2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)最新文献

筛选
英文 中文
Extracting relationship between browser history items for improved client-side analytics and recommendations 提取浏览器历史记录项之间的关系,以改进客户端分析和推荐
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007258
Goutham Reddy Kotapalle, Harish Kandala, Krishna Shravya Gade
{"title":"Extracting relationship between browser history items for improved client-side analytics and recommendations","authors":"Goutham Reddy Kotapalle, Harish Kandala, Krishna Shravya Gade","doi":"10.1109/IC3I44769.2018.9007258","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007258","url":null,"abstract":"Web browsers are one of the most used client-side software in today’s world and maintaining the details of the user’s search is one of the primary tasks of today’s browsers. However, the browsing history management methodologies that are currently used to save and visualize the details of the user’s search can be improved by a great extent to make it a lot easier for the user to browse data over the internet. The techniques used by the modern browsers in doing so are, to an extent, inefficient due to the fact that they only show a serial list of URLs the user queried for and the time at which they were queried with no details of how the user actually ended up reaching a particular page. The primary issue with such methodologies is that the browsers do not maintain the details of the relationship between various history items. This paper provides a solution to this issue with a practical implementation of a client-side browser history management extension that solves the above-mentioned problems and hence describes how the user’s browsing experience can be enhanced.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115539426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Naming of Clusters: A Novel Approach using Information Extracted from Instant Text Messages 聚类自动命名:一种利用即时文本信息提取信息的新方法
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007275
Gopa Kumar, N. Vaishnav
{"title":"Automatic Naming of Clusters: A Novel Approach using Information Extracted from Instant Text Messages","authors":"Gopa Kumar, N. Vaishnav","doi":"10.1109/IC3I44769.2018.9007275","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007275","url":null,"abstract":"Instant messages are abundant in today’s world. Typically, around 55 billion text messages are exchanged over these platforms every day. These represent a huge source of information from which useful knowledge can be mined. Instant messages are an accurate description of each user’s characteristics and interests. Right from waking up in the morning to hitting the bed at night, people share everything with their closed ones via an Instant messaging platform. These, therefore give profound insights about a person’s different interests and their preferences towards certain entities over others. In addition to being unstructured, these instant messages present new challenges in the form of shortenings, contractions, letter/number homophones, all of which require dedicated pre-processing steps. First, the characteristics of these instant messages are discussed. Subsequently, the approaches to deal with these challenges are reviewed. Second, this data is used to cluster people of similar interests together. These clusters have to be named by a domain expert in order to gain insights and the naming becomes challenging when the dimensions of the data points increases. This problem is dealt with in the next section where useful features are extracted from the clusters in order to output a unique legitimate name for each cluster. In addition, these steps are elaborated using an unknown dataset and the working of the algorithm is demonstrated on a known dataset for validation.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132822128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding out the needy one from Tweets : An analysis using #kerelafloods 从推特中找出需要帮助的人:使用#kerelafloods进行分析
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007270
R. Ranjan, H. Sarma, Navanath Saharia
{"title":"Finding out the needy one from Tweets : An analysis using #kerelafloods","authors":"R. Ranjan, H. Sarma, Navanath Saharia","doi":"10.1109/IC3I44769.2018.9007270","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007270","url":null,"abstract":"Natural disasters are difficult to predict and when it happens it is very difficult for government and other agencies to get the information about the effected people or properties. To save the life and properties first step to know where it happens and what is the current scenario of that place. To get these information social media plays a key role. In this article, we explores a detailed overview on Kerala flood situation which happened in late July 2018, severe flooding affected the Kerala very badly. In this article, we proposed a system to detection of real-time help needed to people based on different tweets related to Kerala flood. This article provided a complete detailed overview on the situation in Kerala and collects needed information through tweets as twitter is one of the best way of spreading awareness about the worsening situation in Kerala. To alleviate this problem, tweets, which are largely available,can be exploited to extract the required data.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134230993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Healthcare management using clinical decision support system 使用临床决策支持系统的医疗保健管理
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007272
Likewin Thomas, M. V. Manoj kumar, Annappa
{"title":"A Healthcare management using clinical decision support system","authors":"Likewin Thomas, M. V. Manoj kumar, Annappa","doi":"10.1109/IC3I44769.2018.9007272","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007272","url":null,"abstract":"From the literature it is studied that, most of the medical error is due to faulty healthcare system. Due to this, there is treatment delay, that leads to complications in later stages of disease progression. Medical error caused due to the failure in healthcare system can be reduced by employing an appropriate clinical decision support system (CDSS). CDSS helps in identifying the severity of disease by predicting its progression. The treatment management of gallstone disease is considered as a case study in this paper.This paper presents a CDSS with the help of machine learning for improving the treatment management. CDSS with the help of a statistical comparator, identifies an efficient tool for finding the associated risk factors. These risk factors are then used to predict the disease progression and identify the cases that may need Endoscopic Retrograde Cholangio-Pancreatography (ERCP) as the treatment progresses. The model that learns and predicts accurately is selected, using the concept of Area Under Curve (AUC). For this purpose, a Modified Cascade Neural Network (ModCNN) built upon the architecture of Cascade-Correlation Neural Network (CCNN) is proposed and tested using an ADAptive LInear NEuron (ADALINE) circuit. It’s performance is evaluated and compared with Artificial Neural Network (ANN) and CCNN.Using this prediction information, disease progression is analysed and proper treatment is initiated, thereby reducing the medical error. ModCNN showed better accuracy (96.42%) for predicting the disease progression when compared with CCNN (93.24%) and ANN (89.65%). Thus, CDSS presented here, assisted in reducing the medical error and providing better healthcare management.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115037659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Secure Authentication and Key Agreement Scheme for LTE Networks 一种增强的LTE网络安全认证与密钥协议方案
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007283
P. Panda, S. Chattopadhyay
{"title":"An Enhanced Secure Authentication and Key Agreement Scheme for LTE Networks","authors":"P. Panda, S. Chattopadhyay","doi":"10.1109/IC3I44769.2018.9007283","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007283","url":null,"abstract":"The Evolved Packet System Authentication and Key Agreement (EPS-AKA) scheme provides security in Long Term Evaluation (LTE) network. However, EPS-AKA is vulnerable to various security issues such as Denial of Service Attack (DoS), replay attack and lack of privacy protection. Moreover, it does not provide forward secrecy. To remove these security flaws, this paper aims for an Enhanced Secure Authentication and Key Agreement scheme (ES-EPS-AKA) for LTE networks based on Elliptic Curve Cryptography (ECC) technique. The proposed scheme also employs different encrypted functions and HMAC. Security analysis of the proposed ES-EPS-AKA has been analyzed and compared with EPS-AKA and other related existing protocols with respect to various security attributes. Furthermore, the performance of the ES-EPS-AKA has been evaluated and compared with existing protocols in terms of communication, storage and computational overhead. Results show that the proposed ES-EPS-AKA outperforms the existing schemes with respect to above said parameters.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114569188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Biometric Signature Authentication Scheme with RNN (BIOSIG_RNN) Machine Learning Approach 基于RNN (BIOSIG_RNN)机器学习的生物特征签名认证方案
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007284
Abhishek Jain, K. Tripathi
{"title":"Biometric Signature Authentication Scheme with RNN (BIOSIG_RNN) Machine Learning Approach","authors":"Abhishek Jain, K. Tripathi","doi":"10.1109/IC3I44769.2018.9007284","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007284","url":null,"abstract":"In healthcare cloud base management is consider as effective way for data management in health care. Health care management underlies major problem of data security. Data security increases fraudulence activity in medical, tax, and bank, insurance. Data retrieval improves data security for secure data access in medical and health care service. Hence, it is necessary to enhance the security in health care data base for password and token theft. Here, cloud based healthcare data management service, namely, HealthCloud is proposed that ensures higher level of security for e-medical data through biometric behavioral signature authentication. A novel Biometric Signature Authentication scheme is being proposed using Recurrent Neural Network (BIOsig_RNN) for secure and retrieval of data access. For collected biometric signature samples BIOsig_RNN utilizes Machine Learning framework is utilized to train the signature samples for better authentication. It uses recurrent neural network (RNN) to support the Machine Learning framework based on statistical dataset learning. Experimental analysis of proposed approach exhibits increased sensitivity and specificity rate of 0.98 and 0.95, respectively. Comparison with other state of art methods shows that the HealthCloud management system attains better performance as compared to existing methods and system.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115779489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ARM using Apriori with pretend Temporal database portioned Slant in weka tool ARM在weka工具中使用Apriori和假装时态数据库,并将其划分为倾斜
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007278
Murali Bharatham, Nagalakshmi
{"title":"ARM using Apriori with pretend Temporal database portioned Slant in weka tool","authors":"Murali Bharatham, Nagalakshmi","doi":"10.1109/IC3I44769.2018.9007278","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007278","url":null,"abstract":"Affiliation rules are the key attempting to pick the typical thing set in information in Data mining grown up set. Now ARM technique for get item rule pair in set of temporal data set. now it is partiononed approach of method to efficient time slot reduce of result pair of rule generation. It is most important things of retain pair of item set are invove pair of great solve things pair of things. So we will include arm method of things are involved to sort out the file problem of pair of rules.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123855372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of the Design Architectures of Configurable Processors for the Internet of Things 面向物联网的可配置处理器设计体系结构研究
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007256
Ishfaq Sultan, M. T. Banday
{"title":"A Study of the Design Architectures of Configurable Processors for the Internet of Things","authors":"Ishfaq Sultan, M. T. Banday","doi":"10.1109/IC3I44769.2018.9007256","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007256","url":null,"abstract":"The Internet of Things involves ubiquitous diffusion of processors consisting of small Integrated Circuits having sensing and actuation capabilities. These processors combined with embedded microprocessor core(s) are used for control, communication, and information processing. An Internet of Things processor has to meet various challenges such as low power consumption, limited battery power, limited memory space, high performance, low cost, and desired security. Besides computation and communication needs, Internet of Things applications considerably differs in the scale of interaction with the environment. Specific applications enforce additional constraints for the Internet of Things processors, such as environment invisibility, ruggedness and timing properties imposed by real-time events in the environment they are embedded. The new class of processors needs a step function enhancement in power and performance efficiency composed of strong reliability and security requirements. The processors running the Internet of Things applications must evolve to sustain the varying requirements emerging out of the new use cases in the electronics market. The configurable and extensible processors are the next generation in the processor family tree. This paper discusses the processor characteristics required for the Internet of Things applications and the possible configurations to meet the growing demands of the processor market. Some possible processor configurations required for the Internet of Things applications are discussed, and architecture of two configurable processors is also explained in detail.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129629667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analyzing Detection Avoidance of Malware by Process Hiding 基于进程隐藏的恶意软件检测规避分析
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007293
Mariya Shafat Kirmani, M. T. Banday
{"title":"Analyzing Detection Avoidance of Malware by Process Hiding","authors":"Mariya Shafat Kirmani, M. T. Banday","doi":"10.1109/IC3I44769.2018.9007293","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007293","url":null,"abstract":"The fact that any program to be executed must be loaded in random access memory makes it forensically critical and target-rich search location for evidence. Digital forensic investigation is incomplete without analyzing the physical memory. Random access memory holds the insights of a running system which constitutes the plethora of information some of which is unique to it. Among other information, random access memory holds running processes and process related information maintained in well-defined data structures. The threads spawned by specific processes also reside in this memory. With the advancement in cyber-attacks, malware tends to be memory resident that is hidden from the operating system to avoid detection via security or forensic tools. Both the user space and kernel space is exploited by hidden. This paper is focused towards analyzing the techniques used by rootkits to hide their processes in the memory achieved via hooking and Direct Kernel Object Manipulation (DKOM), the working of a rootkit and its detection. Having the active malicious processes hidden leads to incorrect results of the forensic investigation, rendering it unacceptable before court of law.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127100307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proposing a Key Escrow Mechanism for Real-Time access to End-to-End encryption systems in the Interest of Law Enforcement 为执法部门提供端到端加密系统实时访问的密钥托管机制
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2018-10-01 DOI: 10.1109/IC3I44769.2018.9007301
Pooja Bharadwaj, Harshita Pal, Bhawna Narwal
{"title":"Proposing a Key Escrow Mechanism for Real-Time access to End-to-End encryption systems in the Interest of Law Enforcement","authors":"Pooja Bharadwaj, Harshita Pal, Bhawna Narwal","doi":"10.1109/IC3I44769.2018.9007301","DOIUrl":"https://doi.org/10.1109/IC3I44769.2018.9007301","url":null,"abstract":"Since end-to-end encryption is now a prevalent in text based communication, it has become necessary to explore its flip side as well. This paper studies and analyses the working and security mechanisms of one such application, WhatsApp messenger. It also discusses the pitfalls of perfect forward secrecy and its consequences for law enforcement, which essentially hold true for any end-to-end encryption system. Lastly, a model is proposed using key escrow that tries to provide selective access to law enforcement under justified conditions. This model can be generalized to extend to other WhatsApp-like applications and implemented or enforced in the form of a guideline or regulation respectively.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126815032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信