首页 > 最新文献

2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)最新文献

英文 中文
Analyzing Functional Magnetic Resonance Brain Images with OpenCV2 用OpenCV2分析脑功能磁共振图像
Pub Date : 2020-11-06 DOI: 10.1109/PDGC50313.2020.9315810
M. Rashid, Harjeet Singh, Vishal Goyal
Functional Magnetic Resonance Imaging (fMRI) researchers are currently using various techniques for analyzing the cognitive states in brain images. Every time, it remains a challenge for such researchers to decode the brain information about stimuli affecting the related Region of Interest (ROI) from voxels of Brain Networks. In this paper, the authors used OpenCV library of Python to analyze various states of brain images. The images of each volume in the dataset are grouped into principal planes of fMRI views. Then operations of Dilation, Erosion, and Gaussian Blur are applied to all images for smoothening purposes. The authors believe that the procedure followed in this paper will be the optimal method for extracting brain images' features, which will improve the classification accuracy of the decoding of brain images in a much better way.
功能磁共振成像(fMRI)研究人员目前正在使用各种技术来分析大脑图像中的认知状态。每次从脑网络体素中解码影响相关感兴趣区域(ROI)的刺激信息,都是研究人员面临的挑战。在本文中,作者使用Python的OpenCV库来分析大脑图像的各种状态。数据集中每个体的图像被分组为fMRI视图的主平面。然后操作的扩张,侵蚀和高斯模糊应用于所有图像平滑的目的。作者认为本文所采用的方法是提取脑图像特征的最佳方法,可以更好地提高脑图像解码的分类精度。
{"title":"Analyzing Functional Magnetic Resonance Brain Images with OpenCV2","authors":"M. Rashid, Harjeet Singh, Vishal Goyal","doi":"10.1109/PDGC50313.2020.9315810","DOIUrl":"https://doi.org/10.1109/PDGC50313.2020.9315810","url":null,"abstract":"Functional Magnetic Resonance Imaging (fMRI) researchers are currently using various techniques for analyzing the cognitive states in brain images. Every time, it remains a challenge for such researchers to decode the brain information about stimuli affecting the related Region of Interest (ROI) from voxels of Brain Networks. In this paper, the authors used OpenCV library of Python to analyze various states of brain images. The images of each volume in the dataset are grouped into principal planes of fMRI views. Then operations of Dilation, Erosion, and Gaussian Blur are applied to all images for smoothening purposes. The authors believe that the procedure followed in this paper will be the optimal method for extracting brain images' features, which will improve the classification accuracy of the decoding of brain images in a much better way.","PeriodicalId":347216,"journal":{"name":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125030873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Empirical Study of Cybercrime and Its Preventions 网络犯罪及其预防的实证研究
Pub Date : 2020-11-06 DOI: 10.1109/PDGC50313.2020.9315785
S. Batra, Madhu Gupta, Jessica Singh, Devshri Srivastava, Isha Aggarwal
In this modern era of technology, the world is heavily dependent on technology no matter where one goes. Due to our heavy dependency on technology criminals have taken this advantage for their benefit. Cybercrime is quickly becoming one of the fastest rising forms of modern crimes. Cybercrime are well known for the downfall of so many companies, organizations and personal identities. The main intent of this paper is to define cybercrime, various types of cybercriminals and cybercrime affecting the world and its prevention. This paper will also analyse statistical data on various types of cybercrime and its growth in last few years.
在这个现代科技时代,世界无论走到哪里都严重依赖科技。由于我们对技术的严重依赖,犯罪分子利用了这一优势为自己谋利。网络犯罪正迅速成为增长最快的现代犯罪形式之一。众所周知,网络犯罪导致了许多公司、组织和个人身份的崩溃。本文的主要目的是定义网络犯罪,各种类型的网络犯罪和影响世界的网络犯罪及其预防。本文还将分析各类网络犯罪的统计数据及其在过去几年的增长。
{"title":"An Empirical Study of Cybercrime and Its Preventions","authors":"S. Batra, Madhu Gupta, Jessica Singh, Devshri Srivastava, Isha Aggarwal","doi":"10.1109/PDGC50313.2020.9315785","DOIUrl":"https://doi.org/10.1109/PDGC50313.2020.9315785","url":null,"abstract":"In this modern era of technology, the world is heavily dependent on technology no matter where one goes. Due to our heavy dependency on technology criminals have taken this advantage for their benefit. Cybercrime is quickly becoming one of the fastest rising forms of modern crimes. Cybercrime are well known for the downfall of so many companies, organizations and personal identities. The main intent of this paper is to define cybercrime, various types of cybercriminals and cybercrime affecting the world and its prevention. This paper will also analyse statistical data on various types of cybercrime and its growth in last few years.","PeriodicalId":347216,"journal":{"name":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130552659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Indian Health Care System is Ready to Fight Against COVID-19 A Machine Learning Tool for Forecast the Number of Beds 印度卫生保健系统已准备好对抗COVID-19一种预测床位数量的机器学习工具
Pub Date : 2020-11-06 DOI: 10.1109/PDGC50313.2020.9315825
Shakti Nagpal, V. Athavale, A. Saini, Ravindra Sharma
Global research team has announced that the health a management system at world level is in fear from CoV-19. Various statistical analysis has been done to check the preparedness to fight against CoV-19. Recent government responses of the different countries are also taken into the consideration while working for CoV-19 handling. Demographic trends are also added to add further content to potential impact of CoV-19 on healthcare services and system. This pandemic has raised a significant challenge to the economy of the different countries. Availability of beds are calculated on Per thousand people in different countries. Few of the countries analysis like Australia is having 2.6 beds per thousand people, while United Kingdom America is having 2.5 beds preparation over 1000 people. Per capita health spending in UK is marginally below the median. Hospital have been urged by government of different countries to postpone their surgeries and other treatments to provide the proper hospitality to cov-19 patients. India is at 145th place among 195 countries in healthcare access and Quality Index (HAQ)[1]. In this paper we have proposed a machine Learning model to predict the number of beds required as Cov-19 cases are increasing. Our Model Predicts the requirement for beds with 95% accuracy and acceptable p-value.
全球研究小组宣布,世界范围内的卫生管理系统对新冠病毒感到恐惧。开展各项统计分析,检验抗疫准备情况。在处理covid -19的工作中,还考虑了各国政府最近的反应。还增加了人口趋势,以进一步增加新冠肺炎对医疗服务和系统的潜在影响的内容。这一流行病对不同国家的经济提出了重大挑战。不同国家的床位可用性是按每千人计算的。像澳大利亚这样的国家,每千人有2.6张床位,而英国和美国每1000人有2.5张床位。英国的人均医疗支出略低于中位数。各国政府敦促医院推迟手术和其他治疗,以适当款待新冠肺炎患者。在医疗保健可及性和质量指数(HAQ)方面,印度在195个国家中排名第145位。在本文中,我们提出了一个机器学习模型来预测随着covid -19病例的增加所需的床位数量。我们的模型以95%的准确率和可接受的p值预测床位需求。
{"title":"Indian Health Care System is Ready to Fight Against COVID-19 A Machine Learning Tool for Forecast the Number of Beds","authors":"Shakti Nagpal, V. Athavale, A. Saini, Ravindra Sharma","doi":"10.1109/PDGC50313.2020.9315825","DOIUrl":"https://doi.org/10.1109/PDGC50313.2020.9315825","url":null,"abstract":"Global research team has announced that the health a management system at world level is in fear from CoV-19. Various statistical analysis has been done to check the preparedness to fight against CoV-19. Recent government responses of the different countries are also taken into the consideration while working for CoV-19 handling. Demographic trends are also added to add further content to potential impact of CoV-19 on healthcare services and system. This pandemic has raised a significant challenge to the economy of the different countries. Availability of beds are calculated on Per thousand people in different countries. Few of the countries analysis like Australia is having 2.6 beds per thousand people, while United Kingdom America is having 2.5 beds preparation over 1000 people. Per capita health spending in UK is marginally below the median. Hospital have been urged by government of different countries to postpone their surgeries and other treatments to provide the proper hospitality to cov-19 patients. India is at 145th place among 195 countries in healthcare access and Quality Index (HAQ)[1]. In this paper we have proposed a machine Learning model to predict the number of beds required as Cov-19 cases are increasing. Our Model Predicts the requirement for beds with 95% accuracy and acceptable p-value.","PeriodicalId":347216,"journal":{"name":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132860063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Group Key Management in Cloud for Shared Media Sanitization 面向共享媒体处理的云中的组密钥管理
Pub Date : 2020-11-06 DOI: 10.1109/PDGC50313.2020.9315325
M. Shukla, Ashwani Kumar Dubey, Divya Upadhyay, Boris Novikov
Cloud provides a low maintenance and affordable storage to various applications and users. The data owner allows the cloud users to access the documents placed in the cloud service provider based on the user's access control vector provided to the cloud users by the data owners. In such type of scenarios, the confidentiality of the documents exchanged between the cloud service provider and the users should be maintained. The existing approaches used to provide this facility are not computation and communication efficient for performing key updating in the data owner side and the key recovery in the user side. This paper discusses the key management services provided to the cloud users. Remote key management and client-side key management are two approaches used by cloud servers. This paper also aims to discuss the method for destroying the encryption/decryption group keys for shared data to securing the data after deletion. Crypto Shredding or Crypto Throw technique is deployed for the same.
云为各种应用程序和用户提供低维护和负担得起的存储。数据所有者允许云用户根据数据所有者向云用户提供的用户访问控制向量访问放置在云服务提供商中的文档。在此类场景中,应保持云服务提供商与用户之间交换的文档的机密性。用于提供此功能的现有方法对于在数据所有者端执行密钥更新和在用户端执行密钥恢复的计算和通信效率不高。本文讨论了向云用户提供的密钥管理服务。远程密钥管理和客户端密钥管理是云服务器使用的两种方法。本文还讨论了共享数据加解密组密钥的销毁方法,以保证数据删除后的安全。Crypto Shredding或Crypto Throw技术也同样适用。
{"title":"Group Key Management in Cloud for Shared Media Sanitization","authors":"M. Shukla, Ashwani Kumar Dubey, Divya Upadhyay, Boris Novikov","doi":"10.1109/PDGC50313.2020.9315325","DOIUrl":"https://doi.org/10.1109/PDGC50313.2020.9315325","url":null,"abstract":"Cloud provides a low maintenance and affordable storage to various applications and users. The data owner allows the cloud users to access the documents placed in the cloud service provider based on the user's access control vector provided to the cloud users by the data owners. In such type of scenarios, the confidentiality of the documents exchanged between the cloud service provider and the users should be maintained. The existing approaches used to provide this facility are not computation and communication efficient for performing key updating in the data owner side and the key recovery in the user side. This paper discusses the key management services provided to the cloud users. Remote key management and client-side key management are two approaches used by cloud servers. This paper also aims to discuss the method for destroying the encryption/decryption group keys for shared data to securing the data after deletion. Crypto Shredding or Crypto Throw technique is deployed for the same.","PeriodicalId":347216,"journal":{"name":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132259234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Detection Techniques: A Survey 恶意软件检测技术综述
Pub Date : 2020-11-06 DOI: 10.1109/PDGC50313.2020.9315764
Y. Supriya, G. Kumar, Dammu Sowjanya, D. Yadav, Devarakonda Lakshmi Kameshwari
Malware is derived from malicious software which mitigate to attacks on the computer systems and collecting private data. The survey is available in huge evidences to suggest its impact in global losses. Malware detectors are basic tools to protect from the same malware attacks. Therefore, it is important to require study on malware detection techniques, to avoid and identify the type of malware attacked on systems. In this manuscript, a survey report is available to defend against malware attacks and analysis techniques. There are many malware detection techniques, such as signature and anomaly detection techniques with an idea of comparison and decision making about its strengths. This provides as a user reference to the end user for likely detailed information.
恶意软件源自恶意软件,旨在攻击计算机系统并收集私人数据。这项调查有大量证据表明它对全球损失的影响。恶意软件检测器是防止恶意软件攻击的基本工具。因此,需要研究恶意软件检测技术,以避免和识别攻击系统的恶意软件类型。在这份手稿中,一份调查报告可用于防御恶意软件攻击和分析技术。有许多恶意软件检测技术,例如带有比较和决策思想的签名和异常检测技术。这为最终用户提供了可能的详细信息的用户参考。
{"title":"Malware Detection Techniques: A Survey","authors":"Y. Supriya, G. Kumar, Dammu Sowjanya, D. Yadav, Devarakonda Lakshmi Kameshwari","doi":"10.1109/PDGC50313.2020.9315764","DOIUrl":"https://doi.org/10.1109/PDGC50313.2020.9315764","url":null,"abstract":"Malware is derived from malicious software which mitigate to attacks on the computer systems and collecting private data. The survey is available in huge evidences to suggest its impact in global losses. Malware detectors are basic tools to protect from the same malware attacks. Therefore, it is important to require study on malware detection techniques, to avoid and identify the type of malware attacked on systems. In this manuscript, a survey report is available to defend against malware attacks and analysis techniques. There are many malware detection techniques, such as signature and anomaly detection techniques with an idea of comparison and decision making about its strengths. This provides as a user reference to the end user for likely detailed information.","PeriodicalId":347216,"journal":{"name":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133577503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Twitter Sentiment Analysis During Unlock Period of COVID-19 COVID-19解锁期间的推特情绪分析
Pub Date : 2020-11-06 DOI: 10.1109/PDGC50313.2020.9315773
Swati Sharma, Aryaman Sharma
The pandemic has hit the individuals at both personal, social and professional front triggering emotional crisis leading to stress, anxiety and other related problems. However, some countries are now easing down on restrictions by going from lock down to unlocking in a phased manner. As life springs back to action the sentiments and emotions of people are bound to change. It therefore becomes imperative to understand the emotions and sentiments of people after seven months of outbreak when the people are more informed about the nature of disease, steps for prevention and also have hope for a vaccine coming up in near future. The study analyses the sentiments of the people from the USA and India by text mining using R Studio. The study has various implications for academicians as it adds to the existing knowledge pool. The findings provide guidance to the policy makers to tailor their support policies in response to the emotional state of their people and also assists the marketers to tailor the communication strategies in the light of the emotional state of the target market.
疫情对个人、社会和职业都造成了冲击,引发了情绪危机,导致压力、焦虑和其他相关问题。然而,一些国家正在逐步放宽限制,从封锁到分阶段开放。随着生活重新开始行动,人们的情绪和情感必然会发生变化。因此,在疫情爆发7个月后,人们对疾病的性质、预防措施有了更多的了解,并对不久的将来出现疫苗抱有希望,了解人们的情绪和情绪变得至关重要。该研究通过使用R Studio进行文本挖掘,分析了来自美国和印度的人们的情绪。这项研究对学者们有各种各样的影响,因为它增加了现有的知识库。研究结果可以指导政策制定者根据目标市场的情绪状态制定相应的支持政策,也可以帮助营销人员根据目标市场的情绪状态制定相应的传播策略。
{"title":"Twitter Sentiment Analysis During Unlock Period of COVID-19","authors":"Swati Sharma, Aryaman Sharma","doi":"10.1109/PDGC50313.2020.9315773","DOIUrl":"https://doi.org/10.1109/PDGC50313.2020.9315773","url":null,"abstract":"The pandemic has hit the individuals at both personal, social and professional front triggering emotional crisis leading to stress, anxiety and other related problems. However, some countries are now easing down on restrictions by going from lock down to unlocking in a phased manner. As life springs back to action the sentiments and emotions of people are bound to change. It therefore becomes imperative to understand the emotions and sentiments of people after seven months of outbreak when the people are more informed about the nature of disease, steps for prevention and also have hope for a vaccine coming up in near future. The study analyses the sentiments of the people from the USA and India by text mining using R Studio. The study has various implications for academicians as it adds to the existing knowledge pool. The findings provide guidance to the policy makers to tailor their support policies in response to the emotional state of their people and also assists the marketers to tailor the communication strategies in the light of the emotional state of the target market.","PeriodicalId":347216,"journal":{"name":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Semantic Information Retrieval using String Ontology in Music Domain using Protege5.0 基于Protege5.0的音乐领域字符串本体语义信息检索
Pub Date : 2020-11-06 DOI: 10.1109/PDGC50313.2020.9315835
N. Kaur, H. Aggarwal
Retrieval of the semantic data becomes a time consuming and a highly tedious task. Ontology plays a maj or role in the retrieval of semantic data. In this paper the researcher has presented the methodology of music domain ontology construction using protegé 5.0 which is the best and the most commonly used Editor, intended to enhance information retrieval. The researcher has developed the string_ ontology in music domain using protege 5.0 and the working of ontology has been tested using the Descriptive Logic ontology query language. The novelty of this paper is that the researcher has constructed this string ontology in music domain from scratch and no such ontology has been constructed earlier.
语义数据的检索成为一项耗时且非常繁琐的任务。本体在语义数据检索中起着重要的作用。本文提出了一种利用目前最好、最常用的编辑器proteg 5.0构建音乐领域本体的方法,旨在增强信息检索能力。利用protege 5.0开发了音乐领域的字符串本体,并使用描述性逻辑本体查询语言对本体的工作进行了测试。本文的新颖之处在于研究人员从零开始构建了音乐领域的弦本体,而之前没有构建过这样的本体。
{"title":"Semantic Information Retrieval using String Ontology in Music Domain using Protege5.0","authors":"N. Kaur, H. Aggarwal","doi":"10.1109/PDGC50313.2020.9315835","DOIUrl":"https://doi.org/10.1109/PDGC50313.2020.9315835","url":null,"abstract":"Retrieval of the semantic data becomes a time consuming and a highly tedious task. Ontology plays a maj or role in the retrieval of semantic data. In this paper the researcher has presented the methodology of music domain ontology construction using protegé 5.0 which is the best and the most commonly used Editor, intended to enhance information retrieval. The researcher has developed the string_ ontology in music domain using protege 5.0 and the working of ontology has been tested using the Descriptive Logic ontology query language. The novelty of this paper is that the researcher has constructed this string ontology in music domain from scratch and no such ontology has been constructed earlier.","PeriodicalId":347216,"journal":{"name":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"8 Suppl A 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116821070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-Factor Access Control and Ownership Transfer Framework for Future Generation Healthcare Systems 下一代医疗保健系统的多因素访问控制和所有权转移框架
Pub Date : 2020-11-06 DOI: 10.1109/PDGC50313.2020.9315840
V. Aski, V. Dhaka, Sunil Kumar, Anubha Parashar, Akshata Ladagi
The recent advancements in ubiquitous sensing powered by Wireless Computing Technologies (WCT) and Cloud Computing Services (CCS) have introduced a new thinking ability amongst researchers and healthcare professionals for building secure and connected healthcare systems. The integration of Internet of Things (IoT) in healthcare services further brings in several challenges with it, mainly including encrypted communication through vulnerable wireless medium, authentication and access control algorithms and ownership transfer schemes (important patient information). Major concern of such giant connected systems lies in creating the data handling strategies which is collected from the billions of heterogeneous devices distributed across the hospital network. Besides, the resource constrained nature of IoT would make these goals difficult to achieve. Motivated by aforementioned deliberations, this paper introduces a novel approach in designing a security framework for edge-computing based connected healthcare systems. An efficient, multi-factor access control and ownership transfer mechanism for edge-computing based futuristic healthcare applications is the core of proposed framework. Data scalability is achieved by employing distributed approach for clustering techniques that analyze and aggregate voluminous data acquired from heterogeneous devices individually before it transits the to the cloud. Moreover, data/device ownership transfer scheme is considered to be the first time in its kind. During ownership transfer phase, medical server facilitates user to transfer the patient information/ device ownership rights to the other registered users. In order to avoid the existing mistakes, we propose a formal and informal security analysis, that ensures the resistance towards most common IoT attacks such as insider attack, denial of distributed service (DDoS) attack and traceability attacks.
无线计算技术(WCT)和云计算服务(CCS)驱动的无处不在传感技术的最新进展,为研究人员和医疗保健专业人员提供了一种新的思维能力,用于构建安全和互联的医疗保健系统。物联网(IoT)在医疗保健服务中的集成进一步带来了一些挑战,主要包括通过易受攻击的无线介质进行加密通信、身份验证和访问控制算法以及所有权转移方案(重要的患者信息)。这种巨型连接系统的主要关注点在于创建数据处理策略,这些数据处理策略是从分布在整个医院网络中的数十亿异构设备中收集的。此外,物联网的资源约束性质将使这些目标难以实现。受上述讨论的启发,本文介绍了一种设计基于边缘计算的连接医疗保健系统安全框架的新方法。该框架的核心是基于边缘计算的未来医疗保健应用的高效、多因素访问控制和所有权转移机制。数据可伸缩性是通过采用分布式方法实现的,这种方法用于集群技术,在数据传输到云之前,对从异构设备单独获取的大量数据进行分析和聚合。此外,数据/设备所有权转移方案被认为是同类方案中的第一次。在所有权转移阶段,医疗服务器方便用户将患者信息/设备所有权转移给其他注册用户。为了避免现有的错误,我们提出了正式和非正式的安全分析,以确保抵抗最常见的物联网攻击,如内部攻击,拒绝分布式服务(DDoS)攻击和可追溯性攻击。
{"title":"A Multi-Factor Access Control and Ownership Transfer Framework for Future Generation Healthcare Systems","authors":"V. Aski, V. Dhaka, Sunil Kumar, Anubha Parashar, Akshata Ladagi","doi":"10.1109/PDGC50313.2020.9315840","DOIUrl":"https://doi.org/10.1109/PDGC50313.2020.9315840","url":null,"abstract":"The recent advancements in ubiquitous sensing powered by Wireless Computing Technologies (WCT) and Cloud Computing Services (CCS) have introduced a new thinking ability amongst researchers and healthcare professionals for building secure and connected healthcare systems. The integration of Internet of Things (IoT) in healthcare services further brings in several challenges with it, mainly including encrypted communication through vulnerable wireless medium, authentication and access control algorithms and ownership transfer schemes (important patient information). Major concern of such giant connected systems lies in creating the data handling strategies which is collected from the billions of heterogeneous devices distributed across the hospital network. Besides, the resource constrained nature of IoT would make these goals difficult to achieve. Motivated by aforementioned deliberations, this paper introduces a novel approach in designing a security framework for edge-computing based connected healthcare systems. An efficient, multi-factor access control and ownership transfer mechanism for edge-computing based futuristic healthcare applications is the core of proposed framework. Data scalability is achieved by employing distributed approach for clustering techniques that analyze and aggregate voluminous data acquired from heterogeneous devices individually before it transits the to the cloud. Moreover, data/device ownership transfer scheme is considered to be the first time in its kind. During ownership transfer phase, medical server facilitates user to transfer the patient information/ device ownership rights to the other registered users. In order to avoid the existing mistakes, we propose a formal and informal security analysis, that ensures the resistance towards most common IoT attacks such as insider attack, denial of distributed service (DDoS) attack and traceability attacks.","PeriodicalId":347216,"journal":{"name":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134470449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Non-intrusive Approach for Driver's Drowsiness Detection 一种非侵入式驾驶员睡意检测方法
Pub Date : 2020-11-06 DOI: 10.1109/PDGC50313.2020.9315326
Kriti Verma, Mehak Beakta, P. Srivastava, N. U. Khan
Fatigueness of the driver is considered a major cause that account to a large numbers of death worldwide. Thus it becomes necessary to develop a system that can help reduce such accidents. During drowsy state, significant differences in the facial features of the driver are observed in comparison to the normal state. The system proposed in the paper is focused on detection as well as alarming the driver after recording the physiological state of the driver. We made use of the non-intrusive approach which monitors the subject in real-time, wherein the blinking of eyes as well as the mouth shape (yawn) of the operator are observed, and if the operator's eyes are shut for more than the threshold value, or the operator is yawning, or if both of them are detected at the same instance then the driver's state is concluded for precautions. The proposed system is designed using Python Language, and OpenCV application is used for image processing employing the use of Viola - Jones Algorithm for the detection of facial features.
司机疲劳被认为是造成世界范围内大量死亡的主要原因。因此,有必要开发一种有助于减少此类事故的系统。在困倦状态下,驾驶员的面部特征与正常状态相比有显著差异。本文提出的系统主要是在记录驾驶员的生理状态后对驾驶员进行检测和报警。我们使用非侵入式方法实时监控受试者,其中观察操作员的眼睛眨眼和嘴型(打哈欠),如果操作员的眼睛关闭超过阈值,或者操作员打哈欠,或者如果两者在同一实例中被检测到,则得出驾驶员的状态以进行预防。本系统采用Python语言设计,采用OpenCV应用程序进行图像处理,采用Viola - Jones算法进行人脸特征检测。
{"title":"A Non-intrusive Approach for Driver's Drowsiness Detection","authors":"Kriti Verma, Mehak Beakta, P. Srivastava, N. U. Khan","doi":"10.1109/PDGC50313.2020.9315326","DOIUrl":"https://doi.org/10.1109/PDGC50313.2020.9315326","url":null,"abstract":"Fatigueness of the driver is considered a major cause that account to a large numbers of death worldwide. Thus it becomes necessary to develop a system that can help reduce such accidents. During drowsy state, significant differences in the facial features of the driver are observed in comparison to the normal state. The system proposed in the paper is focused on detection as well as alarming the driver after recording the physiological state of the driver. We made use of the non-intrusive approach which monitors the subject in real-time, wherein the blinking of eyes as well as the mouth shape (yawn) of the operator are observed, and if the operator's eyes are shut for more than the threshold value, or the operator is yawning, or if both of them are detected at the same instance then the driver's state is concluded for precautions. The proposed system is designed using Python Language, and OpenCV application is used for image processing employing the use of Viola - Jones Algorithm for the detection of facial features.","PeriodicalId":347216,"journal":{"name":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122063336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android Malware Detection using Chi-Square Feature Selection and Ensemble Learning Method 基于卡方特征选择和集成学习方法的Android恶意软件检测
Pub Date : 2020-11-06 DOI: 10.1109/PDGC50313.2020.9315818
Meghna Dhalaria, Ekta Gandotra
The wide use of mobile phones has become a significant driving force behind a severe increase in malware attacks. These malware applications are hidden in the normal applications which make their classification and detection challenging. The existing techniques are based on signature based approach and are unable to detect unknown malware. In this paper, we propose a technique based on static and dynamic features for the detection of Android malware. We applied a chi-square feature selection algorithm to choose the appropriate features that contribute for detecting malware. After that, we stacked the different base classifiers to improve the detection rate. Furthermore, we compared the proposed method with existing well known machine learning classifiers. The experimental results demonstrate that the proposed technique (K-NN_ RF) achieves better detection accuracy i.e. 98.02%.
手机的广泛使用已经成为恶意软件攻击严重增加背后的重要推动力。这些恶意软件应用程序隐藏在正常应用程序中,这使得它们的分类和检测具有挑战性。现有的技术是基于签名的方法,无法检测到未知的恶意软件。本文提出了一种基于静态特征和动态特征的Android恶意软件检测技术。我们应用卡方特征选择算法来选择有助于检测恶意软件的适当特征。之后,我们将不同的基分类器进行叠加,以提高检测率。此外,我们将提出的方法与现有的知名机器学习分类器进行了比较。实验结果表明,K-NN_ RF技术的检测准确率达到了98.02%。
{"title":"Android Malware Detection using Chi-Square Feature Selection and Ensemble Learning Method","authors":"Meghna Dhalaria, Ekta Gandotra","doi":"10.1109/PDGC50313.2020.9315818","DOIUrl":"https://doi.org/10.1109/PDGC50313.2020.9315818","url":null,"abstract":"The wide use of mobile phones has become a significant driving force behind a severe increase in malware attacks. These malware applications are hidden in the normal applications which make their classification and detection challenging. The existing techniques are based on signature based approach and are unable to detect unknown malware. In this paper, we propose a technique based on static and dynamic features for the detection of Android malware. We applied a chi-square feature selection algorithm to choose the appropriate features that contribute for detecting malware. After that, we stacked the different base classifiers to improve the detection rate. Furthermore, we compared the proposed method with existing well known machine learning classifiers. The experimental results demonstrate that the proposed technique (K-NN_ RF) achieves better detection accuracy i.e. 98.02%.","PeriodicalId":347216,"journal":{"name":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125816046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1