2022 7th International Conference on Computing, Communication and Security (ICCCS)最新文献

筛选
英文 中文
Industry 4.0 Application in the Hospitality and Food Service Industries 工业4.0在酒店和食品服务行业的应用
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079268
Sunil Ghildiyal, K. Joshi, Gunjan Rawat, M. Memoria, Ajay Singh, Ashulekha Gupta
{"title":"Industry 4.0 Application in the Hospitality and Food Service Industries","authors":"Sunil Ghildiyal, K. Joshi, Gunjan Rawat, M. Memoria, Ajay Singh, Ashulekha Gupta","doi":"10.1109/ICCCS55188.2022.10079268","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079268","url":null,"abstract":"The concept of digital transformation, also known as ‘‘Industry 4.0,’’ is making its way onto the agendas of businesses all over the world. The hospitality and food service industry is extremely varied and cutthroat and it is one of the service industries that is expanding at the quickest rate. This sector also has a significant amount of untapped potential for the advancement of digital techniques. This research will investigate the role that digital technique plays in the hospitality industry, as well as the business administration’s adaption to the opportunities or conceptual breakthroughs that the digital revolution suggests. As a result of the research that was carried out, the fundamental conditions that must be met to guarantee a better digital transformation and to reduce the risks associated with digital innovations in hospitality industry businesses were identified.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129224014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technology & HealthCare in the Coming Era 未来时代的科技与医疗保健
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079525
Kuenzang Lhamo, Deepa Gupta, A. Chaudhary, Anil Kumar
{"title":"Technology & HealthCare in the Coming Era","authors":"Kuenzang Lhamo, Deepa Gupta, A. Chaudhary, Anil Kumar","doi":"10.1109/ICCCS55188.2022.10079525","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079525","url":null,"abstract":"The fast-emerging technologies in this century fueled by covid19 crises has taught every stakeholder (technology giants, pharmacists, hospitals, patients etc.) a great lesson. Hospital with good healthcare system will have some of these technologies while there are least developed countries with no infrastructure and no technology. Using technology in healthcare will change the working of existing healthcare system to brighter one. This paper will portray different technology trends like Artificial Intelligence, Machine Learning, Block chain, Robotic Surgery, Smart devices, telemedicine and so on. The promises and the obstacles with impact of the technology are discussed too.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129776162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain in HRM:Application and Future Perspective 区块链在人力资源管理中的应用与未来展望
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079644
Namrata Meharwal, S. Tyagi, Rajesh Kumar, K. Joshi, Neha Rastogi, N. M. Hussien
{"title":"Blockchain in HRM:Application and Future Perspective","authors":"Namrata Meharwal, S. Tyagi, Rajesh Kumar, K. Joshi, Neha Rastogi, N. M. Hussien","doi":"10.1109/ICCCS55188.2022.10079644","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079644","url":null,"abstract":"To effectively perform some of the basic HR activities, HR professionals are equipping themselves with cutting-edge technologies. HR staff deal with some of the financial transactions with the highest volume in a business. Utilizing blockchain technology can help stop internal and external hacks of private data. We looked at articles from the Scopus and Web of Science databases that were published between 2018 and 2022. Literature review shows that as more companies suffer from data breaches, it is critical that steps be taken to prevent fraud and maintain security. Blockchain technology may be used to help a void internal and external hack of private data. For aerospace and defense firms, Lockheed Martin employs it for risk management and software security. The use of blockchain technology offers the ability to automate many manual procedures and speed up processing.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114197012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study on Exploit Development 开发开发研究
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079387
Rosy Chadha, G. S. Shalom, Vivek Kumar Anand, Agam Goel
{"title":"A Study on Exploit Development","authors":"Rosy Chadha, G. S. Shalom, Vivek Kumar Anand, Agam Goel","doi":"10.1109/ICCCS55188.2022.10079387","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079387","url":null,"abstract":"A program or collection of instructions designed to exploit the flaws in other applications is known as an exploit. Exploit development is identifying vulnerabilities in apps and software and determining how to gain control of a system; thus, exploit development is critical for the security of digital assets and sensitive data stored on computer systems. Many flaws require an attacker to launch a series of shady actions to set up an exploit. Most of the vulnerabilities occur due to faults in software or system architecture. Attackers write code to exploit these holes to infect the machine with various types of malware which is often built on the collection of exploits and can easily be hidden in plain view of different websites. The hidden code on a website may instantly identify the operating system and programs that are running on a user’s machine, as well as the user’s browser type, and check for any vulnerabilities. In today’s world, the internet is the major cause of spreading many malware, viruses, and embedded scripts. Hence our problem statement will revolve around the detection of malicious and benign URLs and thus testing them to get the type of vulnerability.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114392266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining of Microsatellites in Genomic Data Using a Hybrid Approach with Range Tree Applications 基于距离树混合方法的微卫星基因组数据挖掘
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079353
Umang, P. Bharti, Akhtar Husain
{"title":"Mining of Microsatellites in Genomic Data Using a Hybrid Approach with Range Tree Applications","authors":"Umang, P. Bharti, Akhtar Husain","doi":"10.1109/ICCCS55188.2022.10079353","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079353","url":null,"abstract":"Microsatellites are molecular markers with ubiquitous repeat patterns found in genome sequences. They are the primary source of studying interspecies variations, gene discovery, disease identification, and hypervariability in genome sequences. However, in vivo analysis of sequence data is costly and time-consuming. In addition, many next-generation sequencing tools have been developed to analyze sequence data having several new features and objectives. Therefore, researchers always need a wide range of in silico microsatellite exploring tools to examine research data apart from extracting microsatellites. This study aims to identify additional features of simple sequence repeats, such as their location in CDS, t- RNA, and rRNA regions. Also, to mark them as coding, the noncoding and coding-non-coding areas of upper bounds and lower bounds, the flanking sequences, statistics information of repeats, and other genomic features using pattern matching and computational geometry applications using range tree search algorithms. This study may help researchers retrieve and analyze the enhanced simple sequence repeats features and fill the gap for future studies and applications.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132789367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uses of Social Media and Computer Technologies for Guest Satisfaction and Recommendation Analysis using Machine Learning In Hotels Industries 社交媒体和计算机技术在酒店行业中使用机器学习进行客人满意度和推荐分析
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079660
Sagar Bhatt, Rakesh Dani, Deepanshu Girsa, R. Kuksal, K. Joshi, Ashulekha Gupta
{"title":"Uses of Social Media and Computer Technologies for Guest Satisfaction and Recommendation Analysis using Machine Learning In Hotels Industries","authors":"Sagar Bhatt, Rakesh Dani, Deepanshu Girsa, R. Kuksal, K. Joshi, Ashulekha Gupta","doi":"10.1109/ICCCS55188.2022.10079660","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079660","url":null,"abstract":"Guest loyalty has great effect on their satisfaction as well as it helps to increase the efficiency, and it leads to improved profit and sale of hotel and create positive impact on customers. Loyalty is a long-term commitment which helps to stand the business in market for a long time and make business successful. Hospitality industry is the one of the fastest and largest job generating and revenue generating industry in among all sectors. In hospitality industry, employees come with the contact with guest either in front of the house (Front Office & F& B service) or back of the house (Food Production & Housekeeping) and perform their duties in the best professional way. Customer satisfaction is one of the important objectives to sustain the guest loyalty for repetition. In this research primary data was collected and it belongs to empirical research. Data were collected from the UttrakahndGarhwal region and the major cities covered are Mansoori, Dehradun, Rishikesh and Haridwar. The findings of this study are how customer retention/loyalty relates to the recommendation to the others in addition with the overall outlets performance. The study defines the impact of the overall behavioral variables related to F& B outlets in relation to the satisfaction. The research was conducted with the help of online & offline filled questionnaires with the population size of 110. The population covered the regular travelers who have visited any of the Hotels and stayed at least for one night. The data was analyzed by using correlation, ANOVAs and T-Test. The study has reflected the Gap in constraint of the data collection and the COVID-19 Government guidelines.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128810786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Significant Impact of 5G Technology worldwide: With special reference to specific industries and Countries 5G技术对全球的重大影响:特别针对特定行业和国家
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079502
Prakash Sindhwal, Neha Rastogi, Megha Sharma, S. Tyagi, K. Joshi, Yasmin Makki Mohialden
{"title":"Significant Impact of 5G Technology worldwide: With special reference to specific industries and Countries","authors":"Prakash Sindhwal, Neha Rastogi, Megha Sharma, S. Tyagi, K. Joshi, Yasmin Makki Mohialden","doi":"10.1109/ICCCS55188.2022.10079502","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079502","url":null,"abstract":"5G address the following major period of versatile telecom morals past the impending 4G guidelines. After 1G, 2G, 3G, and 4G organizations, it is now a new global distant norm. 5G remote technology is designed to deliver multi-gigabit per second (Gbps) maximum data speeds. Pinnacle downlink throughput execution is projected to be exceedingly high with 5G. The goal of this article is to identify, systematize, and generalize major of 5G technology. In the coming years, 5G networks will be widely deployed. Farmers might use real-time data to monitor, track, and automate their agricultural operations. At home and at the stadium, sports fans could have more influence over their viewing experience. With peak performance of 20 Gbps, 5G claims to be 20 times faster than 4G.It is assisting in the transformation of a variety of Industrial Internet of Things (IIoT) applications. For the first time, new experiences such as augmented reality will become a reality. 5G technology is a fifth-generation invention with a wide range of applications. By 2026, the number of 5G cell phone users is predicted to surpass 3 billion. Many outdated gadgets will need to be replaced because they do not support 5 G.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122670843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative analysis of stock price prediction techniques 股票价格预测技术的比较分析
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079696
Kuldeep Singh, M. Thapliyal, V. Barthwal
{"title":"A comparative analysis of stock price prediction techniques","authors":"Kuldeep Singh, M. Thapliyal, V. Barthwal","doi":"10.1109/ICCCS55188.2022.10079696","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079696","url":null,"abstract":"Stock index futures are difficult to forecast due to unpredictable stock market conditions. Despite this fact, efforts are being made over the years to create an efficient forecasting tool. The current advancements in technology like machine learning and artificial intelligence have improved our performance with non-linear estimation. Here, the non-linear, RNN (Recurrence Neural Networks) -based stock index prediction model has been compared to the linear, technical indicator-based stock index prediction model. In our empirical research, ten years of day-wise close price data of Tata Consultancy Services Ltd has been used. The study explores two separate methods for predicting stock prices, each coming from a distinct specialty: In the linear model, MA (moving average) and EMA (exponential moving average) model, and the nonlinear model LSTM (long short-term memory) approach has been used. The analysis shows that when it comes to stock price prediction, the exponential moving average outperforms the LSTM.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114725924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICCCS 2022 Cover Page ICCCS 2022封面
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/icccs55188.2022.10079258
{"title":"ICCCS 2022 Cover Page","authors":"","doi":"10.1109/icccs55188.2022.10079258","DOIUrl":"https://doi.org/10.1109/icccs55188.2022.10079258","url":null,"abstract":"","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129649104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Applications in Computing Using Intuitionistic Fuzzy Set Approach 直觉模糊集方法在计算中的新应用
2022 7th International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2022-11-03 DOI: 10.1109/ICCCS55188.2022.10079512
A. Kumari, D. Kumar
{"title":"New Applications in Computing Using Intuitionistic Fuzzy Set Approach","authors":"A. Kumari, D. Kumar","doi":"10.1109/ICCCS55188.2022.10079512","DOIUrl":"https://doi.org/10.1109/ICCCS55188.2022.10079512","url":null,"abstract":"Intuitionistic fuzzy set theory plays key role for dealing with uncertainty in various mathematical problems. Intuitionistic fuzzy set handles both membership and nonmembership function during solution of real-life problem. In this paper we present the definition and operations of an intuitionistic fuzzy set. Furthermore, based on the analysis of several operations on intuitionistic fuzzy set in the study, we provide some new notions and operations. We also prove some new results based on new operations on intuitionistic fuzzy set.","PeriodicalId":149615,"journal":{"name":"2022 7th International Conference on Computing, Communication and Security (ICCCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134172472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信