2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)最新文献

筛选
英文 中文
Real World Solutions for Smart Cities Transportation to be Pandemic Ready 智慧城市交通的现实世界解决方案为流行病做好准备
Yusra Amir, S. Deb, M. S. Alam, Y. Rafat, S. Hameed
{"title":"Real World Solutions for Smart Cities Transportation to be Pandemic Ready","authors":"Yusra Amir, S. Deb, M. S. Alam, Y. Rafat, S. Hameed","doi":"10.1109/ICRCICN50933.2020.9296179","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296179","url":null,"abstract":"The COVID-19 is the current widespread health disaster. It has speedily spread all over the world causing a massive impact on the health, environmental, social and economic condition of the total world’s population. Enormous actions undertaken worldwide to minimize the expansion of this deadly contagion by testing at a large scale, quarantining the suspected people, upholding lockdowns and restricting social gatherings. The transportation sector has been one amid the leading sufferers of Coronavirus. Airlines, railways, and the public transport sector are badly hit due to this coronavirus outbreak. In this paper, we studied the effect of Coronavirus on the various transport sectors all over the world, taking into consideration the worldwide scenario and India’s condition as well. Further, this paper analyses the possible ways and measures regarding how the transport services are dealing with this pandemic.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116881168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lung Cancer Detection Using Deep Learning Network: A Comparative Analysis 基于深度学习网络的肺癌检测:比较分析
Susmita Das, Swanirbhar Majumder
{"title":"Lung Cancer Detection Using Deep Learning Network: A Comparative Analysis","authors":"Susmita Das, Swanirbhar Majumder","doi":"10.1109/ICRCICN50933.2020.9296197","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296197","url":null,"abstract":"Deep learning is an emergent and influential method which is used for feature learning and pattern recognition. We provide a comparison between Computer Aided Diagnosis scheme using Deep Learning Technique and traditional Computer Aided Diagnosis scheme in our paper. In this paper, we have compared several deep neural networks for recognition of pulmonary cancer. In our study, we find that Convolutional neural networks are used for pulmonary cancer detection in most of the cases, as compared to other algorithms in deep learning techniques. In conclusion, we address the few difficulties in the implementation of the systems for pulmonary cancer, then we summarise the advantages and disadvantages of the existing algorithms for diagnosis of pulmonary cancer.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116086854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
ICRCICN 2020 Cover Page icicann 2020封面
{"title":"ICRCICN 2020 Cover Page","authors":"","doi":"10.1109/icrcicn50933.2020.9296151","DOIUrl":"https://doi.org/10.1109/icrcicn50933.2020.9296151","url":null,"abstract":"","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125581831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CG-D2D: Cooperative Game Theory based Resource optimization for D2D Communication in 5G Wireless Network CG-D2D:基于协作博弈论的5G无线网络D2D通信资源优化
Subhankar Ghosh, D. De
{"title":"CG-D2D: Cooperative Game Theory based Resource optimization for D2D Communication in 5G Wireless Network","authors":"Subhankar Ghosh, D. De","doi":"10.1109/ICRCICN50933.2020.9296163","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296163","url":null,"abstract":"Device-to-Device (D2D) communication have paved the way for resource allocation among a large number of wireless devices. A cooperative game theory based resource allocation in D2D communication for 5G wireless network is discussed in this article. Nearby devices combine to form a cluster and exchange data between themselves. Due to the short distance between the devices into the cluster, the amount of data loss between them is much less. In CG-D2D, a utility function and two algorithms are proposed through which spectrum manager allocate the resources between devices in the cluster and allocate the resources among the clusters. In this article, the power consumption, Signal to Interference plus Noise Ratio (SINR) and spectral efficiency (SE) of proposed CG-D2D are calculated and compared it with the existing networks. The proposed CG-D2D reduces the power consumption by approximately 10% – 30% and enhances the SINR and spectral efficiency (SE) by approximately 2% – 8% and 2% – 4% respectively than the existing approaches.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122932056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Employing Deep Learning In Intraday Stock Trading 在股票盘中交易中运用深度学习
G. Taroon, Ayushi Tomar, Chinthakunta Manjunath, M. Balamurugan, Bikramaditya Ghosh, Addapalli V. N. Krishna
{"title":"Employing Deep Learning In Intraday Stock Trading","authors":"G. Taroon, Ayushi Tomar, Chinthakunta Manjunath, M. Balamurugan, Bikramaditya Ghosh, Addapalli V. N. Krishna","doi":"10.1109/ICRCICN50933.2020.9296174","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296174","url":null,"abstract":"Accurate stock price prediction is a significant benefit to the Stock investors. The future Stock value of any company is determined by Stock market prediction. A successful prediction of the stock’s future price could result in a significant profit; Hence investors prefer a precise Stock price prediction. Although there are many different approaches to helps in forecasting stock prices, this paper will briefly look into the deep learning models and compare LSTM model and its variants. The key intention of this study is to propose a model that is best suitable and can be implemented to forecasting trend of stock prices. This paper focuses on binary classification problem, predicting the next-minute price movement of SPDR S&P 500 index The testing experiments performed on the SPDR S&P 500 index reveals that the variants of LSTM models, Slim LSTM1, slim LSTM2, and Slim LSTM3 with less parameters, provide better performance when compared to the Standard LSTM Model.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128972693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cache Aware Task Scheduling Algorithm for Heterogeneous Cloud Computing Environment 异构云计算环境下的缓存感知任务调度算法
S. Nagendra Prasad, Subhash Kulkarni, Prasanth Venkatareddy
{"title":"Cache Aware Task Scheduling Algorithm for Heterogeneous Cloud Computing Environment","authors":"S. Nagendra Prasad, Subhash Kulkarni, Prasanth Venkatareddy","doi":"10.1109/ICRCICN50933.2020.9296177","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296177","url":null,"abstract":"heterogeneous multicore computational environment are increasingly being used for executing scientific workload. Heterogeneous computational framework aid is reducing energy dissipation for executing real-time data intensive workload by employing Dynamic Power Management (DPM) and Dynamic Voltage and Frequency Scaling (DVFS). However, reducing energy and improving performance is becoming major constraint in modelling workload scheduling model in heterogeneous computational environment. For building tradeoffs model this work assume that different task will have different execution path, I/O access, memory, active processing, and cache requirement. Considering such assumption this paper present cache aware workload scheduling (CATS) algorithm by minimizing energy dissipation and utilizing cache resource more efficiently. The CATS model achieves much lesser execution time and energy consumption when compared with existing multiobjective based and DVFS-based workload scheduling algorithm.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121075818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Diffie-Hellman Instantiations in Pre- and Post- Quantum World: A Review Paper 前量子世界和后量子世界中的Diffie-Hellman实例:综述
Ali Raya, K. Mariyappn
{"title":"Diffie-Hellman Instantiations in Pre- and Post- Quantum World: A Review Paper","authors":"Ali Raya, K. Mariyappn","doi":"10.1109/ICRCICN50933.2020.9296172","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296172","url":null,"abstract":"key exchange primitive is a fundamental pillar in public key cryptography. Diffie-Hellman is an example of a keyexchange protocol, which enables the establishment of shared secret key over an insecure public channel between two parties. Different instantiations of Diffie-Hellman can be found based on the underlying group/set where the computations required for establishing the shared key are carried out. In this paper, three different implementations of Diffie-Hellman protocol will be reviewed and compared: the core Diffie-Hellman (DH) protocol, Elliptic Curve Diffie-Hellman (ECDH) as examples of secure protocols in a pre-quantum world, and Supersingular Isogeny Diffie-Hellman (SIDH) as an example of a quantum-safe protocol for key establishment. The steps of establishing the shared key in each instantiation will be shown, security analysis will be discussed for the different implementations in both pre- and post-quantum world, and finally, a brief comparison of the three instantiations will be drawn.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130062777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Neural Networks for detecting Intrusions: A survey 人工神经网络在入侵检测中的研究进展
Loreen Mahmoud, R. Praveen
{"title":"Artificial Neural Networks for detecting Intrusions: A survey","authors":"Loreen Mahmoud, R. Praveen","doi":"10.1109/ICRCICN50933.2020.9296181","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296181","url":null,"abstract":"Nowadays, the networks attacks became very sophisticated and hard to be recognized, The traditional types of intrusion detection systems became inefficient in predicting new types of attacks. As the IDS is an important factor in securing the network in the real time, many new effective IDS approaches have been proposed. In this paper, we intend to discuss different Artificial Neural Networks based IDS approaches, also we are going to categorize them in four categories (normal ANN, DNN, CNN, RNN) and make a comparison between them depending on different performance parameters (accuracy, FNR, FPR, training time, epochs and the learning rate) and other factors like the network structure, the classification type, the used dataset. At the end of the survey, we will mention the merits and demerits of each approach and suggest some enhancements to avoid the noticed drawbacks.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125550987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
ICRCICN 2020 Index ICRCICN 2020索引
{"title":"ICRCICN 2020 Index","authors":"","doi":"10.1109/icrcicn50933.2020.9296149","DOIUrl":"https://doi.org/10.1109/icrcicn50933.2020.9296149","url":null,"abstract":"","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133965824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Cyberattacks and its Detection Mechanisms 网络攻击及其检测机制分析
K. Sudar, P. Deepalakshmi, P. Nagaraj, V. Muneeswaran
{"title":"Analysis of Cyberattacks and its Detection Mechanisms","authors":"K. Sudar, P. Deepalakshmi, P. Nagaraj, V. Muneeswaran","doi":"10.1109/ICRCICN50933.2020.9296178","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296178","url":null,"abstract":"With the help of Internet, there are tremendous innovations and developments in technologies. Most of the business organizations are forced to use the flexible and modern network technologies for business processing. This opens the door for cyber criminals to initiate cyberattacks to disrupt the business process. There are lot of reasons behind these cyberattacks like stealing login credentials, financial information and confidential information, disrupting the services available to legitimate users and to gain unauthorized access. To defend against cyberattacks, several mechanisms were proposed by researchers. In this paper, we analyzed about different types of cyberattacks and detection mechanisms to defend against those attacks. We also analyzed about different datasets and evaluation metrics used to evaluate the performance of every detection mechanism.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132685227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信