2021 6th International Conference on Computing, Communication and Security (ICCCS)最新文献

筛选
英文 中文
Diffusive Nanoparticles and Generation of Repulsive Effects by Artificial Electrical Currents 扩散纳米粒子和人工电流产生排斥效应
2021 6th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2021-10-04 DOI: 10.1109/ICCCS51487.2021.9776328
H. Nieto-Chaupis
{"title":"Diffusive Nanoparticles and Generation of Repulsive Effects by Artificial Electrical Currents","authors":"H. Nieto-Chaupis","doi":"10.1109/ICCCS51487.2021.9776328","DOIUrl":"https://doi.org/10.1109/ICCCS51487.2021.9776328","url":null,"abstract":"The imminent advance of Nanomedicine is clearly reflected in the implementation of techniques based on drug deliv-ery towards concrete places that are contaminated by anomalous tissues and tumors. A promising as well as robust vehicle are the well- known nanoparticle. Therefore one expects a crucial role of engineered nanoparticles to accomplish exact tasks surpassing known achievements from the side of current pharmacology. However, in all those charged superficially nanoparticles one can expect a latent function that might be a disadvantage as to the main role of targeted drug delivery schemes and medical purposes. In this paper, a theory the apparition of nanocurrents produced a continue accumulation of charged nanoparticles, and that would be caused by diffusive effects is constructed and the consequences from it are identified. Thus, from the results of this paper the explicit dependence of diffusion coefficient is derived. This would acquire relevance in the advanced Oncology that requires of precision and efficiency.","PeriodicalId":120389,"journal":{"name":"2021 6th International Conference on Computing, Communication and Security (ICCCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114190497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Approach for Load balancing in Software-Defined Networks 软件定义网络中一种有效的负载均衡方法
2021 6th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2021-10-04 DOI: 10.1109/ICCCS51487.2021.9776348
Jehad Ali, B. Roh
{"title":"An Efficient Approach for Load balancing in Software-Defined Networks","authors":"Jehad Ali, B. Roh","doi":"10.1109/ICCCS51487.2021.9776348","DOIUrl":"https://doi.org/10.1109/ICCCS51487.2021.9776348","url":null,"abstract":"Software-Defined Networking (SDN) premise sepa-rates the data plane from the control plane. The centralized control plane brings innovation, programmability, and flexibility for managing the underlying networks. In this paper, we propose a hierarchical control plane-based SDN scheme to achieve load balancing in SDN. The hierarchical architecture is composed of a load balancing control plane and a distributed control plane based SDN architecture. To achieve load balancing, we add an analytical network process (ANP)-based module to rank the controllers according to their load status, for which ANP is applied as an enabling module to forward the flows according to the load distribution of the controllers. The ANP module ranks the controllers according to their weights. Hence, it does not send the request to the overloaded controllers in the network. Our proposed scheme surpasses the analytic hierarchy process (AHP), and Default SDN based load balancing schemes. We have demonstrated the results in three Internet topologies i.e. Abilene, Chinanet, and OS3E regrading delay, and Jain's fairness index in Mininet emulator.","PeriodicalId":120389,"journal":{"name":"2021 6th International Conference on Computing, Communication and Security (ICCCS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123003073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding the Global Data of Infections Cases by Covid-19 Through Gaussian and Trapezoid Models 利用高斯模型和梯形模型了解全球新冠肺炎感染病例数据
2021 6th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2021-10-04 DOI: 10.1109/ICCCS51487.2021.9776350
H. Nieto-Chaupis
{"title":"Understanding the Global Data of Infections Cases by Covid-19 Through Gaussian and Trapezoid Models","authors":"H. Nieto-Chaupis","doi":"10.1109/ICCCS51487.2021.9776350","DOIUrl":"https://doi.org/10.1109/ICCCS51487.2021.9776350","url":null,"abstract":"Once initialized the first wave of pandemic due to Covid-19 pandemic, it was seen in most countries a common pattern that gives account about the number of infections. Nevertheless one finds also that in mosly of these datasets could have had errors acquired in the inhomogeneous mechanisms of measurement. In this paper from a general trapezoid-like representation of pandemic, the triangular part of it, is used to estimate the duration of a third wave. From this proposal both entropy and probability haved emerged in a spontaneous manner. Therefore the present theory suggests that from the peak of infections as well the duration of second wave, the duration of third wave might be calculated. Simulations from the presented theory are done and the results are discussed.","PeriodicalId":120389,"journal":{"name":"2021 6th International Conference on Computing, Communication and Security (ICCCS)","volume":"62 174","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132972973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobilenet Based CNN Architecture For Detection of Face Masks 基于Mobilenet的CNN mask检测架构
2021 6th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2021-10-04 DOI: 10.1109/ICCCS51487.2021.9776347
Aditya Mantri, Divya Kumar
{"title":"Mobilenet Based CNN Architecture For Detection of Face Masks","authors":"Aditya Mantri, Divya Kumar","doi":"10.1109/ICCCS51487.2021.9776347","DOIUrl":"https://doi.org/10.1109/ICCCS51487.2021.9776347","url":null,"abstract":"It has remained to be the cause of misery for millions of businesses and lives throughout 2020 and into 2021 after the outbreak of Coronavirus Disease 2019 (COVID-19). Almost everyone, especially those planning to resume in-person activity, is feeling anxious while the world is recovering from the pandemic and prepares to return to a normal condition. Face masks are proven to be the only prominent way of reducing the risk of transfusion of viral agents, as well as provide a sense of protection. But, due to the negligence and casual attitude of people, strict policies must be enacted. Manual tracking of this policy, while possible, is ineffective and time-consuming. This is where technology plays a critical role and that's why in this paper, we propose a Deep Learning-based system that uses Convolutional Neural Network (CNN) architecture to detect unmasked as well as masked faces and can interface with security cameras installed. This architecture is trained by using 1923 images. It was found that a high rate of accuracy (99.13%) and validation was achieved with the proposed model, more accurate than other models. As a result, safety violations can be tracked, face masks can be encouraged, and safe working conditions can be ensured.","PeriodicalId":120389,"journal":{"name":"2021 6th International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116872077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Gated Recurrent Unit based Intrusion Detection for SCADA Networks 基于门控循环单元的SCADA网络入侵检测
2021 6th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2021-10-04 DOI: 10.1109/ICCCS51487.2021.9776331
S. M. Kasongo, Yanxia Sun
{"title":"A Gated Recurrent Unit based Intrusion Detection for SCADA Networks","authors":"S. M. Kasongo, Yanxia Sun","doi":"10.1109/ICCCS51487.2021.9776331","DOIUrl":"https://doi.org/10.1109/ICCCS51487.2021.9776331","url":null,"abstract":"Industrial control systems are rapidly evolving and they process large volumes of critical information that flow through them. Moreover, the development and advances of various industrial communication systems and the ascent of Internet connectivity have caused a surge in new types of threats and intrusions. In this study we implement a Gated Recurrent Unit (GRU) Intrusion Detection System (IDS) destined to secure Supervisory Control and Data Acquisition (SCADA) networks. The GRU algorithm used in this research is coupled to the Information Gain (IG) approach for feature selection. The NSL-KDD dataset was employed to assess the performance of the IG-GRU-IDS. The results demonstrated that with only 20 attributes of the NSL-KDD, the IG-GRU-IDS achieved a validation accuracy of 99.52%, a test accuracy of 87.49% and a F-measure of 99.51 %. These results were superior to those obtained by Simple RNNs and LSTM based RNNs.","PeriodicalId":120389,"journal":{"name":"2021 6th International Conference on Computing, Communication and Security (ICCCS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128108752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake News Detection using Machine Learning with Feature Selection 基于特征选择的机器学习假新闻检测
2021 6th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2021-10-04 DOI: 10.1109/ICCCS51487.2021.9776346
Ziyan Tian, Sanjeev Baskiyar
{"title":"Fake News Detection using Machine Learning with Feature Selection","authors":"Ziyan Tian, Sanjeev Baskiyar","doi":"10.1109/ICCCS51487.2021.9776346","DOIUrl":"https://doi.org/10.1109/ICCCS51487.2021.9776346","url":null,"abstract":"Social media has become a popular source for receiving news or information in modern society due to its timeliness and easy accessibility for everyone. However, it causes a series of critical issues. Fake news is one of the issues that urgently need to be resolved. Fake news has the capabilities to compromise democracy and the credibility of information. Compared to other malicious threats, fake news is harder to detect because fake news is created to intentionally deceive audiences. Research has been conducted and suggests that machine learning can be effectively utilized to detect fake news. Thus, we propose a fake news detection system using a k-nearest neighbors (KNN) machine learning model. By utilizing Genetic and Evolutionary Feature Selection (GEFeS) in the fake news detection system, the highest accuracy achieved in this research is 91.3 %. Additionally, we used the GEFeS identified features and an optimal k value to train and test a quantum KNN (QKNN) to explore how quantum machine learning techniques can be utilized in fake news detection problems. The accuracy achieved by the QKNN model is 84.4 %.","PeriodicalId":120389,"journal":{"name":"2021 6th International Conference on Computing, Communication and Security (ICCCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115248354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Synoptic Review on Feature Selection and Machine Learning models used for Detecting Cyber Attacks in IoT 物联网中用于检测网络攻击的特征选择和机器学习模型综述
2021 6th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2021-10-04 DOI: 10.1109/ICCCS51487.2021.9776344
Balaganesh Bojarajulu, Sarvesh Tanwar, A. Rana
{"title":"A Synoptic Review on Feature Selection and Machine Learning models used for Detecting Cyber Attacks in IoT","authors":"Balaganesh Bojarajulu, Sarvesh Tanwar, A. Rana","doi":"10.1109/ICCCS51487.2021.9776344","DOIUrl":"https://doi.org/10.1109/ICCCS51487.2021.9776344","url":null,"abstract":"There is a colossal increase in the cyberattack on the Internet of Things due to the rapid increase in its adoption rate worldwide. For ease of use, these devices are accessed by the end-user using an open network which increases the surface area of the attack which puts the user's privacy at stake. Any adversary can exploit the vulnerability in the IoT devices from anywhere which prioritises the privacy and security of computing resources. Machine learning models with an optimal feature selection method have been considered as a viable solution for mitigating various cyber-attacks and detecting malicious network traffic. This study intends to review, various machine learning algorithms and feature selection methods used for various cyber-attacks detection. Different machine learning techniques including Convolutional Neural Net-work, Random forest, Logistic regression, Random Forest used by researchers that are suitable for mitigating various attacks like Denial of service attacks, BotNet attacks etc have been discussed. This study provides a comprehensive comparison of different ML models and the feature selection methods used to train the models.","PeriodicalId":120389,"journal":{"name":"2021 6th International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130888352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Big Data Perspective of Individual Privacy Protection Approaches 个人隐私保护方法的大数据视角
2021 6th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2021-10-04 DOI: 10.1109/ICCCS51487.2021.9776332
Poornima Kulkarni, N. K. Cauvery
{"title":"A Big Data Perspective of Individual Privacy Protection Approaches","authors":"Poornima Kulkarni, N. K. Cauvery","doi":"10.1109/ICCCS51487.2021.9776332","DOIUrl":"https://doi.org/10.1109/ICCCS51487.2021.9776332","url":null,"abstract":"The evolution of social media has made big data more and more accessible to the public along with the availability of diverse datasets which may lead to the rise of privacy concerns. These datasets may contain Personally Identifiable Information which is meant for a specific purpose can lead to the violation of the user's privacy if misused. The existing data protection mechanisms don't scale up with the characteristics of big data namely Volume, Velocity, Variety, Veracity, and Value and therefore there is a need to redefine privacy-preserving techniques to address the issues related to the characteristics that are associated with big data. In this work, we assess and analyze the capability of traditional privacy-preserving techniques and the relevance of these techniques in the present scenario.","PeriodicalId":120389,"journal":{"name":"2021 6th International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129541018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized Engineering Education Model Based on Artificial Intelligence for Learning Programming 基于人工智能的个性化工程教育模式
2021 6th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2021-10-04 DOI: 10.1109/ICCCS51487.2021.9776343
Abhiraj Singh Rathore, Adarsh Sharma, M. Massoudi
{"title":"Personalized Engineering Education Model Based on Artificial Intelligence for Learning Programming","authors":"Abhiraj Singh Rathore, Adarsh Sharma, M. Massoudi","doi":"10.1109/ICCCS51487.2021.9776343","DOIUrl":"https://doi.org/10.1109/ICCCS51487.2021.9776343","url":null,"abstract":"Background: Personalisation is a critical element in the learning environment of students. This is one area that our educational system falls short. Students study at varying rates and in varying contexts, and this should be considered, which most institutions do not. We need a structure that enables students of diverse background to research and learn in their own unique manner, at their own speed, in order to grasp concepts and solve problems. Today, there is something that is gaining a lot of popularity. The future is artificial intelligence, and we agree that science holds the secret to resolving the majority of the world's problems. Result: This article provides a novel model of a system that utilizes artificial intelligence and machine learning algorithms to assist students in learning to program and creates a customized system for them. The model classifies students into beginner, intermediate, and proficient ranks using Bayesian networks. Students are helped to understand ideas by the use of tools such as flowcharts. Each level of students is provided with unique instruments and materials, and the goal is to raise the comprehension level of beginner and intermediate students to a point that they can compete with proficient students, who are provided with practice questions to further their learning. Additionally, skilled students have the ability to work in industry through the model's industry-academia partnership module. Conclusion: This paper proposes a technique that helps students in customized learning as well as in improving their critical thinking capacities using a multi-agent-based flowchart development tool. It serves as an absolute and a complete tutoring aid for students learning programming.","PeriodicalId":120389,"journal":{"name":"2021 6th International Conference on Computing, Communication and Security (ICCCS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128746790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信