GLCM,人脸欺骗,SVM, DWT
{"title":"Face Spoof Detection Using Gray Level Co-Occurrence Matrix and Discrete Wavelet Transform Feature Extractor","authors":"Amal Mathew, Kaushik Daiv, Polkumpally Rohan Goud, Piyush Talreja, Sai Sanjana Reddy Vatte","doi":"10.1109/ICCS54944.2021.00011","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00011","url":null,"abstract":"Face identification using ML (machine learning) is well-known. Attendance structures may benefit from this method. Using this method, you may achieve the desired area, as well as beneficial attributes and a dataset, by preparing two sets of data again for test and training phases. To distinguish between a testing set and a test sets, a photograph is used as a testing set. An ensemble classification method is used to sort the test images into categories like “identified” and “unidentified.” This model can't provide reliable findings since it simply divides data into two categories. The development of GLCM was motivated by the need to use texture properties to identify faces. The existence of the query picture is noted once face detection has taken place. In simulation findings, the new model outperforms the baseline models in terms of accuracy. Keywords—Ensemble classifier, GLCM, Face Spoof, SVM, DWT","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127287510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining Blockchain Multi Authority and Botnet to Create a Hybrid Adaptive Crypto Cloud Framework 结合区块链多授权和僵尸网络创建混合自适应加密云框架
Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00028
Ravikumar Ch, Isha Batra, A. Malik
Blockchain technology has now spread like wildfire across the internet. Blockchain has emerged as a game-changing technology for complex industrial processes as a result of its openness, availability, and security. In this study, we used a hybrid adaptive crypto cloud framework that combines blockchain technology with multiple authorities and a botnet framework to improve cloud security while reducing computation time. The proposed adaptive crypto cloud system divides the cloud security framework into stages to organize secure data communication and reduce communication latency while detecting internal and external threats. In order to compute authentication using hash mapping and deploy an authentication system to safeguard the various users' authentication information, the whole system placed a major emphasis on block chain technology. The technology not only improves security but also makes the role-based access control system and anonymous authentication system more user-friendly.
区块链技术现在已经像野火一样在互联网上蔓延开来。由于其开放性、可用性和安全性,区块链已经成为复杂工业过程的一项改变游戏规则的技术。在本研究中,我们使用了一种混合自适应加密云框架,该框架将区块链技术与多个权威机构和僵尸网络框架相结合,以提高云安全性,同时减少计算时间。提出的自适应加密云系统将云安全框架划分为多个阶段,在检测内部和外部威胁的同时组织安全的数据通信,降低通信延迟。为了利用哈希映射计算认证,并部署一个认证系统来保护各种用户的认证信息,整个系统非常重视区块链技术。该技术不仅提高了安全性,而且使基于角色的访问控制系统和匿名认证系统更加人性化。
{"title":"Combining Blockchain Multi Authority and Botnet to Create a Hybrid Adaptive Crypto Cloud Framework","authors":"Ravikumar Ch, Isha Batra, A. Malik","doi":"10.1109/ICCS54944.2021.00028","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00028","url":null,"abstract":"Blockchain technology has now spread like wildfire across the internet. Blockchain has emerged as a game-changing technology for complex industrial processes as a result of its openness, availability, and security. In this study, we used a hybrid adaptive crypto cloud framework that combines blockchain technology with multiple authorities and a botnet framework to improve cloud security while reducing computation time. The proposed adaptive crypto cloud system divides the cloud security framework into stages to organize secure data communication and reduce communication latency while detecting internal and external threats. In order to compute authentication using hash mapping and deploy an authentication system to safeguard the various users' authentication information, the whole system placed a major emphasis on block chain technology. The technology not only improves security but also makes the role-based access control system and anonymous authentication system more user-friendly.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131040164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis of Various Models for Assessment of Trust in Digital Age Accelerated by Covid-19 新型冠状病毒肺炎加速的数字时代各种信任评估模型比较分析
Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00039
Aseem Kumar, A. Malik
The Coronavirus pandemic has made Irreversible changes in our society and the business world. Almost all aspects of the business and daily routine have shifted to the digital platforms and various forms of personal, indirect communications and suit the current environment in guarding us against coronavirus. The outbreak also brought a refreshing load of creativity in the people who found new ways to solve everyday problems. The key to solving problems is effective communication. With the help of mobile devices and computers, people were able to change their environment so that their expression of thoughts and their tasks of daily routine got aligned with social media platforms. People express themselves as if they are not going to get another chance to express themselves. They use doodles, poetic tweets, and many other forms of colloquial language. Using mixed language such as Hinglish became a norm for the commoner. In this research work, an attempt has been made to review techniques that can be used to work trust models from which meaning insights can be drawn in times such as covid-19 pandemic. From this study it can be inferred that no single approach of modeling complex scenarios such trust in times of covid-19 can be done. There is an urgent need to take inspiration from multiple techniques and approaches to assess the trust level in the digital society.
冠状病毒大流行给我们的社会和商业世界带来了不可逆转的变化。商业和日常生活的几乎所有方面都转向了数字平台和各种形式的个人间接通信,适合当前的环境,以保护我们免受冠状病毒的侵害。疫情也给人们带来了令人耳目一新的创造力,他们找到了解决日常问题的新方法。解决问题的关键是有效的沟通。在移动设备和电脑的帮助下,人们能够改变他们的环境,使他们的思想表达和日常任务与社交媒体平台保持一致。人们表达自己,好像他们不会再有机会表达自己。他们使用涂鸦、诗意的推文和许多其他形式的口语。使用混合语言,如印度英语,成为普通人的一种规范。在这项研究工作中,我们试图回顾可用于建立信任模型的技术,这些模型可以在covid-19大流行等时期得出意义见解。从这项研究可以推断,没有一种方法可以对covid-19时期的信任等复杂场景进行建模。在数字社会中,迫切需要从多种技术和方法中汲取灵感来评估信任水平。
{"title":"A Comparative Analysis of Various Models for Assessment of Trust in Digital Age Accelerated by Covid-19","authors":"Aseem Kumar, A. Malik","doi":"10.1109/ICCS54944.2021.00039","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00039","url":null,"abstract":"The Coronavirus pandemic has made Irreversible changes in our society and the business world. Almost all aspects of the business and daily routine have shifted to the digital platforms and various forms of personal, indirect communications and suit the current environment in guarding us against coronavirus. The outbreak also brought a refreshing load of creativity in the people who found new ways to solve everyday problems. The key to solving problems is effective communication. With the help of mobile devices and computers, people were able to change their environment so that their expression of thoughts and their tasks of daily routine got aligned with social media platforms. People express themselves as if they are not going to get another chance to express themselves. They use doodles, poetic tweets, and many other forms of colloquial language. Using mixed language such as Hinglish became a norm for the commoner. In this research work, an attempt has been made to review techniques that can be used to work trust models from which meaning insights can be drawn in times such as covid-19 pandemic. From this study it can be inferred that no single approach of modeling complex scenarios such trust in times of covid-19 can be done. There is an urgent need to take inspiration from multiple techniques and approaches to assess the trust level in the digital society.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Computing Sciences (ICCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1