{"title":"Assessment of Load Balancing Techniques in Cloud Computing","authors":"A. Jangra, Himanshu Dubran","doi":"10.1109/ISPCC53510.2021.9609377","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609377","url":null,"abstract":"In today’s environment cloud computing is widely useful for end users to store and access large amount of data. CC has been seen as unrelated to technology that creates the next generation computer revolution and is rapidly becoming a hot topic in the IT industry. This fast-paced CC has fueled concerns about the key to success of information systems, communications, detection, social testing and integrity, data availability, the science system, and information security. Therefore, the study of CC has attracted much interest in recent years. In this paper, we aim to highlight current open problems and challenges in CC. We have discussed this paper three times: first we talk about CC and the many services it provides. Second we highlight a few security issues for CC based on its service level. We then point out a number of open challenges from the perspective of Cloud Computer Discovery and its future implications. This work includes the highlights of the platforms available in the present era of cloud development and research.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rakesh Ahuja, Amandeep Kaur, V. Lamba, V. Kukreja, A. Agarwal, Manish Sharma
{"title":"Securing Copyright of Digital Video by Exploiting Quantized DC coefficients","authors":"Rakesh Ahuja, Amandeep Kaur, V. Lamba, V. Kukreja, A. Agarwal, Manish Sharma","doi":"10.1109/ISPCC53510.2021.9609472","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609472","url":null,"abstract":"The scheme developed the method to protect the copyright of digital video while encoding the video through MPEG standard. The technique suggested to insert the same watermark at two different locations in intra-coded frame. As these frames have highest degree of luminance part as comparision to Bi-directional(B-frames) and Predicting-frames (P-frames), therefore a little alteration to such frames doesn’t degraded the perceptibility of proposed video watermarking method. The scheme also tested the robustness by applying intentional and unintenional attacks which provides satisfactory results for most of the attack A reasonable size of watermark bits can also be adjusted in a single I-frames as it contains the sufficient number of quantized discrete cosine transform block therefore great size of watermark can be accomodated in the video object.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Classical and Optimized Hierarchical Routing Protocols for IoT and WSN","authors":"Kirtidev Mohapatra, Rakesh Ku. Lenka, Surai Sharma","doi":"10.1109/ISPCC53510.2021.9609403","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609403","url":null,"abstract":"Static sensor network consisting of static sensor node with a fixed position of sink although served many purposes but still then it was not the best approach of deploying sensor nodes. Introduction of mobility in sensor networks helps in obtaining better energy consumption, increased coverage, uplifted the target tracking process and superior channel capacity. Beside several advantages of mobile sensor networks, it also possesses a challenge in order to build effective routing protocols. To facilitate mobility in wireless sensor networks, numerous routing protocols have been crafted. Based on their routing strategy, these routing protocols may be categorized as hierarchical based routing, flat-based routing, or location-based routing. In a mobile sensor network, the hierarchy-based routing approach has been found to outperform the other two procedures regarding power exhaustion, propagation delay, and cumulative network lifetime. This paper looks at some of the more traditional hierarchy-based routing protocols as well as some of the more advanced hierarchy-based routing protocols that have been developed in recent years. A comprehensive comparison is carried out on different routing protocols based on specific benchmarks like network delay, the lifetime of the network, scalability, fault-tolerance. Boon and bane of each routing protocols can be viewed in the comparison table. Finally, a quick summary followed with the conclusion and future direction ends the paper.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128673620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A GUI based application for Low Intensity Object Classification & Count using SVM Approach","authors":"Vishal Gupta, Nikhil Marriwala, Monish Gupta","doi":"10.1109/ISPCC53510.2021.9609470","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609470","url":null,"abstract":"There is a requirement of processing low intensity images from EO (Electro Optical), IR (Infra-Red) and ISAR (Inverse Synthetic Aperture Radar) sensors on airborne platforms to detect and classify targets(ships, vessels, other objects) against a library of images in real time with a degree of confidence. Pre-processing of the test input images improves the accuracy of detection and classification. The proposed method verifies and validates the trained software against the pre-processed images. The objective of the proposed approach is to train the machine learning technique in order to estimate the efficiency and accuracy of the classified and detected output from the Deep leaning models. In our work, we have compared the results in terms of accuracy and time with the previous researchers work and we have summarized about our method gives better accuracy.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129672174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Multiple Classifiers for Herbal Plant Recognition","authors":"P. Kaur, Sukhdev Singh","doi":"10.1109/ISPCC53510.2021.9609426","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609426","url":null,"abstract":"In this paper multiple classifiers are used for automatic plant recognition based on the shape of leaf features which are extracted from the leaf images using different herbal plants. Four different classifiers have been used namely SVM, KNN, Random Forest, and Logistic regression. Shape feature is considered as an important feature among all other features like- color, texture, vein structure, etc. as a leaf is available throughout the year and leaf shape contains more features to extract. Geometric shape features that are calculated as leaf’s length, width, area, perimeter, area of leaf enclosed in a rectangle, percentage of leaf in the rectangle, calculated pixels of leaf in four different quadrants are extracted during feature extraction. Among all cases, LR (Logistic regression) performed best in 7 cases while RF performed in 5 cases. SVM and LR model classifiers performed best with 95% accuracy for feature 6. KNN and RF model classifiers performed best with 90% and 93% accuracy respectively for feature 3.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129675440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Static Power Reduction Strategies in Deep Submicron CMOS Device Technology for Digital Circuits","authors":"G. Munirathnam, Y. M. Babu","doi":"10.1109/ISPCC53510.2021.9609444","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609444","url":null,"abstract":"Low power VLSI circuit design faces the challenging issues of static power dissipation as transistor count doubles for every couple of years. static power dissipation also known as leakage power dissipation which increases in scaled down threshold voltage circuits. Downsizing of CMOS innovation improved the speed and simultaneously leakage currents are left over as struggle. This unconstrained leakage current ought to be decreased for untroubled working of the circuit. This paper proposed novel static power reduction strategy with the literature survey. The research study mainly concentrated on circuit performance parameters like speed, power and power delay product of the specific circuit. This work presents logic gates designed and evaluated by mentor graphics tools with 22 nm CMOS Technology.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130368673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Andro-Financial Malware Attacks, Detection Methods and Current Issues","authors":"Tanya Gera, Jaiteg Singh, Deepak Thakur, Amandeep Kaur","doi":"10.1109/ISPCC53510.2021.9609354","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609354","url":null,"abstract":"Android is open source and the most popular operating system. Increased popularity and dependency on Smartphone have instigated attackers to exploit Android vulnerabilities for monetary benefits. Over the past decade, various malware attacks had been reported. These days, the most popular as well as threatening mobile malware is stealth malware. These are special malware used to extort money in return of access and data without user’s consent. Stealth attacks like Ransomware are responsible for the loss of not only money and data but may also result in loss of reputation. Emerging trends such as ransomware-as-a-service, crypto-mining, IOT based devices, smart devices and cloud-based devices have too encourages the spread of ransomware. There exist many solutions for malware analysis and detection in existing literature. Significant malware analysis and detection technique from the ten years have been referred and to the best of our knowledge, contemporary techniques sans precision and perfection. Articles were mainly taken from reputed journals to build the corpus for study. This work presents comprehensive survey on stealth malware. Major countermeasures are oriented towards primitive malware detection techniques. The study of existing frameworks helped to produce a literature summary. Future researchers may carefully observe literature gap to work on lacking areas. One of main contribution of this study to provide present state of art and a few still open problems in the field of Android stealth malware.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130551834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Missing Values Imputation in Food Consumption: An Analytical Study","authors":"A. Tripathi, H. Saini, Geetanjali Rathee","doi":"10.1109/ISPCC53510.2021.9609371","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609371","url":null,"abstract":"Missing values are an unavoidable trouble in some of actual world packages and the way to impute those missing values has end up a challenging problem in food consumption and production. Even though there are a few famous imputation techniques proposed, those techniques carry out poorly within side the estimation of food consumption with Missing Value. With this paper introduces an iterative imputation approach, KNN imputation method and median imputation method. These techniques are an example primarily based totally imputation method that takes benefit of the correlation of attributes. The achievable values for the missing values are expected from those nearest neighbor times. In addition, the iterative imputation permits all to be had values, consisting of the characteristic values within side the times with missing information and the imputed values from preceding new release to be applied for estimating the missing values. Specifically, the imputation approach can fill in all of the missing values with dependable records irrespective of the lacking charge of the food consumption dataset. We test our proposed approach on numerous food consumption datasets at extraordinary lacking costs in assessment with a few present imputation techniques. The experimental consequences recommend that the proposed approach receives a higher overall performance than different techniques in phrases of imputation accuracy and convergence speed.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123869702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vijayata Choudhary, P. Guha, Kuldeep Tripathi, Sunita Mishra
{"title":"Automatic Detection of Cowpea leaves Using Image Processing and Inception-V3 Model of Deep Learning","authors":"Vijayata Choudhary, P. Guha, Kuldeep Tripathi, Sunita Mishra","doi":"10.1109/ISPCC53510.2021.9609358","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609358","url":null,"abstract":"India is an agriculture-based country, and most of the population depends on agriculture for livelihoods. Cowpea plays a vital role to maintain healthy life because of its nutritious parameters. However, there is an urgent need to implement new technologies using Artificial Intelligence to enhance the productivity of crops and mitigate the cost, effort and loss of the agronomist. We have proposed a model based on deep learning algorithms to identify Cowpea leaves. For experiments, images were captured from the ICAR-NBPGR farm. We use TensorFlow and Keras platform under the umbrella of Deep Learning. Such methodology permits us 1) reorganization of the cowpea leaves based on image classification and 2) to estimate their weight. Inception model is type of application utilizes CNN based architecture to complete problems related to either binary or multiclass classification, that will again moderate by using transfer learning technique. We have initiate model for binary classification of Cowpea leaves with other leaves (Mango).","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121546378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Dimensions Detection For Forensic Investigation","authors":"Sarang Sharma, Sheifali Gupta, Rakesh Ahuja, Deepali Gupta","doi":"10.1109/ISPCC53510.2021.9609459","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609459","url":null,"abstract":"This paper proposed a canny edge detection-based approach for measuring the dimension of an object of mobile type captured in an image from the given distance. The purpose of the scheme is to implement aspects of forensic investigation helpful for our society. It makes use of mobile dimension detection algorithms to narrow it down to a range of mobile phones in a grievous event. The scheme not only identifying the mistrusting individual but also assists the forensics investigation team. In addition to that, the technique support to track the suspected individual as well as also concerns for tapping the communication records of concern person. It has been tested on wide varieties of mobile images of different model from same or different companies. The superiority of the proposed scheme is that excellent results are obtained while comparing the real dimension of an object with the object in an image.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121695301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}