{"title":"Optimizing Feature Selection Parameters using Statistically Equivalent Signature (SES) Algorithm","authors":"U. Khaire, R. Dhanalakshmi","doi":"10.1109/ISCON47742.2019.9036211","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036211","url":null,"abstract":"Selection of important feature from the high dimensional dataset is a very important task. Irrelevant and insignificant features can hinder the important information of the dataset. For accurate classification of the dataset, selection of most predictive variable is a much-needed task. Feature selection is important for the diagnosis, prognosis and treatment of any disease in case of healthcare dataset. Traditional feature selection algorithm gives the output as a single feature subset of the predictive variable. But the selection of a single feature subset cannot give the perfect idea about the nature of the dataset. The study shows that variable which is not selected by some of the feature selection algorithms will also play a major role in defining the target value of the data sample. Statistically Equivalent Signature (SES) algorithm even consider the set of such important features by considering the Markov blanket of the target variable. The root of SES is in the causal theory and Bayesian network. SES select subset of important features based on the concept of conditional independence. Finally a subset of equally predictive features/variables selected based on the Markov Blanket of target variable T. This leads to improved accuracy when considered with other feature selection algorithms. This paper presents a detailed study for selecting multiple predictive feature subsets that are statistically equivalent and their comparison with the existing feature selection algorithms. It gives an overall idea to process high dimensional datasets especially microarray (gene expression) which play a vital role in the estimation of deadly diseases such as cancer.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116483548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hazleen Binti Mohd Hadzir, Fakhrul Hazman Bin Yusoff
{"title":"Blockchain Based Data Structure for Travel Entourage Tracking System","authors":"Hazleen Binti Mohd Hadzir, Fakhrul Hazman Bin Yusoff","doi":"10.1109/ISCON47742.2019.9036270","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036270","url":null,"abstract":"Blockchain has attracted many people from various industry as the expectation is it can address several computing issues especially in decentralized environment. However, the blockchain technology has yet to be fully understood where implementations such as in the area of travel entourage tracking has yet to be fully considered. This paper will look at blockchain implementations in various fields and look at the requirements for implementation in travel entourage system. Based on evaluations, it is shown that blockchain has the potential to be implemented for travel entourage system.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123442628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Approach to Information Hiding Through Image Steganography using Edge Detection","authors":"Mudit Bhardwaj, Lovedeep Singh, K. Saini","doi":"10.1109/ISCON47742.2019.9036234","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036234","url":null,"abstract":"Least Significant Bit (LSB) substitution is the most popular information hiding scheme in spatial steganography. Its popularity lies in the fact that it has very little effect on the cover image and secret message can remain largely unidentified by the human eye, hence, making information exchange more secure. LSB substitution can be further optimised by combining it with edge detection techniques. This is because different regions in cover image can store different number of bits. Complex regions or regions having an edge are less sensitive to change and can hide more data than smooth regions. In this research, a steganographic approach is proposed that combines edge detection based steganographic techniques with Optimal Pixel Adjustment Process (OPAP). Through experiments it is demonstrated that proposed method leads to better image quality at high payloads than even some of the state-of-the-art high capacity steganographic methods. It is also shown that proposed method can have embedding rates up to 3.407 bpp at PSNR value of 35dB, which can't be discerned by the Human Visual System (HVS). This is greater than any other method in literature.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117127683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spatio-temporal Mapping of Green House Gas Emission in Urban Settings using a Vehicle Mounted IoT Enabled Pollution Sensing Modules","authors":"Baljit Singh, Milanpreet Kaur, Sahil Soni, Jasmeet Singh, Ajay Kumar, Amitava Das","doi":"10.1109/ISCON47742.2019.9036246","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036246","url":null,"abstract":"This paper represents the spatial variability in the pollution by virtue of industrial and residential areas located in almost all the urban settings located at different places. Hence the pollutant gases data of a few locations cannot give an accurate overall estimate of the pollution index of the city. Hence a Spatio-temporal mapping is required to get a fair idea about the pollution in different areas at different times and would also help in identifying any high pollution zones so that remedial actions can be taken to reduce the effluent emissions. This work focuses on the use of IoT enabled gas sensing nodes which are proposed to be mounted on any public transport vehicle or administration vehicle of the focused city to get a continuous indication of the concentration of various greenhouse gases and to use an open-source database management system for warehousing and retrieval of Spatio-temporal pollution data through web-interface","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125909528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Dynamic Analysis and Inference system on Health problems and Stress in IT Industry by using Soft Computing Techniques","authors":"Pooja Pathak, S. Rathor","doi":"10.1109/ISCON47742.2019.9036176","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036176","url":null,"abstract":"IT business is known all inclusive for its quick paced nature where innovation is changing the face for business consistently. The sheer idea of industry is with the end goal that they require high accessibility and duty from everybody utilized in IT. The activity requires IT experts invest tremendous measures of energy before the PC screen while observing systems, designing applications and organizing technology projects. Our paper accentuation upon the investigation of human changing angles as: preconditions for employment stress, personal satisfaction and administrative impacts. A modified human dynamic analysis and inference system (HDAIS) was adopted and a risk predictive fuzzy reasoning approach (RPRA) based system is proposed to predict the likelihood of health and stress issues by using soft computing techniques. The used parameters in our paper are: age, involvement of IT proficient, no. of hours spend on PC, stretch out of impact on body parts, machine utilized at working environment or at home.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126003837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shivani Sinha, Sharat Chandra Bhardwaj, A. Vidyarthi, B. Jassal, A. Shukla
{"title":"Ionospheric Scintillation analysis using ROT and ROTI for Slip Cycle Detection","authors":"Shivani Sinha, Sharat Chandra Bhardwaj, A. Vidyarthi, B. Jassal, A. Shukla","doi":"10.1109/ISCON47742.2019.9036215","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036215","url":null,"abstract":"Ionospheric scintillation is one of the most challenging problems in satellite navigation systems. This phenomenon appears when a signal passes through ionospheric irregularities. These irregularities occur due to rapid changes in ion density of ionosphere, and this tends to change in the refraction index. Depending on their size, they can produce diffractive effects that affect amplitude and phase of the signal. The amplitude and phase scintillations can lead slip cycles in carrier phase measurement and loss of signal lock during extreme scintillation. The presence of slip cycle in carrier phase measurements prevents it to be directly used for ionospheric total electron content (TEC) estimation. For the study of scintillation events S4 index (normalized standard deviation of signal strength) and $sigma_{phi}$ index (standard deviation of signal phase) were being used, but recently Rate of TEC index (ROTI) based method has been found more suitable for detection and analysis of scintillation events. In this paper, scintillation events have been analyzed by Rate of TEC (ROT) and ROTI and compared for suitability of slip cycle event detection.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128464731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerability Assessment and Penetration Testing to Enhance the Security of Web Application","authors":"Arvind Goutam, V. Tiwari","doi":"10.1109/ISCON47742.2019.9036175","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036175","url":null,"abstract":"In the present scenario, the usage of internet is enormous and is escalating day by day. Internet facilities are employed in almost every field of work and people are becoming depending on it, with the increasing dependency on the internet, concern regarding information security has been increased. Because most of the work, e-commerce, chatting, payment of the bill, etc. are work through over the internet. That is why security is most important for any web site. Basically, such security concern is high in the field of organizations, institutions, and the financial sector. This problem is greater in the field of the finance sector, this problem is greater in this field not only because the financial capital associated but also organizations and client sensitive and private data. If this data hack by the attacker then attacker or unauthorized user can use this data in the wrong way. To test the security in web applications, the company performs penetration testing which identifies web applications vulnerabilities and attackers actions. This paper is focused on web application security. In this proposed research work, a framework has been built to test the vulnerabilities. This framework has the same working module as that of a financial institutions website. After penetration testing, based on the vulnerability further, a framework will be designed which will provide more security to such web sites. The developed framework can be used in several institutions, company, Organization to test the vulnerability.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129044910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wavelet-SVD based Zero-Bit Watermarking for Securing Biometric Images","authors":"Ankita Dwivedi, Abhilasha Singh, M. Dutta","doi":"10.1109/ISCON47742.2019.9036228","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036228","url":null,"abstract":"The Biometric incorporates pictures, for example, iris filters, fingerprints, palm prints which have fine highlights of uniqueness for every person. Since, these pictures are functional in numerous applications, for example, get to control, military, CBI examination, ID, and so forth, its security is a significant concern. A methodology of verifying biometric pictures can be Digital Watermarking. Customary watermarking can mutilate the picture that causes data loss. Indeed, a little contortion can leave biometric of an individual unrecognizable. So here is an urgent requirement for a watermarking plan that doesn't misshape the original picture by any means. This paper presents a watermarking of zero bit strategy in which one of a kind distinguishing proof codes are produced from biometric pictures by applying Discrete Wavelet Transform (DWT) trailed by Singular Value Decomposition (SVD). Exploratory outcomes delineate that exceptional highlights separated are profoundly steady even by various picture preparing attacks and henceforth declare its value for classified biometric pictures.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130915667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fake News Detection: A long way to go","authors":"Sunidhi Sharma, D. Sharma","doi":"10.1109/ISCON47742.2019.9036221","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036221","url":null,"abstract":"One can easily say in today's world, information aka news to few is more precious than money itself. This news needs to be in authentic form which is usually found in adulterated version. Leading us to have a dire need for an identification of real news from any possible fake news. News, being a form of information can be subjective to the proofs and source for its authenticity. As a human, one can easily identify real news from fake news with the help of one's innate capability to deduce logic and outlandish source of the information piece. Just that one needs few trusted sources to check for the facts and myths. But on a real time basis, there is a dire need for some software which can nip such ‘false news’ in its bud. Leading it to be one of the most researched area nowadays. Primarily being a part of Information Retrieval, this area is taking up a lot of attention from researchers worldwide to come up with a real-time solution for such an issue. In this article we have checked and analysed many research articles along with many survey articles and summed up this paper so as to provide the readers with a short idea of what fake news is, it's different flavours in the news spectrum, its characteristics and identification basic. We also included the different methods used by prior researchers in the same field. Using few researches as examples we learned about the basics of those methods used in fake news identification. The future aspects are also included in this article along with the challenges one faces while doing research in this very field.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122976445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Filter Design for Universal Filtered Multicarrier (UFMC) based Systems","authors":"R. Manda, R. Gowri","doi":"10.1109/ISCON47742.2019.9036268","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036268","url":null,"abstract":"The universal filtered Multi-carrier (UFMC) is the most considerable modulation scheme for next generation wireless networks. The UFMC based system output is highly dependent on the sub-band filter response that used at transmitter end, which influences the emission of sub-band into the adjacent sub-bands and hence inter-carrier interference (ICI) and inter-sub-band interference (ISBI). In this paper, we focus on the design of sub-band filter. The aim of this filter design is to minimize the ICI and ISBI. First, we evaluated the ICI and ISBI in UFMC symbol regard to the filter specifications then primarily the filter order adjusted regard to the sub-band size. The simulation results show the variation of ICI and ISBI for proposed method and the conventional method. With this method, the ICI and ISBI were significantly reduced as compared to the conventional method.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122233134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}