2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)最新文献

筛选
英文 中文
Automated analysis of Gaze Patterns for Autism Screening- Density Approach 自闭症筛查凝视模式的自动分析-密度方法
P. Bhatia, A. Khosla, Gajendra Singh
{"title":"Automated analysis of Gaze Patterns for Autism Screening- Density Approach","authors":"P. Bhatia, A. Khosla, Gajendra Singh","doi":"10.1109/ICSCCC.2018.8703321","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703321","url":null,"abstract":"“Visual scanning reflects a model of the world that exists inside the brain of each individual” – by Moshe Eizenman. Advancements in eye-tracking technology have led to some wide-ranging applications in fields of medical research, gaming, automation, Human- Computer Interaction(HCI) and many more. This paper presents an automated study of gaze patterns as an investigating tool to distinguish autism spectrum disorder from typical development. Gaze abnormality can be used to study the model of the world perceived by people with autism that is quite different from normal people.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116242126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure QR-Code Based Message Sharing System Using Cryptography and Steganography 基于安全qr码的信息共享系统
A. Mendhe, D. Gupta, K. P. Sharma
{"title":"Secure QR-Code Based Message Sharing System Using Cryptography and Steganography","authors":"A. Mendhe, D. Gupta, K. P. Sharma","doi":"10.1109/ICSCCC.2018.8703311","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703311","url":null,"abstract":"Many cryptographic techniques are available for serving the purpose of information security over the web, servers and local systems. However, there is always demand of more security which may not be meet by such cryptographic algorithms alone because of known security attacks and mathematical complexity. Thus visualizing the strategic combination of cryptography and steganography techniques can provide a higher level of security. Quick Response (QR) codes are used extensively due to their beneficial characteristics. It includes robustness, readability, error correction capability, large data capacity than traditional barcodes etc. Thus, in this work, we propose a 3-layered architecture for securing message sharing mechanism by using QR code image in one layer. This architecture utilizes the empirical and strategic use of cryptography and steganography techniques. The proposed system provides the higher level of security on the basis of quantitative and qualitative results. Also, we evaluate our system against the performance evaluation criteria discussed in the paper.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Item-Based Collaborative Filtering in Movie Recommendation in Real time 基于项目的实时电影推荐协同过滤
Mukesh Kumar Kharita, Atul Kumar, Pardeep Singh
{"title":"Item-Based Collaborative Filtering in Movie Recommendation in Real time","authors":"Mukesh Kumar Kharita, Atul Kumar, Pardeep Singh","doi":"10.1109/ICSCCC.2018.8703362","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703362","url":null,"abstract":"Collaborative filtering is one of the most effective and adequate technique used in recommendation. The fundamental aim of the recommendation is to provide prediction of the different items in which a user would be interested in based on their preferences. Recommendation systems based on collaborative filtering techniques are able to provide approximately accurate prediction when there is enough data. User based collaborative filtering taechniques have been very powerful and success in the past to recommend the items based on user’s preferences. But, there are also some certain challenges such as scalability and sparsity of data which increases as the number of users and items increases. In a large website, it is difficult to find the interested information in a certain time. But the recommendation system filter out information and items that are best suitable for us. Although there are different recommendation approaches, yet collaborative filtering technique is very popular because of the effectiveness. In this work, movie recommender system has been described, which basically uses item-based technique of collaborative filtering to provide the recommendations of items, which is dynamic and will learn from the positive feedback.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125588800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Predictive Analysis of Medical Data using a Hybrid Machine Learning Technique 使用混合机器学习技术的医疗数据预测分析
Pushpendra Singh Rajawat, D. Gupta, S. Rathore, Avtar Singh
{"title":"Predictive Analysis of Medical Data using a Hybrid Machine Learning Technique","authors":"Pushpendra Singh Rajawat, D. Gupta, S. Rathore, Avtar Singh","doi":"10.1109/ICSCCC.2018.8703302","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703302","url":null,"abstract":"Diabetes is a chronic disease, which affects millions of people around the world. It causes serious damage to human health and even sometimes human lives. Various research is going on in this area to reduce its negative impact. In this paper, we propose a hybrid machine learning technique to classify people into patient and healthy classes, respectively. The patient class represents people with diabetes and the healthy class represents people with no diabetes. We evaluate the proposed model against various performance measures and found that it performs better than previously used techniques. We use Pima Indian Diabetes dataset, which has 768 instances and 9 attributes. Out of 768 instances, 268 are affected and 500 are not affected by diabetes.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126459057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and Implementation of Smart Wheelchair for Quadriplegia patients using IOT 基于物联网的四肢瘫痪患者智能轮椅的设计与实现
Umang Garg, K. Ghanshala, R. Joshi, Rahul Chauhan
{"title":"Design and Implementation of Smart Wheelchair for Quadriplegia patients using IOT","authors":"Umang Garg, K. Ghanshala, R. Joshi, Rahul Chauhan","doi":"10.1109/ICSCCC.2018.8703354","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703354","url":null,"abstract":"Quadriplegia is a pathological condition identified through completely or partly paralysis of the limbs and torso. Smart wheelchair is an innovation that has an intention to create a difference for the activities of the people who are restricted by movement. This paper proposed an idea to ease those patients, who cannot perform hand movements in a way that can move a wheelchair. This paper peculiarly represents the working model of a smart wheelchair using Internet of things (IoT). Three different modes are proposed which assist the patient in free movement and information transmission to the person nearby and to the cloud. To provide movement of wheelchair in desired direction an accelerometer based hand glove is design. Patient can transmit the requirements to the nearer ones through hand gesture using RF transmission. Third mode provides the information on cloud which can be accessed by the doctor for diagnosis.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127219315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Restoration of Image from Deterioration Using Image Inpainting 使用图像修复从退化图像
Varuni Garg, Dr. Renu Dhir
{"title":"Restoration of Image from Deterioration Using Image Inpainting","authors":"Varuni Garg, Dr. Renu Dhir","doi":"10.1109/ICSCCC.2018.8703203","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703203","url":null,"abstract":"Inpainting is a technique used to reconstruct spoiled image or missing part of an image in original image in the way that look plausible according to human perception. This technique reconstructs the picture comes under inpainting. The rebuilding of damaged photos such as aged photos and films, elimination of superimposed text, elimination/replacement of not desired objects, red eye correction, image coding comes under the application of image inpainting. It is art which is used in the past years. In this paper, Convolutional Method has been used to inpaint the image. In proposed method the diffusion kernel has been modified and the number of kernel has been increased from both left and right direction and the kernels has been convolved upon the area needed to be inpaint.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132755336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensor Fusion Algorithm For Software Based Advanced Driver-Assistance Intelligent Systems 基于软件的高级驾驶员辅助智能系统传感器融合算法
P. Kaur, R. Sobti
{"title":"Sensor Fusion Algorithm For Software Based Advanced Driver-Assistance Intelligent Systems","authors":"P. Kaur, R. Sobti","doi":"10.1109/ICSCCC.2018.8703269","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703269","url":null,"abstract":"The diversity of smart and cognitively intelligent features integrated into the modern contemporary cars is rising rapidly. Intelligent cooperative driving is one of the several applications of the IOT field in which cars interact with other vehicles on road and provide a streamlined flow of traffic smartly. The main ingredients for making this technology successful are the sensing devices mounted on every vehicle. The main purpose of this paper is to discuss the safety of future autonomous vehicles which will be sharing information of impending hazards on road with other cars. The paper provides an overview of several problems, uncertainties, and inaccuracies emerging from sensor data fusion during car-to-car interaction in autonomous vehicles. The rate at which some sensors update their information is different for different sensors which lead to incorrect scene comprehension. Several survey report results are provided showing evidence of future sensor usage in the automotive market which accounts for billions of dollars. Safety in smart cars can be guaranteed if they communicate information unambiguously to nearby cars in their vicinity.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133615493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ROI and Non-ROI based Medical Image Compression Techniques: A Survey and Comparative Review 基于ROI和非ROI的医学图像压缩技术:综述和比较综述
R. Kaur, Rajneesh Rani
{"title":"ROI and Non-ROI based Medical Image Compression Techniques: A Survey and Comparative Review","authors":"R. Kaur, Rajneesh Rani","doi":"10.1109/ICSCCC.2018.8703337","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703337","url":null,"abstract":"Due to the advancement in the field of information technology, medical image processing has become the most eminent image processing field in this era. The medical image needs to be stored and transmitted for telemedicine purpose. Due to the huge size of medical images, it becomes very difficult to store and transmit it over the network. Image compression is a significant toolto reduce the redundancies and irrelevant informationof the image for efficient archival and fast transmission. The paper provides the state-of-the-art survey fornon-ROI (i.e. lossless) and ROI based (i.e. hybrid region of interest)techniques available in the area of medical image compression. The paper will provide help for researchers to understand the different techniques of medical image compression with theircomparative analysis for further research in this area.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134317597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-Layered Attack Recognition (MLAR) Model to Protect Cloud From EDOS Attacks 保护云免受dos攻击的多层攻击识别(MLAR)模型
Yashika Arora
{"title":"Multi-Layered Attack Recognition (MLAR) Model to Protect Cloud From EDOS Attacks","authors":"Yashika Arora","doi":"10.1109/ICSCCC.2018.8703328","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703328","url":null,"abstract":"In this paper, the work is carried upon the security of cloud computing environment from the economic denial of service (EDOS) attacks. The cloud computing environments have become popular in the past decade, as number of businesses has shifted their work online to the cloud. The cloud service providers offer the maximum uptime for their users, which is committed in the form of service level agreements (SLAs). The uptime is the term used to indicate the availability of the cloud computing resources for client’s application to run its processes. If at any point, the client application is not able to run its operations due to non-availability of resources, it is considered as the downtime, which is negative to the uptime and considered as SLA violation. The SLAs keep the information about the SLA violations and their settlements, which is considered as the loss of the cloud service providers. For example, the uptime of 99.99% is committed by cloud service provider, and due to any internal or external reason, achieved uptime is lower than committed value, the cloud service provider may face a penalty as per defined in the SLA, which is considered direct profit loss for the service provider. In order to reduce the financial losses due to the EDOS attacks, the proposed model is designed by combining the periodic authentication, pattern analysis and data flow control mechanisms to prevent the cloud from attacks. The proposed Multi-Layered Attack Recognition (MLAR) Model has outperformed the existing controlled access based EDOS (CA-EDOS) prevention model on the basis of resource utilization and response delay parameters.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121401530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breast Cancer Detection Through Gabor Filter Based Texture Features Using Thermograms Images 基于Gabor滤波的热像图纹理特征乳腺癌检测
A.A. Khan, A. Arora
{"title":"Breast Cancer Detection Through Gabor Filter Based Texture Features Using Thermograms Images","authors":"A.A. Khan, A. Arora","doi":"10.1109/ICSCCC.2018.8703342","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703342","url":null,"abstract":"The mortality rates in women is highest due to breast cancer among other all the cancers in developed as well as in developing countries. As evident from the facts that mortality rate of 12.7 among 1, 00, 000 in India [1] and whereas in USA, estimated deaths of 40,610 women i.e. 6.8% of all cancer deaths in 2017. Mammography is considered to be the most accepted technique for breast cancer detection. In this paper, thermography is explored as a viable alternative to the mammography. As mammography has its own drawbacks of being a painful procedure, exposure of the body to harmful Xrays. This necessitates in exploring the other modalities preferably non-contact and without using any harmful radiations. Thermography is coming out to be an alternative to the standard mammography with advantages of being noninvasive, safe, portability and cost effectiveness. The temperature pattern of the breasts changes as a result of the high increased blood flow into affected cells. This gives the way to asymmetry between normal and cancerous breast which can be detected using different techniques. In this paper, 35 normal and 35 abnormal thermograms are taken from on line DMRDatabase for Mastology Research having breast thermograms for early detection of breast cancer. The texture features of the left and right breasts are extracted using Gabor filters. The thermograms are then classified using support vector machine (SVM) based on the textural asymmetry between the breasts into normal and cancerous cases. The accuracy achieved using Gabor features and SVM classifier is 84.5% The early detection of cancer using thermography increases the survival chances of the patient considerably as it can detect the cancer in initial stages.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128819576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信