首页 > 最新文献

2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)最新文献

英文 中文
Crack Detector Automation for Roads by Deep Learning 基于深度学习的道路裂纹检测自动化
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00130
R. Bharathi, N. Ashwini, R. Bhagya, G. Bhagya, Rameez Pathan, Sambedh Kandel
A thorough analysis is required for assessment of structural health of road infrastructures. A Computer Vision Technology based analysis of images will help us for better management of roads/ pavements in long run. A Convolutional Neural Networks (CNN) based Deep Learning algorithm can be constructed, which can take in an input image used for pavement classification. In this paper, a python based algorithm is proposed and it is simulated for experimental results using automated system software which detects the cracks on the road. The approach used in this paper is mainly based on full surface reconstruction in 3D pavement. The automated method achieves same accuracy with a reduced cost when compared to manual computation.
对道路基础设施结构健康状况的评价需要进行全面的分析。从长远来看,基于图像分析的计算机视觉技术将有助于我们更好地管理道路/人行道。可以构建基于卷积神经网络(CNN)的深度学习算法,该算法可以接收用于路面分类的输入图像。本文提出了一种基于python的算法,并利用道路裂缝检测自动化系统软件对实验结果进行了仿真。本文采用的方法主要是基于三维路面的全面重构。与人工计算相比,自动化方法以更低的成本实现了相同的精度。
{"title":"Crack Detector Automation for Roads by Deep Learning","authors":"R. Bharathi, N. Ashwini, R. Bhagya, G. Bhagya, Rameez Pathan, Sambedh Kandel","doi":"10.1109/INDIACom51348.2021.00130","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00130","url":null,"abstract":"A thorough analysis is required for assessment of structural health of road infrastructures. A Computer Vision Technology based analysis of images will help us for better management of roads/ pavements in long run. A Convolutional Neural Networks (CNN) based Deep Learning algorithm can be constructed, which can take in an input image used for pavement classification. In this paper, a python based algorithm is proposed and it is simulated for experimental results using automated system software which detects the cracks on the road. The approach used in this paper is mainly based on full surface reconstruction in 3D pavement. The automated method achieves same accuracy with a reduced cost when compared to manual computation.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128749016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Gesture based Remote Control for Home Appliances 基于手势的家用电器远程控制
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00009
N. Sharma, M. Mangla, S. Mohanty, Suneeta Satpathy
The manuscript aims to present a project enabling one to control electronic devices though hand gestures and convert one's hand into a wand. All the remote-controlled devices like your television sets, home theatre systems, air conditioners, cars, fans, lights, and other everyday electrical appliances can be controlled just with a flick of the hand. For this, the project uses a smart combination of Inertial Measurement Units (IMUs) and Machine Learning (ML) to identify the control target and command action by intuitive gestures. The control commands are forwarded through home wi-Fi. The product is completely customizable and hence one can easily configure that how one's hand gesture will control a device. Also, one can train it to understand custom hand gestures. The project enables user to have a consistent interaction experience everywhere. This project can be considered as a boon to elderly population who often have a tough time handling several remotes with several buttons on each remote. Hence, the project leads to a seamless experience for them while adapting to the technological advancements unknowingly.
该手稿旨在展示一个可以通过手势控制电子设备并将手变成魔杖的项目。所有的遥控设备,如电视机、家庭影院系统、空调、汽车、风扇、灯和其他日常电器,都可以用手轻轻一弹来控制。为此,该项目使用惯性测量单元(imu)和机器学习(ML)的智能组合,通过直观的手势识别控制目标和命令动作。控制命令通过家庭wi-Fi转发。该产品是完全可定制的,因此人们可以很容易地配置一个人的手势将如何控制设备。此外,人们还可以训练它理解定制的手势。该项目使用户在任何地方都有一致的交互体验。这个项目可以被认为是老年人的福音,他们经常很难操作几个遥控器,每个遥控器上有几个按钮。因此,该项目为他们带来了无缝的体验,同时在不知不觉中适应了技术的进步。
{"title":"A Gesture based Remote Control for Home Appliances","authors":"N. Sharma, M. Mangla, S. Mohanty, Suneeta Satpathy","doi":"10.1109/INDIACom51348.2021.00009","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00009","url":null,"abstract":"The manuscript aims to present a project enabling one to control electronic devices though hand gestures and convert one's hand into a wand. All the remote-controlled devices like your television sets, home theatre systems, air conditioners, cars, fans, lights, and other everyday electrical appliances can be controlled just with a flick of the hand. For this, the project uses a smart combination of Inertial Measurement Units (IMUs) and Machine Learning (ML) to identify the control target and command action by intuitive gestures. The control commands are forwarded through home wi-Fi. The product is completely customizable and hence one can easily configure that how one's hand gesture will control a device. Also, one can train it to understand custom hand gestures. The project enables user to have a consistent interaction experience everywhere. This project can be considered as a boon to elderly population who often have a tough time handling several remotes with several buttons on each remote. Hence, the project leads to a seamless experience for them while adapting to the technological advancements unknowingly.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120850091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Forensic Analysis of Gurmukhi Letters based on Zone Division for Verification 基于区域划分验证的古慕克字母法医学分析
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00082
Urvashi Mishra
Gurmukhi Language is a dominating language in northern states. Many documents written in this dialect become the subject matter of judicial scrutiny, where again much is left to conjectural analysis. It is a humble effort to devise scientific technology and tools for application to verify Gurmukhi handwriting - one disputed to be verified along with the genuine and admitted one. The rules and technology applied in English language is far less useful for the reason of its 35 original letters-consonants covered in three zones but more of them in upper and middle one; and frequent use of 11 diacritics - 9 of them being applied in the upper two zones of the writing. Accordingly, the paper makes a forensic analysis of two zones of writing because of their dominant use. Again, the relativity and aspect ratio methods of handwriting verification are worth bringing satisfactory results in determining genuineness of a handwritten document in Gurmukhi script subject to the judicial scrutiny. The researcher illustrates the application of relativity and aspect ratio along study of two zones of Gurmukhi language resulting in identifying the similarity or marked difference of the two writings.
古尔穆克语是北部各邦的主要语言。许多用这种方言写的文件成为司法审查的主题,其中也有很多留给推测分析。设计科学技术和工具来验证古穆克人的笔迹是一项微不足道的努力,古穆克人的笔迹与真迹和被承认的笔迹一起被验证是有争议的。由于英语有35个原始字母——辅音分布在三个区域,但更多的辅音分布在上部和中部区域;频繁使用11个变音符号,其中9个在书写的上两个区域。因此,本文对两种占主导地位的书写区域进行了法医学分析。再一次,手写体鉴定的相对性和纵横比方法在司法审查下的古穆克文字手写体真伪鉴定中值得取得满意的结果。研究人员在廓尔穆克语两个语区的研究中运用了相对性和纵横比,从而识别出两种文字的相似或显著差异。
{"title":"Forensic Analysis of Gurmukhi Letters based on Zone Division for Verification","authors":"Urvashi Mishra","doi":"10.1109/INDIACom51348.2021.00082","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00082","url":null,"abstract":"Gurmukhi Language is a dominating language in northern states. Many documents written in this dialect become the subject matter of judicial scrutiny, where again much is left to conjectural analysis. It is a humble effort to devise scientific technology and tools for application to verify Gurmukhi handwriting - one disputed to be verified along with the genuine and admitted one. The rules and technology applied in English language is far less useful for the reason of its 35 original letters-consonants covered in three zones but more of them in upper and middle one; and frequent use of 11 diacritics - 9 of them being applied in the upper two zones of the writing. Accordingly, the paper makes a forensic analysis of two zones of writing because of their dominant use. Again, the relativity and aspect ratio methods of handwriting verification are worth bringing satisfactory results in determining genuineness of a handwritten document in Gurmukhi script subject to the judicial scrutiny. The researcher illustrates the application of relativity and aspect ratio along study of two zones of Gurmukhi language resulting in identifying the similarity or marked difference of the two writings.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121368525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact Analysis of wind Energy on Electricity Price using Deep Neural Network 利用深度神经网络分析风电对电价的影响
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00026
Neeraj Kumar, M. M. Tripathi
The Development scenario for renewable energy across the globe is changing rapidly in terms of capacity addition and grid interconnection. The impact of wind energy on electricity price is significant and it is an important task for power system planners to forecast the price in light of its variability. The impact of wind energy penetration on electricity price using Support Vector Regression (SVR) and Deep Neural Network (DNN) has been investigated for the Austria Electricity market. From the evaluation metrics calculation, it is observed that the DNN model performs better over SVR for the available dataset. The MAPE Value for DNN model was found 5.384 for the available dataset.
在容量增加和电网互联方面,全球可再生能源的发展前景正在迅速变化。风电对电价的影响是巨大的,如何根据风电价格的变异性对其进行预测是电力系统规划者的一项重要任务。利用支持向量回归(SVR)和深度神经网络(DNN)对奥地利电力市场进行了风电渗透率对电价的影响研究。从评估指标的计算中可以看出,对于可用的数据集,DNN模型的性能优于SVR。DNN模型的MAPE值为5.384。
{"title":"Impact Analysis of wind Energy on Electricity Price using Deep Neural Network","authors":"Neeraj Kumar, M. M. Tripathi","doi":"10.1109/INDIACom51348.2021.00026","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00026","url":null,"abstract":"The Development scenario for renewable energy across the globe is changing rapidly in terms of capacity addition and grid interconnection. The impact of wind energy on electricity price is significant and it is an important task for power system planners to forecast the price in light of its variability. The impact of wind energy penetration on electricity price using Support Vector Regression (SVR) and Deep Neural Network (DNN) has been investigated for the Austria Electricity market. From the evaluation metrics calculation, it is observed that the DNN model performs better over SVR for the available dataset. The MAPE Value for DNN model was found 5.384 for the available dataset.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"33 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116303934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Security Algorithms used in Cloud Computing 云计算安全算法的比较分析
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00157
Mohd Tajammul, R. Parveen, I. Tayubi
Cloud computing is a technique that enables the users to access applications to infrastructure through subscription methods on remote location. Cloud computing, being collective technique, possesses features of various technologies like Virtual Private Network (VPN), distributed technology, parallel computing, grid computing as well as ubiquitous computing. Cloud storage is the infrastructure offered by the cloud computing in order to facilitate users to upload and access their data on cloud space. Due to multitenancy of cloud storage, the data uploaded on it is the more prone to security breaches. To secure the data on cloud, cryptographic technique is used which works like safeguard against data leakage. This research work focuses on cryptographic algorithms from most basic to advance and also presents their comparative analysis. Moreover, the paper focuses on the nature of the algorithms in context of cloud that is homogeneous and heterogeneous nature. In the cloud computing, homogeneous nature algorithm is used only if the encryptors and decryptors both are same while heterogeneous refers to the situation in which encryptors and decryptors are different entities.
云计算是一种使用户能够通过远程位置上的订阅方法将应用程序访问到基础设施的技术。云计算是一种集合技术,具有虚拟专用网(VPN)、分布式技术、并行计算、网格计算、泛在计算等多种技术的特点。云存储是云计算提供的基础设施,目的是方便用户在云空间上上传和访问其数据。由于云存储是多租户的,上传的数据更容易出现安全漏洞。为了保护云上的数据,使用了加密技术,可以防止数据泄露。本文从最基本的算法到最先进的算法进行了研究,并对它们进行了比较分析。此外,本文还重点讨论了云环境下算法的同质性和异构性。在云计算中,只有当加密者和解密者都是相同的情况下才使用同质性算法,而异构是指加密者和解密者是不同的实体。
{"title":"Comparative Analysis of Security Algorithms used in Cloud Computing","authors":"Mohd Tajammul, R. Parveen, I. Tayubi","doi":"10.1109/INDIACom51348.2021.00157","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00157","url":null,"abstract":"Cloud computing is a technique that enables the users to access applications to infrastructure through subscription methods on remote location. Cloud computing, being collective technique, possesses features of various technologies like Virtual Private Network (VPN), distributed technology, parallel computing, grid computing as well as ubiquitous computing. Cloud storage is the infrastructure offered by the cloud computing in order to facilitate users to upload and access their data on cloud space. Due to multitenancy of cloud storage, the data uploaded on it is the more prone to security breaches. To secure the data on cloud, cryptographic technique is used which works like safeguard against data leakage. This research work focuses on cryptographic algorithms from most basic to advance and also presents their comparative analysis. Moreover, the paper focuses on the nature of the algorithms in context of cloud that is homogeneous and heterogeneous nature. In the cloud computing, homogeneous nature algorithm is used only if the encryptors and decryptors both are same while heterogeneous refers to the situation in which encryptors and decryptors are different entities.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121506553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Deep Learning Approach for the Classification of Arrhythmias in ECG Signal 心电信号中心律失常分类的深度学习方法
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00153
Aman Kumar, M. Sipani, Puneeta Marwaha
ECG or electrocardiogram assesses an individual's cardiac rhythm as a signal. This signal is the significant result of repolarisation and depolarisation of heart's four chambers, through which voltage can be interpreted over time. The presumption of this paper is the implementation of supervised deep learning to identify the visualisation and illustration of labelled rhythmic aberrations. The proposed technique uses a series of one dimensional convolutional paired with set of multilayer perceptron to classify and detect the most common arrhythmias. The model was trained with 75% of the data available which was first sampled, and then, tested on the natural distribution of data. The accuracy of model proved to be very efficient after the implementation of the model trained by using supervised deep learning and some techniques of signal processing. Thus, providing an accuracy of 98.3% with a tolerance value of 0.0040, iterating over multiple number of iterations. Future scope of this proposition includes different processing techniques with slight adjustments within the model and its architecture.
心电图作为一种信号评估一个人的心律。这个信号是心脏四个腔的复极化和去极化的重要结果,通过它可以解释电压随时间的变化。本文的假设是实施监督深度学习来识别标记节奏异常的可视化和说明。该方法使用一系列一维卷积与一组多层感知器配对,对最常见的心律失常进行分类和检测。该模型首先使用75%的可用数据进行训练,然后对数据的自然分布进行测试。采用有监督深度学习和一些信号处理技术训练的模型实现后,模型的准确性非常高。因此,提供98.3%的精度和0.0040的容差值,在多次迭代中迭代。该命题的未来范围包括不同的处理技术,并在模型及其体系结构中进行轻微调整。
{"title":"A Deep Learning Approach for the Classification of Arrhythmias in ECG Signal","authors":"Aman Kumar, M. Sipani, Puneeta Marwaha","doi":"10.1109/INDIACom51348.2021.00153","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00153","url":null,"abstract":"ECG or electrocardiogram assesses an individual's cardiac rhythm as a signal. This signal is the significant result of repolarisation and depolarisation of heart's four chambers, through which voltage can be interpreted over time. The presumption of this paper is the implementation of supervised deep learning to identify the visualisation and illustration of labelled rhythmic aberrations. The proposed technique uses a series of one dimensional convolutional paired with set of multilayer perceptron to classify and detect the most common arrhythmias. The model was trained with 75% of the data available which was first sampled, and then, tested on the natural distribution of data. The accuracy of model proved to be very efficient after the implementation of the model trained by using supervised deep learning and some techniques of signal processing. Thus, providing an accuracy of 98.3% with a tolerance value of 0.0040, iterating over multiple number of iterations. Future scope of this proposition includes different processing techniques with slight adjustments within the model and its architecture.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114686907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Forgery over Social Media Platforms - A Deep Learning Approach for its Detection and Localization 社交媒体平台上的图像伪造——一种检测和定位的深度学习方法
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00125
Bhuvanesh Singh, D. Sharma
Social media platforms play a significant role in spreading news in the current digital era. However, they have also been spreading fake images. Forged images posted on social media platform such as Twitter create misrepresentation and generate harmful user emotions. Thus, detecting fake images over social media platforms has become a critical need of time. Deep learning convolutional networks can learn the intrinsic feature set of images and can detect forged images. This paper proposes a convolutional neural network to spot fake images shared over social media platforms. High pass filters from image processing are used in the first layer for weight initialization. This helps the neural network converge faster and achieve better accuracy. Interpretability is a common concern in deep learning models. The proposed framework employs Gradient-weighted Class Activation Mapping to generate heatmaps and localize the image's manipulated area. The model is verified against the publicly available CASIA dataset. An accuracy of 92.3% is achieved, which is better than the other previous models. From the social media perspective, the model is verified against the latest Twitter dataset. The experiment proves that convolutional neural networks perform well in detecting forged images over social media platforms, and interpretability can be achieved.
在当今的数字时代,社交媒体平台在传播新闻方面发挥着重要作用。然而,他们也一直在传播虚假图片。在推特等社交媒体平台上发布的虚假图片会造成虚假陈述,并产生有害的用户情绪。因此,检测社交媒体平台上的虚假图片已经成为当务之急。深度学习卷积网络可以学习图像的内在特征集,并可以检测伪造图像。本文提出了一种卷积神经网络来识别社交媒体平台上共享的虚假图像。第一层使用图像处理中的高通滤波器进行权重初始化。这有助于神经网络更快地收敛并获得更好的精度。可解释性是深度学习模型中常见的问题。该框架采用梯度加权类激活映射来生成热图,并对图像的操作区域进行定位。该模型针对公开可用的CASIA数据集进行验证。该模型的准确率达到92.3%,优于以往的模型。从社交媒体的角度,利用最新的Twitter数据集对模型进行验证。实验证明,卷积神经网络可以很好地检测社交媒体平台上的伪造图像,并且可以实现可解释性。
{"title":"Image Forgery over Social Media Platforms - A Deep Learning Approach for its Detection and Localization","authors":"Bhuvanesh Singh, D. Sharma","doi":"10.1109/INDIACom51348.2021.00125","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00125","url":null,"abstract":"Social media platforms play a significant role in spreading news in the current digital era. However, they have also been spreading fake images. Forged images posted on social media platform such as Twitter create misrepresentation and generate harmful user emotions. Thus, detecting fake images over social media platforms has become a critical need of time. Deep learning convolutional networks can learn the intrinsic feature set of images and can detect forged images. This paper proposes a convolutional neural network to spot fake images shared over social media platforms. High pass filters from image processing are used in the first layer for weight initialization. This helps the neural network converge faster and achieve better accuracy. Interpretability is a common concern in deep learning models. The proposed framework employs Gradient-weighted Class Activation Mapping to generate heatmaps and localize the image's manipulated area. The model is verified against the publicly available CASIA dataset. An accuracy of 92.3% is achieved, which is better than the other previous models. From the social media perspective, the model is verified against the latest Twitter dataset. The experiment proves that convolutional neural networks perform well in detecting forged images over social media platforms, and interpretability can be achieved.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124435735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Analysis of Malware Detection and Control through Covid-19 Pandemic 2019冠状病毒病疫情背景下的恶意软件检测与控制分析
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00112
S. K. Muttoo, Shikha Badhani
Malware creators have been very opportunistic in creating novel malware by leveraging the vulnerabilities which can be either at system level or environmental level. Covid-19 pandemic was the next opportunity for them. Novel malwares were seen exploiting the new normal lifestyle during the Covid-19 pandemic. In this paper, we explore the malwares that were observed specially during the Covid-19 pandemic and then present an analysis of malware detection techniques with a focus on these Covid-19-themed malwares. This study aims to set a baseline for cyber security researchers exploring the malwares that surged during the Covid-19 pandemic and the malware detection techniques.
恶意软件的创建者在利用系统级或环境级的漏洞来创建新的恶意软件方面非常投机。新冠肺炎大流行是他们的下一个机会。在新冠肺炎大流行期间,人们发现了利用新常态生活方式的新型恶意软件。在本文中,我们探讨了在Covid-19大流行期间特别观察到的恶意软件,然后重点分析了这些以Covid-19为主题的恶意软件的恶意软件检测技术。该研究旨在为网络安全研究人员探索新冠疫情期间激增的恶意软件和恶意软件检测技术设定基准。
{"title":"An Analysis of Malware Detection and Control through Covid-19 Pandemic","authors":"S. K. Muttoo, Shikha Badhani","doi":"10.1109/INDIACom51348.2021.00112","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00112","url":null,"abstract":"Malware creators have been very opportunistic in creating novel malware by leveraging the vulnerabilities which can be either at system level or environmental level. Covid-19 pandemic was the next opportunity for them. Novel malwares were seen exploiting the new normal lifestyle during the Covid-19 pandemic. In this paper, we explore the malwares that were observed specially during the Covid-19 pandemic and then present an analysis of malware detection techniques with a focus on these Covid-19-themed malwares. This study aims to set a baseline for cyber security researchers exploring the malwares that surged during the Covid-19 pandemic and the malware detection techniques.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124148606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Threat and Vulnerability Analysis of Cloud Platform: A User Perspective 基于用户视角的云平台威胁与漏洞分析
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00095
S. Kaur, Gaganpreet Kaur
Cloud technology is a shared pool of configurable computer system resources and higher-level services that can be rapidly provisioned with minimal management effort over the internet. It has enormous advantages but also has many security risks. Cloud users require understanding emerging threats, vulnerabilities, and plan possible countermeasures before transferring their computing, storage, and application to remote locations. Due to its rising threats, identification of the vulnerabilities and most appropriate solution directives to strengthen security in the cloud environment becomes paramount for all operations in it. In our study, we have scrutinized the threats along with vulnerable area and classified them based on three domains from the perspective of users. To mitigate the threats, possible existing countermeasures are listed against each threat in this paper.
云技术是可配置的计算机系统资源和高级服务的共享池,可以通过互联网以最小的管理工作量快速提供这些资源和服务。它具有巨大的优势,但也存在许多安全风险。云用户在将其计算、存储和应用程序转移到远程位置之前,需要了解新出现的威胁和漏洞,并计划可能的对策。由于威胁不断增加,识别漏洞和最适当的解决方案指令以加强云环境中的安全性对于云环境中的所有操作都变得至关重要。在我们的研究中,我们从用户的角度仔细研究了威胁和脆弱区域,并基于三个域对它们进行了分类。为了减轻这些威胁,本文列出了针对每种威胁可能存在的对策。
{"title":"Threat and Vulnerability Analysis of Cloud Platform: A User Perspective","authors":"S. Kaur, Gaganpreet Kaur","doi":"10.1109/INDIACom51348.2021.00095","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00095","url":null,"abstract":"Cloud technology is a shared pool of configurable computer system resources and higher-level services that can be rapidly provisioned with minimal management effort over the internet. It has enormous advantages but also has many security risks. Cloud users require understanding emerging threats, vulnerabilities, and plan possible countermeasures before transferring their computing, storage, and application to remote locations. Due to its rising threats, identification of the vulnerabilities and most appropriate solution directives to strengthen security in the cloud environment becomes paramount for all operations in it. In our study, we have scrutinized the threats along with vulnerable area and classified them based on three domains from the perspective of users. To mitigate the threats, possible existing countermeasures are listed against each threat in this paper.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126447495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Deep Learning Models for Image Segmentation 图像分割的深度学习模型
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00027
Sanskruti Patel
Artificial Intelligence and deep learning models have evolved rapidly in the last decade and successfully applied to face recognition, autonomous driving, satellite imaging, robotics, and many more. Computer vision tasks often require adequate segmentation of an image that helps to understand the patterns and information. The adequate segmentation makes the analysis of each part of an image easier. Traditional segmentation techniques are often applied for image segmentation, but they are less efficient than deep learning techniques. Using deep learning approaches, it is possible to obtain hierarchical feature representations directly from the images, and hence, it eliminates the requirement of handcrafted features. This paper covers the fundamentals of image segmentation and deep learning, deep learning models for image segmentation, some successful implementations of deep learning models for image segmentation, and available open and benchmark datasets for image segmentation tasks.
人工智能和深度学习模型在过去十年中发展迅速,并成功应用于人脸识别、自动驾驶、卫星成像、机器人等领域。计算机视觉任务通常需要对图像进行适当的分割,以帮助理解模式和信息。适当的分割使分析图像的每个部分更容易。传统的分割技术通常用于图像分割,但其效率低于深度学习技术。使用深度学习方法,可以直接从图像中获得分层特征表示,因此,它消除了手工制作特征的要求。本文涵盖了图像分割和深度学习的基础,图像分割的深度学习模型,图像分割的一些成功的深度学习模型的实现,以及用于图像分割任务的可用开放和基准数据集。
{"title":"Deep Learning Models for Image Segmentation","authors":"Sanskruti Patel","doi":"10.1109/INDIACom51348.2021.00027","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00027","url":null,"abstract":"Artificial Intelligence and deep learning models have evolved rapidly in the last decade and successfully applied to face recognition, autonomous driving, satellite imaging, robotics, and many more. Computer vision tasks often require adequate segmentation of an image that helps to understand the patterns and information. The adequate segmentation makes the analysis of each part of an image easier. Traditional segmentation techniques are often applied for image segmentation, but they are less efficient than deep learning techniques. Using deep learning approaches, it is possible to obtain hierarchical feature representations directly from the images, and hence, it eliminates the requirement of handcrafted features. This paper covers the fundamentals of image segmentation and deep learning, deep learning models for image segmentation, some successful implementations of deep learning models for image segmentation, and available open and benchmark datasets for image segmentation tasks.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127987821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1