2019 4th International Conference on Information Systems and Computer Networks (ISCON)最新文献

筛选
英文 中文
Optimizing Feature Selection Parameters using Statistically Equivalent Signature (SES) Algorithm 基于统计等效签名(SES)算法的特征选择参数优化
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036211
U. Khaire, R. Dhanalakshmi
{"title":"Optimizing Feature Selection Parameters using Statistically Equivalent Signature (SES) Algorithm","authors":"U. Khaire, R. Dhanalakshmi","doi":"10.1109/ISCON47742.2019.9036211","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036211","url":null,"abstract":"Selection of important feature from the high dimensional dataset is a very important task. Irrelevant and insignificant features can hinder the important information of the dataset. For accurate classification of the dataset, selection of most predictive variable is a much-needed task. Feature selection is important for the diagnosis, prognosis and treatment of any disease in case of healthcare dataset. Traditional feature selection algorithm gives the output as a single feature subset of the predictive variable. But the selection of a single feature subset cannot give the perfect idea about the nature of the dataset. The study shows that variable which is not selected by some of the feature selection algorithms will also play a major role in defining the target value of the data sample. Statistically Equivalent Signature (SES) algorithm even consider the set of such important features by considering the Markov blanket of the target variable. The root of SES is in the causal theory and Bayesian network. SES select subset of important features based on the concept of conditional independence. Finally a subset of equally predictive features/variables selected based on the Markov Blanket of target variable T. This leads to improved accuracy when considered with other feature selection algorithms. This paper presents a detailed study for selecting multiple predictive feature subsets that are statistically equivalent and their comparison with the existing feature selection algorithms. It gives an overall idea to process high dimensional datasets especially microarray (gene expression) which play a vital role in the estimation of deadly diseases such as cancer.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116483548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain Based Data Structure for Travel Entourage Tracking System 基于区块链的旅游随行人员跟踪系统数据结构
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036270
Hazleen Binti Mohd Hadzir, Fakhrul Hazman Bin Yusoff
{"title":"Blockchain Based Data Structure for Travel Entourage Tracking System","authors":"Hazleen Binti Mohd Hadzir, Fakhrul Hazman Bin Yusoff","doi":"10.1109/ISCON47742.2019.9036270","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036270","url":null,"abstract":"Blockchain has attracted many people from various industry as the expectation is it can address several computing issues especially in decentralized environment. However, the blockchain technology has yet to be fully understood where implementations such as in the area of travel entourage tracking has yet to be fully considered. This paper will look at blockchain implementations in various fields and look at the requirements for implementation in travel entourage system. Based on evaluations, it is shown that blockchain has the potential to be implemented for travel entourage system.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123442628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Approach to Information Hiding Through Image Steganography using Edge Detection 利用边缘检测实现图像隐写信息隐藏的有效方法
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036234
Mudit Bhardwaj, Lovedeep Singh, K. Saini
{"title":"An Efficient Approach to Information Hiding Through Image Steganography using Edge Detection","authors":"Mudit Bhardwaj, Lovedeep Singh, K. Saini","doi":"10.1109/ISCON47742.2019.9036234","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036234","url":null,"abstract":"Least Significant Bit (LSB) substitution is the most popular information hiding scheme in spatial steganography. Its popularity lies in the fact that it has very little effect on the cover image and secret message can remain largely unidentified by the human eye, hence, making information exchange more secure. LSB substitution can be further optimised by combining it with edge detection techniques. This is because different regions in cover image can store different number of bits. Complex regions or regions having an edge are less sensitive to change and can hide more data than smooth regions. In this research, a steganographic approach is proposed that combines edge detection based steganographic techniques with Optimal Pixel Adjustment Process (OPAP). Through experiments it is demonstrated that proposed method leads to better image quality at high payloads than even some of the state-of-the-art high capacity steganographic methods. It is also shown that proposed method can have embedding rates up to 3.407 bpp at PSNR value of 35dB, which can't be discerned by the Human Visual System (HVS). This is greater than any other method in literature.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117127683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spatio-temporal Mapping of Green House Gas Emission in Urban Settings using a Vehicle Mounted IoT Enabled Pollution Sensing Modules 利用车载物联网污染传感模块绘制城市环境中温室气体排放的时空地图
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036246
Baljit Singh, Milanpreet Kaur, Sahil Soni, Jasmeet Singh, Ajay Kumar, Amitava Das
{"title":"Spatio-temporal Mapping of Green House Gas Emission in Urban Settings using a Vehicle Mounted IoT Enabled Pollution Sensing Modules","authors":"Baljit Singh, Milanpreet Kaur, Sahil Soni, Jasmeet Singh, Ajay Kumar, Amitava Das","doi":"10.1109/ISCON47742.2019.9036246","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036246","url":null,"abstract":"This paper represents the spatial variability in the pollution by virtue of industrial and residential areas located in almost all the urban settings located at different places. Hence the pollutant gases data of a few locations cannot give an accurate overall estimate of the pollution index of the city. Hence a Spatio-temporal mapping is required to get a fair idea about the pollution in different areas at different times and would also help in identifying any high pollution zones so that remedial actions can be taken to reduce the effluent emissions. This work focuses on the use of IoT enabled gas sensing nodes which are proposed to be mounted on any public transport vehicle or administration vehicle of the focused city to get a continuous indication of the concentration of various greenhouse gases and to use an open-source database management system for warehousing and retrieval of Spatio-temporal pollution data through web-interface","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125909528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Human Dynamic Analysis and Inference system on Health problems and Stress in IT Industry by using Soft Computing Techniques 基于软计算技术的IT行业健康问题与压力人体动态分析与推理系统
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036176
Pooja Pathak, S. Rathor
{"title":"Human Dynamic Analysis and Inference system on Health problems and Stress in IT Industry by using Soft Computing Techniques","authors":"Pooja Pathak, S. Rathor","doi":"10.1109/ISCON47742.2019.9036176","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036176","url":null,"abstract":"IT business is known all inclusive for its quick paced nature where innovation is changing the face for business consistently. The sheer idea of industry is with the end goal that they require high accessibility and duty from everybody utilized in IT. The activity requires IT experts invest tremendous measures of energy before the PC screen while observing systems, designing applications and organizing technology projects. Our paper accentuation upon the investigation of human changing angles as: preconditions for employment stress, personal satisfaction and administrative impacts. A modified human dynamic analysis and inference system (HDAIS) was adopted and a risk predictive fuzzy reasoning approach (RPRA) based system is proposed to predict the likelihood of health and stress issues by using soft computing techniques. The used parameters in our paper are: age, involvement of IT proficient, no. of hours spend on PC, stretch out of impact on body parts, machine utilized at working environment or at home.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126003837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ionospheric Scintillation analysis using ROT and ROTI for Slip Cycle Detection 基于ROT和ROTI的电离层闪烁分析
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036215
Shivani Sinha, Sharat Chandra Bhardwaj, A. Vidyarthi, B. Jassal, A. Shukla
{"title":"Ionospheric Scintillation analysis using ROT and ROTI for Slip Cycle Detection","authors":"Shivani Sinha, Sharat Chandra Bhardwaj, A. Vidyarthi, B. Jassal, A. Shukla","doi":"10.1109/ISCON47742.2019.9036215","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036215","url":null,"abstract":"Ionospheric scintillation is one of the most challenging problems in satellite navigation systems. This phenomenon appears when a signal passes through ionospheric irregularities. These irregularities occur due to rapid changes in ion density of ionosphere, and this tends to change in the refraction index. Depending on their size, they can produce diffractive effects that affect amplitude and phase of the signal. The amplitude and phase scintillations can lead slip cycles in carrier phase measurement and loss of signal lock during extreme scintillation. The presence of slip cycle in carrier phase measurements prevents it to be directly used for ionospheric total electron content (TEC) estimation. For the study of scintillation events S4 index (normalized standard deviation of signal strength) and $sigma_{phi}$ index (standard deviation of signal phase) were being used, but recently Rate of TEC index (ROTI) based method has been found more suitable for detection and analysis of scintillation events. In this paper, scintillation events have been analyzed by Rate of TEC (ROT) and ROTI and compared for suitability of slip cycle event detection.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128464731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Vulnerability Assessment and Penetration Testing to Enhance the Security of Web Application 利用漏洞评估和渗透测试提高Web应用的安全性
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036175
Arvind Goutam, V. Tiwari
{"title":"Vulnerability Assessment and Penetration Testing to Enhance the Security of Web Application","authors":"Arvind Goutam, V. Tiwari","doi":"10.1109/ISCON47742.2019.9036175","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036175","url":null,"abstract":"In the present scenario, the usage of internet is enormous and is escalating day by day. Internet facilities are employed in almost every field of work and people are becoming depending on it, with the increasing dependency on the internet, concern regarding information security has been increased. Because most of the work, e-commerce, chatting, payment of the bill, etc. are work through over the internet. That is why security is most important for any web site. Basically, such security concern is high in the field of organizations, institutions, and the financial sector. This problem is greater in the field of the finance sector, this problem is greater in this field not only because the financial capital associated but also organizations and client sensitive and private data. If this data hack by the attacker then attacker or unauthorized user can use this data in the wrong way. To test the security in web applications, the company performs penetration testing which identifies web applications vulnerabilities and attackers actions. This paper is focused on web application security. In this proposed research work, a framework has been built to test the vulnerabilities. This framework has the same working module as that of a financial institutions website. After penetration testing, based on the vulnerability further, a framework will be designed which will provide more security to such web sites. The developed framework can be used in several institutions, company, Organization to test the vulnerability.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129044910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Wavelet-SVD based Zero-Bit Watermarking for Securing Biometric Images 基于小波奇异值分解的零比特水印保护生物特征图像
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036228
Ankita Dwivedi, Abhilasha Singh, M. Dutta
{"title":"Wavelet-SVD based Zero-Bit Watermarking for Securing Biometric Images","authors":"Ankita Dwivedi, Abhilasha Singh, M. Dutta","doi":"10.1109/ISCON47742.2019.9036228","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036228","url":null,"abstract":"The Biometric incorporates pictures, for example, iris filters, fingerprints, palm prints which have fine highlights of uniqueness for every person. Since, these pictures are functional in numerous applications, for example, get to control, military, CBI examination, ID, and so forth, its security is a significant concern. A methodology of verifying biometric pictures can be Digital Watermarking. Customary watermarking can mutilate the picture that causes data loss. Indeed, a little contortion can leave biometric of an individual unrecognizable. So here is an urgent requirement for a watermarking plan that doesn't misshape the original picture by any means. This paper presents a watermarking of zero bit strategy in which one of a kind distinguishing proof codes are produced from biometric pictures by applying Discrete Wavelet Transform (DWT) trailed by Singular Value Decomposition (SVD). Exploratory outcomes delineate that exceptional highlights separated are profoundly steady even by various picture preparing attacks and henceforth declare its value for classified biometric pictures.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130915667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fake News Detection: A long way to go 假新闻侦查:任重道远
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036221
Sunidhi Sharma, D. Sharma
{"title":"Fake News Detection: A long way to go","authors":"Sunidhi Sharma, D. Sharma","doi":"10.1109/ISCON47742.2019.9036221","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036221","url":null,"abstract":"One can easily say in today's world, information aka news to few is more precious than money itself. This news needs to be in authentic form which is usually found in adulterated version. Leading us to have a dire need for an identification of real news from any possible fake news. News, being a form of information can be subjective to the proofs and source for its authenticity. As a human, one can easily identify real news from fake news with the help of one's innate capability to deduce logic and outlandish source of the information piece. Just that one needs few trusted sources to check for the facts and myths. But on a real time basis, there is a dire need for some software which can nip such ‘false news’ in its bud. Leading it to be one of the most researched area nowadays. Primarily being a part of Information Retrieval, this area is taking up a lot of attention from researchers worldwide to come up with a real-time solution for such an issue. In this article we have checked and analysed many research articles along with many survey articles and summed up this paper so as to provide the readers with a short idea of what fake news is, it's different flavours in the news spectrum, its characteristics and identification basic. We also included the different methods used by prior researchers in the same field. Using few researches as examples we learned about the basics of those methods used in fake news identification. The future aspects are also included in this article along with the challenges one faces while doing research in this very field.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122976445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Filter Design for Universal Filtered Multicarrier (UFMC) based Systems 通用滤波多载波(UFMC)系统的滤波器设计
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036268
R. Manda, R. Gowri
{"title":"Filter Design for Universal Filtered Multicarrier (UFMC) based Systems","authors":"R. Manda, R. Gowri","doi":"10.1109/ISCON47742.2019.9036268","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036268","url":null,"abstract":"The universal filtered Multi-carrier (UFMC) is the most considerable modulation scheme for next generation wireless networks. The UFMC based system output is highly dependent on the sub-band filter response that used at transmitter end, which influences the emission of sub-band into the adjacent sub-bands and hence inter-carrier interference (ICI) and inter-sub-band interference (ISBI). In this paper, we focus on the design of sub-band filter. The aim of this filter design is to minimize the ICI and ISBI. First, we evaluated the ICI and ISBI in UFMC symbol regard to the filter specifications then primarily the filter order adjusted regard to the sub-band size. The simulation results show the variation of ICI and ISBI for proposed method and the conventional method. With this method, the ICI and ISBI were significantly reduced as compared to the conventional method.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122233134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信