2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)最新文献

筛选
英文 中文
Low Power XNOR based Single Ended VCO Circuit Design with Dynamic Threshold MOS 基于动态阈值MOS的低功耗XNOR单端压控振荡器电路设计
2021 Thirteenth International Conference on Contemporary Computing (IC3-2021) Pub Date : 2021-08-05 DOI: 10.1145/3474124.3474141
Vivek Jangra, M. Kumar
{"title":"Low Power XNOR based Single Ended VCO Circuit Design with Dynamic Threshold MOS","authors":"Vivek Jangra, M. Kumar","doi":"10.1145/3474124.3474141","DOIUrl":"https://doi.org/10.1145/3474124.3474141","url":null,"abstract":"This paper proposes a single-ended voltage-controlled oscillator (VCO) circuit design using XNOR gate as the basic delay element and dynamic threshold MOS (DTMOS) as the tuning element at the output node of the delay stage. The proposed PN-DTMOS ring oscillator achieves a frequency tuning range of 4.41 GHz to 4.05 GHz with variations in tuning voltage from 0V to 0.7V. The power dissipation of the proposed VCO is as low as 1.071 mW. This VCO achieves a frequency tuning range of 1.46 GHz to 4.12 GHz and power dissipation in the range of 0.123 mW to 1.067 mW with variations in power supply voltage from 1V to 1.8V. Proposed VCO shows a phase noise of -72.88 dBc/Hz@1MHz with the figure of merit (FoM) of -152.52 dBc/Hz with PN-DTMOS varactor tuning. This new approach using the forward body biasing technique can adjust the transistor’s threshold voltage.","PeriodicalId":144611,"journal":{"name":"2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131001982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Examining Security for Different Data Models* 检查不同数据模型的安全性*
2021 Thirteenth International Conference on Contemporary Computing (IC3-2021) Pub Date : 2021-08-05 DOI: 10.1145/3474124.3474195
Vartika Puri, Shelly Sachdeva
{"title":"Examining Security for Different Data Models*","authors":"Vartika Puri, Shelly Sachdeva","doi":"10.1145/3474124.3474195","DOIUrl":"https://doi.org/10.1145/3474124.3474195","url":null,"abstract":"Efficient data storage and retrieval in many sectors led to the development of various modeling techniques such as relational model, Entity Attribute Value model and dynamic tables. The aim of this study is to classify the standard threats of the database according to the violation of security properties followed by the examination of different data models from their security viewpoint. A system is said to be secure if it follows three basic pillars of security i.e. confidentiality, integrity and availability. The current research analyses the security threats in database according to violation of basic pillars of security with detailed analysis of SQL injection attack for three data modeling techniques, namely relational model, Entity Attribute Value (EAV) model and dynamic tables. It presents a comparison of achieving security parameters by performing various experiments on the database stored in MySQL and proposes techniques for the application of mandatory access control in EAV model and dynamic table. After the rigorous survey and experiments performed, it has been found that EAV model is still not a completely secured model. The data leakage in EAV model is more and the application of security properties is relatively more complex than relational model and dynamic tables. Researches have been conducted in the past on these models but very few of them have discussed the security concerns of EAV model and dynamic tables. This paper tries to compare various data models based on security concerns and highlights the security issues in EAV model.","PeriodicalId":144611,"journal":{"name":"2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123643047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing the Relationship between Software Metrics and Bad Smells Using Critical Metric Value (CMV) 用关键度量值(CMV)分析软件度量与异味的关系
2021 Thirteenth International Conference on Contemporary Computing (IC3-2021) Pub Date : 2021-08-05 DOI: 10.1145/3474124.3474193
Mansi Agnihotri, A. Chug
{"title":"Analyzing the Relationship between Software Metrics and Bad Smells Using Critical Metric Value (CMV)","authors":"Mansi Agnihotri, A. Chug","doi":"10.1145/3474124.3474193","DOIUrl":"https://doi.org/10.1145/3474124.3474193","url":null,"abstract":"User requirements for a software system frequently evolve with time, and developers sometimes make incorrect implementation choices while meeting such requirements. These choices tend to introduce system flaws, i.e., bad smells in the program's source code. Bad smells do not disturb the normal functioning of a system, but they might worsen the software quality by increasing its complexity. Software metrics play a significant role in the analysis of object-oriented properties of a system. Also, change in software metrics’ values are often used to predict bad smells in a code. In the current study, an investigation has been conducted on four open-source projects. The concept of Critical Metric Value (CMV) has been introduced in the current study, and its impact on the occurrence of five selected bad smells has been examined to establish a relationship between software metrics and bad smells. CMV is that value of any software metric that is considered an outlier when compared to the rest of the metric values. The selected bad smells have been categorized as Null, Only, and Multiple based on the presence of CMV in a class. This study shows that 37.3% of the total classes have been affected by bad smells. Long statement bad smell pre-dominantly affects the selected systems as it is present in 25.74% classes. The experiment's findings show that 82.5% of the total bad smells occur in a class that consists of at least one CMV. The current study helps to establish a relationship between the bad smells and critical software metrics.","PeriodicalId":144611,"journal":{"name":"2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126134484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure Blockchain based Finance Application 一个安全的基于区块链的金融应用
2021 Thirteenth International Conference on Contemporary Computing (IC3-2021) Pub Date : 2021-08-05 DOI: 10.1145/3474124.3474138
Urshila Ravindran, P. Vamsi
{"title":"A Secure Blockchain based Finance Application","authors":"Urshila Ravindran, P. Vamsi","doi":"10.1145/3474124.3474138","DOIUrl":"https://doi.org/10.1145/3474124.3474138","url":null,"abstract":"Blockchain is undoubtedly one of the most potentially attractive technologies for the organization of financial services. The significance of the Blockchain technology in a banking system can be determined by three main principles that is; Disintermediation, Transparency and Provenance. The DLT (distributed ledger technology) eliminates the need for trust enforcer in the banking management system. This is made possible by the tamper- proof data in the distributed data records and all the participants in the network have the same version of data record with them at all times and it is unalterable. Blockchain promotes a public database record of all the customer transactions and other data, ensuring a transparent and trustworthy system as the customers have a 24x7 real-time access to it. Blockchain keeps an immutable distributed data ledger of transactions and this result in maintaining a lifecycle of the assets and its ownership from its first transaction to the most recent one. It reduces the chances of occurrence of theft, insurance fraud and misselling of the high valued assets or intellectual properties. Blockchain can be implemented in the banking sector for various applications like maintenance of data confidentiality, cheque clearing system, real time money transfer system (digital currency), supply chain finance, insurance, trade finance, KYC (know your customer), cross-border payments/transactions system, monitoring of consortium accounts, auction system and digital asset management. Blockchain technology can hence enable a decentralized solution for the banking ecosystem. The proposed system enables one platform for both the lenders and the borrowers to initiate their money transaction for lending, borrowing and repayment of the loan money. The transactions made throughout, that is, from the start to the last repayment can be viewed easily on a blockchain network thus increasing the transparency and trust of the customers and it resolves any disputes that can arise in the loan system. Along with this, a KYC registry based on blockchain is also proposed which will help in maintaining the KYC details in one platform which can be accessed by various banks for identification and verification of the customer in an easy and faster manner. It will increase the customer satisfaction as there will be no need for the customer to perform a KYC check every time he/she creates a bank account in any bank as the bank can easily access their KYC details from this system.","PeriodicalId":144611,"journal":{"name":"2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131082464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Text Representation Method to Detect Cyber Aggression in Hindi English Code Mixed Social Media Text 印地语英语码混合社交媒体文本中网络攻击检测的文本表示方法评价
2021 Thirteenth International Conference on Contemporary Computing (IC3-2021) Pub Date : 2021-08-05 DOI: 10.1145/3474124.3474185
Shikha Mundra, Namita Mittal
{"title":"Evaluation of Text Representation Method to Detect Cyber Aggression in Hindi English Code Mixed Social Media Text","authors":"Shikha Mundra, Namita Mittal","doi":"10.1145/3474124.3474185","DOIUrl":"https://doi.org/10.1145/3474124.3474185","url":null,"abstract":"with the widespread growth in modern technologies and social media networks, people spend their massive amount of time communicating and gathering information online from the web. This phenomenon leads to an increase in the number of active social media users from multilingual societies over every year along with a major challenge to monitor aggressive and harmful content posted informally onto the large-scale social media. A recent study showed the victims of cyber aggression suffer from various impacts as depression, suicide attempts or must leave the social media platform which focuses on emerging need to automatically understand such type of offensive content. The majority of the text in social media belongs to non-English language but research has so far concentrated on English texts only hence text understanding is the major issue in social media as non-English speakers do not always use Unicode to write in their language, they use phonetic typing, frequently insert English elements and mix multiple languages. In our work, we studied already existing work deeply and investigate multiple text embedding techniques onto cyber aggression detection dataset having a challenging issue of Hindi English code mixed text understanding and revealed that character-based embedding is performing best in noisy data and can be enhanced with inclusion only aggressive words density as a feature without in-depth preprocessing. Also, our model overcomes the constraint of the availability of pre-trained word embedding.","PeriodicalId":144611,"journal":{"name":"2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132578837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Generative Adversarial Network based Training Framework for Robust TTS in Noisy Environment 基于生成对抗网络的噪声环境下鲁棒TTS训练框架
2021 Thirteenth International Conference on Contemporary Computing (IC3-2021) Pub Date : 2021-08-05 DOI: 10.1145/3474124.3474163
Kishore Kumar Botsa, Lithin Reddy Marla, S. Gangashetty
{"title":"A Generative Adversarial Network based Training Framework for Robust TTS in Noisy Environment","authors":"Kishore Kumar Botsa, Lithin Reddy Marla, S. Gangashetty","doi":"10.1145/3474124.3474163","DOIUrl":"https://doi.org/10.1145/3474124.3474163","url":null,"abstract":"Humans overcome the degradation effect of background noise on the speech by changing their vocal characteristics dynamically, which text-to-speech systems trained on clean speech cannot, resulting in degraded intelligibility. To improve the intelligibility of such system requires a large amount of speech samples, which is difficult to collect for various conditions like noise backgrounds and signal-to-noise ratios. This paper presents a noise dependent enhancement to text-to-speech, based on generative adversarial network training framework to generate intelligible speech in noise. The learning mechanism for the synthesizer network is inspired from the acoustic feedback humans use to nullify the effect of various background noises. The system thus trained is evaluated under cafeteria noise condition with two objective measures, which indicated improvement in intelligibility compared to models trained on clean speech across 3 SNRs. The proposed modification does not require any additional training data and can be applied to a variety of Deep Neural Networks that employ back-propagation algorithm for training.","PeriodicalId":144611,"journal":{"name":"2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125206893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CbPIS: Cyberbullying Profile Identification System with Users in Loop 基于用户循环的网络欺凌档案识别系统
2021 Thirteenth International Conference on Contemporary Computing (IC3-2021) Pub Date : 2021-08-05 DOI: 10.1145/3474124.3474153
Monika Choudhary, S. Chouhan, E. Pilli
{"title":"CbPIS: Cyberbullying Profile Identification System with Users in Loop","authors":"Monika Choudhary, S. Chouhan, E. Pilli","doi":"10.1145/3474124.3474153","DOIUrl":"https://doi.org/10.1145/3474124.3474153","url":null,"abstract":"The internet has given us access to vast amounts of information and enabled us to communicate globally. However, posting uncensored comments on internet has raised several concerns. Cyberbullying, provoking and pestering are some of the growing issues on social media. People try to belittle others on public forums for fun. There is no suitable and scalable way to establish the authenticity and reliability of information and users. In this paper, we propose Cyberbullying Profile Identification System (CbPIS), to identify bullying profile involved in cyberbullying. In the proposed work, we first evaluate and compare existing state-of-the-art machine learning and deep learning techniques, then select the suitable technique for the system development. Moreover, CbPIS takes Users’ feedback for validation purpose and based on the feedback, if needed, CbPIS retrains itself to improve the predictions. Experimental results show that CbPIS with user feedback gives effective results.","PeriodicalId":144611,"journal":{"name":"2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125243373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of Network Life Time in the LEACH Protocol for Real Time Applications 实时应用中LEACH协议中网络生存时间的增强
2021 Thirteenth International Conference on Contemporary Computing (IC3-2021) Pub Date : 2021-08-05 DOI: 10.1145/3474124.3474188
Monika Malik, G. Sakya, A. Joshi
{"title":"Enhancement of Network Life Time in the LEACH Protocol for Real Time Applications","authors":"Monika Malik, G. Sakya, A. Joshi","doi":"10.1145/3474124.3474188","DOIUrl":"https://doi.org/10.1145/3474124.3474188","url":null,"abstract":"The main emphasis to design a wireless sensor network is to enhance the network life time since its using sensor nodes which have limited energy and storage. These nodes are usually deployed in random fashion in an area to perform sensing and monitoring of the environment also it becomes impossible to replace or recharge batteries for the dead sensor nodes. This critical design issue of power consumption in WSN can be resolved by using clustering methods. It has been proved in earlier studies that clustering method could improve or enhance the life span of WSNs when used for real time IOT applications. This paper gives the fuzzy approach for the cluster head selection for the improvement of network lifetime that suits Real time applications. The novel approach of fuzzy inference system is applied to prolong the network lifetime.","PeriodicalId":144611,"journal":{"name":"2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127713371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Sequential Algorithm to Solve gH-Differentiable Interval Optimization Problems 求解h -可微区间优化问题的序列算法
2021 Thirteenth International Conference on Contemporary Computing (IC3-2021) Pub Date : 2021-08-05 DOI: 10.1145/3474124.3474132
Shaveta Kumari, S. Srivastava
{"title":"A Sequential Algorithm to Solve gH-Differentiable Interval Optimization Problems","authors":"Shaveta Kumari, S. Srivastava","doi":"10.1145/3474124.3474132","DOIUrl":"https://doi.org/10.1145/3474124.3474132","url":null,"abstract":"The purpose of the presented work is to develop a novel methodology to obtain efficient solutions to interval valued optimization problems in which the objective function satisfies second order modified gH-differentiability conditions. Modified gH-differentiability conditions have been proposed and analysed. The sequential algorithm to solve interval optimization problem is proposed. Convergence results are established. The proposed model has been illustrated through suitable examples.","PeriodicalId":144611,"journal":{"name":"2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128171099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GeoAI – Accelerating a Virtuous Cycle between AI and Geo GeoAI——加速AI与Geo之间的良性循环
2021 Thirteenth International Conference on Contemporary Computing (IC3-2021) Pub Date : 2021-08-05 DOI: 10.1145/3474124.3474179
Lokendra P. S. Chauhan, S. Shekhar
{"title":"GeoAI – Accelerating a Virtuous Cycle between AI and Geo","authors":"Lokendra P. S. Chauhan, S. Shekhar","doi":"10.1145/3474124.3474179","DOIUrl":"https://doi.org/10.1145/3474124.3474179","url":null,"abstract":"Geospatial artificial intelligence (GeoAI) is the amalgamation of artificial intelligence (AI) with spatial computing to develop a better understanding of the physical world around us at the levels of an individual, communities, cities, nations, and the planet using geospatial data. The current applications of GeoAI vary from solving challenges in the fields of sustainable development, urban planning, supply chains, and navigation to defense, epidemiology, insurance, and the emerging on-demand economy. It is a highly interdisciplinary field that uses ideas from computing, geography, spatial data science, statistics, and engineering. The unique features of geospatial data like autocorrelation, geometric nature, and multiple modalities requires the AI algorithms to be developed in a fundamentally different way, which also expands the capabilities of AI in general. Considering the exponential increasing geospatial data and application, this confluence of AI and geospatial will become a virtuous cycle of growth for both AI and Geo.","PeriodicalId":144611,"journal":{"name":"2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120957781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信