2021 4th International Conference on Computing and Communications Technologies (ICCCT)最新文献

筛选
英文 中文
Enhanced Ransomware Detection Techniques using Machine Learning Algorithms 使用机器学习算法的增强勒索软件检测技术
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711906
G. Usha, P. Madhavan, Meenalosini Vimal Cruz, N. A. S. Vinoth, Veena, Maria Nancy
{"title":"Enhanced Ransomware Detection Techniques using Machine Learning Algorithms","authors":"G. Usha, P. Madhavan, Meenalosini Vimal Cruz, N. A. S. Vinoth, Veena, Maria Nancy","doi":"10.1109/ICCCT53315.2021.9711906","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711906","url":null,"abstract":"A challenge that governments, enterprises as well as individuals are constantly facing is the growing threat of ransomware attacks. Ransomware is a type of malware that encrypts the user's files and then demands a huge sum of money from the user. This increasing complexity calls for more advancement and innovative ideas in defensive strategies used to tackle the problems. In this paper, firstly we discuss the existing research in the field of ransomware detection techniques and their shortcomings. Secondly, a juxtaposed study on various machine learning algorithms to detect ransomware attacks is compared for ransomware dataset. Thirdly, various behavioral data such as API Calls, Target files, Registry Operations, Signature, Network Accesses are collected for each ransomware and benign sample and the results are compared for various attributes to understand the behavior of the attack. In order to understand the behavior of the attack various Machine Learning Algorithms like KNN, Naïve Bayes, Random Forest, Decision Trees are used for training and testing the dataset.. Further optimization was done using hyper parameters to control the learning process. Finally, we have used the model(s) Accuracy, F1 Score, Precision and Recall to compare the results observed and suggesting how the roadmap for how efficiently the attacks can be prevented in future.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131964985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Virtual Midwife for Pregnant Women and Alert System 孕妇虚拟助产士及警报系统
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711892
Roshni Ramprabhu, Shalini Suresh, K. Latha, D. Venkatesh
{"title":"Virtual Midwife for Pregnant Women and Alert System","authors":"Roshni Ramprabhu, Shalini Suresh, K. Latha, D. Venkatesh","doi":"10.1109/ICCCT53315.2021.9711892","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711892","url":null,"abstract":"All over the world almost all maternal death occurs in developing countries. Everyday nearly 830 women die due to pregnancy. In Many of the developed and developing countries, medical systems are not concentrating on sharing information. When we see pregnant women in urban and rural areas, rural circle women face higher rates of problems after and during labor than the women in urban cities. Many pregnant ladies may not be able to do their regular check-ups in the first stage pregnancy and this leads to higher rates of deaths (infants and mothers). Thus, our project aims in developing a compact device to assist and alert system by which the measured parameters from the sensors are transmitted through IOT and it is displayed in the smart phone for personalized care. Each patient will be able to choose their own midwife or nurse or medical staffs and are taken special care during Pregnancy with the help of our device.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131212344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrated Web Application for Skill Development and Job Application 集成的Web应用程序的技能开发和工作申请
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711801
S. Sakthy, G. Macriga, J.Aruna Jasmine, V. V. Babu, N. M. Sayhanuddin
{"title":"Integrated Web Application for Skill Development and Job Application","authors":"S. Sakthy, G. Macriga, J.Aruna Jasmine, V. V. Babu, N. M. Sayhanuddin","doi":"10.1109/ICCCT53315.2021.9711801","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711801","url":null,"abstract":"Does everyone get their job at first attempt? And Is it possible to get the job without any Skills, Training and Assistance? We have a web portal as a solution. The aim of our web portal is the automation of conventional training and job placement work to manage users and company details and provide necessary assistance to the user. The existing system is that there are separate websites available for job application and skill development. But we are doing it combined with many extra features. The proposed solution is that our website has two modules. Skill development and job application. Skill development modules contains a separate login for every user. User need to update their resume details along with their profile photo. Top courses and Study materials will be provided to the users, based on the department. Essential guidelines & suggestions given by the existing users. Users can improve their skills by taking the quizzes. In job application portal, every company will have a separate login to our web application. Users can apply for a job in any company given in our website. After registration, user will get an automated acknowledgement message from our website. After analyzing the resume of the user, the company can decide to invite or reject the user, by sending automated message. News feed and Announcement regarding companies will be provided in our website. Technologies used are HTML, CSS, BOOTSTRAP, JAVASCRIPT, AJAX, PHP, MYSQL DB, API KEY (Message System). Some of the features are User Details are Protected By using encryption technique. Automated message services and chatbot will be implemented for the users.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"510 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132592821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Analysis on Mobile Payment Technology with Reference to Users’ Behaviour of Retail Goods in India 基于印度零售商品用户行为的移动支付技术数据分析
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711823
K. Maran, P. Priyadarshini, Leena Jenifa, C. Senthilnathan, P. Venkatesh
{"title":"Data Analysis on Mobile Payment Technology with Reference to Users’ Behaviour of Retail Goods in India","authors":"K. Maran, P. Priyadarshini, Leena Jenifa, C. Senthilnathan, P. Venkatesh","doi":"10.1109/ICCCT53315.2021.9711823","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711823","url":null,"abstract":"In the present day to day life there is huge importance of retail goods and a major source of revenue for the industries. There is tremendous increase in the change in technology and advancement in the purchase of smart mobile leads to change in the buying scenario of the market and many digital mobile payment applications emerges in the market and makes it more competitive. The growth of technology has created changes in walk of every one life and has an impact on the way we work, shop and interact with people. The interface of technological advancement and rapid growth in the internet has resulted in more stay at home and stepping out only for buying essentials. After the demonetisation by the government and advancement in the digital technology makes the people indulged in mobile payment and shopping pattern has been shifted to mobile payments. The world of digitisation has boomed up and it has brought notable modification in consumer purchase behaviour. The advancement in technology has created transformation in consumer behavioural pattern. This paper attempts to study the consumer propensity towards mobile payment for the purchase of retail goods.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure E-Governance System To Preserve Justice And Right Decision Making Using Cloud Computing 使用云计算的安全电子政务系统维护正义和正确决策
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711821
S. Gomathi, Delphia. I, J. Vijayalakshmi
{"title":"Secure E-Governance System To Preserve Justice And Right Decision Making Using Cloud Computing","authors":"S. Gomathi, Delphia. I, J. Vijayalakshmi","doi":"10.1109/ICCCT53315.2021.9711821","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711821","url":null,"abstract":"Nowadays in several criminal cases the progress makes us to think whether justice persists. In existing system, many news, and articles state that the victim data is manipulated, and records are changed by the officials. To address this issue, this paper proposes a secure system rendering justice with transparency which makes the court decision making easy. In the proposed Justice Secure Model, the victim voice data and records are prevented from data tampering using security policies. The criminal voice data are transformed into text using Hidden Markov Model (HMM). The voice data and records are secured by encrypting using Secured Hash Algorithm (SHA 256). To validate the access request, each victim records are embedded with private key. These private keys are securely transmitted by encrypting using modified AES algorithm. The above steps would avoid the internal data tampering and manipulating the victim case data. To address the external intrusion, our proposed methodology detects and prevent SQL injection attacks. Finally, to provide security of data at the server level, we have integrated multiple cloud storage system. The proposed system provide security at the application and server levels, thus making the unauthorized data access, intrusion, and data manipulation impossible.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128159250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Machine Transliteration Of Indian Languages 印度语言的神经机器音译
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711806
Aryan Singh, Jhalak Bansal
{"title":"Neural Machine Transliteration Of Indian Languages","authors":"Aryan Singh, Jhalak Bansal","doi":"10.1109/ICCCT53315.2021.9711806","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711806","url":null,"abstract":"Transliteration is a task of converting one language written in a foreign script to its written form in native script. It's not only important to understand the written form of language for transliteration but also the sound associated with the written words of the language. Hindi and Punjabi are two of the most widely spoken languages in the world with a combined base of around 500 million speakers. While English is widely understood now, regional languages remain the mainstay for spoken and written conversation. Most of the modern devices still come with English keyboards which makes it very difficult to express in regional languages. This research is aimed at developing a scalable and universal architecture that gives state of the art results for the transliteration of Hindi and Punjabi languages. It explores different heuristics in sequence to sequence modelling, attention and transformer networks to determine the best suited architecture for transliteration of Indian languages. Out of these variants, character/grapheme level bi-directional encoder and auto-regressive decoder model proved to be best-performing architecture and gave the state of the art results for both transliteration and back transliteration tasks with SOTA BLEU score of 0.88 on Punjabi and 0.97 on Hindi.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121326726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Disease of Tomato Plant Based on Convolution Neural Network 基于卷积神经网络的番茄病害检测
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711847
P. Ramkumar, Anitha Ruth J, U. R, V. R, Venkatesh D
{"title":"Detection of Disease of Tomato Plant Based on Convolution Neural Network","authors":"P. Ramkumar, Anitha Ruth J, U. R, V. R, Venkatesh D","doi":"10.1109/ICCCT53315.2021.9711847","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711847","url":null,"abstract":"At present, Agriculture is an important for a human to fulfill their livelihoods. In that sector, one of the major problems is plant diseases. Most of the plant diseases are caused by fungus, viruses, bacteria, etc. The farmers may not have an idea about the root causes of these diseases. So it is essential to detect various diseases on plant and to prevent that kind of diseases. It is impossible to find out the diseases of plant manually. It needs splendid effort, to expertise in the plant diseases and also require excessive amount of processing time. This paper discussed the methods used for the identification of plant diseases with the help of leaves images and also discussed detection of diseases using convolution neural network algorithm.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121374952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trust Aware Behavioral Based Intrusion Detection in Cloud Environment Using Ensemble Service Centric Featured Neural Network 基于集成服务中心特征神经网络的云环境下信任感知行为入侵检测
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711827
Naeem Ahmed, R. Vijaya Durga
{"title":"A Trust Aware Behavioral Based Intrusion Detection in Cloud Environment Using Ensemble Service Centric Featured Neural Network","authors":"Naeem Ahmed, R. Vijaya Durga","doi":"10.1109/ICCCT53315.2021.9711827","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711827","url":null,"abstract":"The modern environment development comes under internet of service access for various purpose for doing communication. The cloud centric services are distributed to the user by access via the network. By the nature of communication be affected by various intrusion by accessing the services during wrongly manner by the intruders. The Advance Intrusion Detection System (AIDS) make effective monitoring by accessing the user service log to find the intrusion, but the prediction was not produce accuracy because of dimensionality features affect the identification of user behavior. To resolve this problem, we propose a Trust Aware Behavioral based Intrusion detection System (TABIS) to predict the user behavioral features related to malicious activity during the service of access. The system monitors the activity of the User Service Access Rate (USAR) to estimate the Trust Factor Rate (TFR). The features are selected based on mutual activity using Ensemble Service Centric Feature Selection (ESCFS) by accessing the service logs to choose the relative features. Based on the estimated trust factor weighting the features are selected and trained into Sigmoid Recurrent Neural Network (SRNN) to classifying the risk of evaluation in intrusion by class by category. The proposed system produce high intrusion detection rate as well produce best precision, recall, classification accuracy than any other methods.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126232505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure Trust-Based Routing Framework for Improving the QoS of Internet of Things Based Networks 一种提高物联网网络QoS的安全可信路由框架
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711865
Anjum Sheikh, Sunil Kumar, Asha Ambhaikar
{"title":"A Secure Trust-Based Routing Framework for Improving the QoS of Internet of Things Based Networks","authors":"Anjum Sheikh, Sunil Kumar, Asha Ambhaikar","doi":"10.1109/ICCCT53315.2021.9711865","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711865","url":null,"abstract":"QoS parameters play an important role in determining the efficiency of an IoT network. At the same time while working with IoT users are concerned about data security. Although many efforts have been made by organizations to address IoT security issues, it has been observed that security practices affect QoS parameters. Sometimes it is difficult to maintain good QoS values and data security at the same time. In this paper, we use the Secure Trust-Based Routing (STBR) algorithm to develop QoS parameters for the IoT network. Changes in rates of delays, power consumption, power input, packet delivery rate, and jitter were studied in three different cases involving a secure network, with sidechains and the use of sidechains and TBR. The effectiveness of various network conditions has been tested to determine the capacity of the network in resisting various types of attacks without affecting the QoS parameters. The results show that using TBR over a secure network helps to manage QoS values without compromising their security.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust and Rapid Fabric Defect Detection Using EGNet 基于EGNet的织物缺陷鲁棒快速检测
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711875
K. Sudha, P. Sujatha
{"title":"Robust and Rapid Fabric Defect Detection Using EGNet","authors":"K. Sudha, P. Sujatha","doi":"10.1109/ICCCT53315.2021.9711875","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711875","url":null,"abstract":"The quality of the fabric item is considered as one of the most significant concentrations in the textile industry. Convolutional Neural Network has shown commendable execution of fabric defect identification with computer vision and image handling. In this paper, we have implemented a Reformed Convolution Neural Network architecture known as ‘EGNet’ for fabric defect detection. The model has trained on the Cotton Incorporated dataset with 70% data as training and 30% as validation dataset. The model consists of 22 layers of Convolutional layer and Pooling Layer one after the other. The recognition of fabric faults using EGNet is executed utilizing load image dataset, load EGNet, replace final layers, network training, classify validation images. The EGNet is optimized using stochastic gradient descent with momentum. Data augmentation and max-pooling techniques are used to reduce the network's overfitting issue. To infer the significance of EGNet, comparative analysis is done with AlexNet and the result shows that EGNet architecture exposes the fabric defects in 23 seconds of elapsed time and with 100 percent of accuracy.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114713525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信