2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)最新文献

筛选
英文 中文
A theoretical workflow for the verification of embedded threats on mobile devices 在移动设备上验证嵌入式威胁的理论工作流程
Michelle Ann Joseph, S. Philip, Bryan Miranada, Amol Deshmukh, Nrashant Singh
{"title":"A theoretical workflow for the verification of embedded threats on mobile devices","authors":"Michelle Ann Joseph, S. Philip, Bryan Miranada, Amol Deshmukh, Nrashant Singh","doi":"10.1109/ICCAKM50778.2021.9357707","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357707","url":null,"abstract":"Mobile phones are a big part of today's life. However, these mobile phones are not built for data security and privacy, making them a common communication monitoring device. Communication monitoring is the control of the mobile device performance and data on hard drives or the transmission of data over networks such as the internet. This surveillance is often hidden and may be carried out by government, organizations or criminals. Digital forensics is the application of knowledge and expertise to legally extract information from any physical gadget, such as computers and smartphones. The purpose of this study was to propose a mobile forensic workflow for detecting and analyzing embedded threats that can be used as a surveillance tool at various levels of a mobile device.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124892962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Hindi Mnemonics for generating private keys used in Hierarchical Deterministic wallets 开发用于生成分层确定性钱包中使用的私钥的印地语助记符
R. Kanday, Ranbir Singh Batth
{"title":"Development of Hindi Mnemonics for generating private keys used in Hierarchical Deterministic wallets","authors":"R. Kanday, Ranbir Singh Batth","doi":"10.1109/ICCAKM50778.2021.9357729","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357729","url":null,"abstract":"In the cryptography the most important part is the security of the wallet. The wallets are secured till date by some alphanumeric private keys. The generation of the private keys are playing most important role in the security of the whole system which is directly proportional to password security. Therefore the security of the password and also the usability of the password is the main concern for all the administrators. Several strategies are analyzed for password formation. In this research work we proposed a novel technology of using Hindi words for the development of the security keys makes them more strong as binary function works on Hindi dictionary are very few common. In this certain sets of algorithm has been developed for the selection of the Hindi words, their character length and there way of representation. This article introduced a technique of the words to be selected that will be used in future for the development of private keys and makes wallets more secure system. Hindi mnemonics aides joins the request for composing strokes of letters with secret phrase age to assist clients with making protected and essential passwords.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"123 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129525483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integration of Artificial Intelligence into software reuse: An overview of Software Intelligence 人工智能与软件重用的集成:软件智能概述
A. Sandhu, Ranbir Singh Batth
{"title":"Integration of Artificial Intelligence into software reuse: An overview of Software Intelligence","authors":"A. Sandhu, Ranbir Singh Batth","doi":"10.1109/iccakm50778.2021.9357738","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357738","url":null,"abstract":"Software reuse not only reduces time-to-market but also improve productivity and reliability of the software. Developers can take the benefits of reusable modules of the software by simply accessing the software repository. To create these repositories Data Mining techniques are used and later to predict the reusability factor of the modules Artificial Intelligence comes into light. This integration of Data Mining with Artificial Intelligence to perform software engineering task is termed as software Intelligence. This paper provides a roadmap of conventional reuse approaches to Software Intelligence approaches. Intense survey is conducted on various Artificial Intelligence algorithms applied to measure reusability of the extracted component. From the survey it is concluded that Components Based Development fits best for modern applications as it supports object-oriented paradigm. Besides, the existing Artificial intelligence approaches lack is efficient prediction of reusable module.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127137359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analyzing COVID-19 Dataset through Data Mining Tool “Orange” 利用数据挖掘工具“Orange”分析COVID-19数据集
Uzma Thange, V. Shukla, Ritu Punhani, W. Grobbelaar
{"title":"Analyzing COVID-19 Dataset through Data Mining Tool “Orange”","authors":"Uzma Thange, V. Shukla, Ritu Punhani, W. Grobbelaar","doi":"10.1109/ICCAKM50778.2021.9357754","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357754","url":null,"abstract":"Data mining is comprehended as a procedure used to get important data from any more extensive cluster of raw data. It infers assessment of data designs in huge data sets utilizing at least one or more applications. Data mining has applications in various fields, for instance science and research. Associations can improve client connections as a use of data mining and execute systems identified with different business capacities and thus upgrade business in an increasingly ideal and compelling way. This encourages organizations draw nearer to arriving at their objectives and to settle on smarter decisions as well. Orange is segment based visual programming for data mining, Artificial Intelligence, and data examination. Work forms are made by interfacing predefined or customer organized parts called widgets. They read the data, process it, envision it, and do gathering, collect prescient models, and so on. Towards the start of December 2019, an erupt of coronavirus contamination 2019 (COVID-19), brought by a new critical intense respiratory issue coronavirus 2 transpired in Wuhan City, Hubei Province, China. On January 30, 2020 the World Health Organization announced the scene as a Public Health Emergency of International Concern. Several episodes forecast models for COVID-19 are being utilized by authorities internationally to settle on instructed decisions and authorize applicable precaution measures. Amidst the standard models for COVID-19 worldwide pandemic expectation, basic epidemiological and authentic models have gotten more consideration by specialists, and they are notable in the media. In this paper, we have taken COVID-19 dataset (downloaded June 2020) from Kaggle, related to India, and with the help of ORANGE tool we have visually represented to understand how certain relations can be depicted.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131331310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Monetizing Personal Brand for Business Success, Financial Security and Career Longevity- Sentiment Analysis in COVID 19 Era 将个人品牌货币化以实现商业成功、财务安全和职业寿命——COVID - 19时代的情绪分析
Navleen Kaur, Supriya Lamba Sahdev, Gurinder Singh, Nisha Tokas
{"title":"Monetizing Personal Brand for Business Success, Financial Security and Career Longevity- Sentiment Analysis in COVID 19 Era","authors":"Navleen Kaur, Supriya Lamba Sahdev, Gurinder Singh, Nisha Tokas","doi":"10.1109/iccakm50778.2021.9357744","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357744","url":null,"abstract":"Live the way you want to be remembered. Jeff Bezos founder of Amazon have very rightly quoted “Your brand is what people say about you when you're not in the room.” It is your reputation, how people feel about you. Though branding has been very popular since times immemorial and has always been associated with businesses, but personal branding has become fundamental with the arrival of social media and gig economy. There has been drastic cultural shift from shyness to look-at-me attitude. If you are not branding yourself, be assured that others would be doing that for you. The power of personal branding improves likelihood of career attainment. Individuals reach pinnacles of success when they find ways to continually grow and improve their brand. This paper discusses about the need of personal branding in the present scenario and focusses on the practical ways one can use to build his or her personal brand. It throws light on how personal branding leads to business success, financial security and business longevity. The tool is used sentiment analysis1 to see how strong brands of famous personalities are based on social media posts.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131659871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sales Forecast of Manufacturing Companies using Machine Learning navigating the Pandemic like COVID-19 利用机器学习应对COVID-19等大流行的制造企业销售预测
Prabhat Sharma, Shreyansh Khater, Vasudha Vashisht
{"title":"Sales Forecast of Manufacturing Companies using Machine Learning navigating the Pandemic like COVID-19","authors":"Prabhat Sharma, Shreyansh Khater, Vasudha Vashisht","doi":"10.1109/iccakm50778.2021.9357751","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357751","url":null,"abstract":"This project is all about prediction of turnover of a company using machine learning. From this machine learning model, it can easily predict the next outcome in terms of turnover or whichever is equivalent to it. Future result prediction is very helpful for better understanding of market trends and stocks by using simple machine learning techniques. For this particular project, an Indian automobile industry has been selected for car sales prediction in the era of covid-19. This project shows, in the tough time of covid-19, if every other thing remains constant, what will be the sales trend for various automobile companies. will the graph go downwards or upwards? By using various machine learning techniques, it can predict the trend of graphs and in this project, it has been tried to show like this.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126366685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
End-to-End Elimination of Traffic Elimination Using Self-Adaptive Prediction Model in Cloud 云环境中基于自适应预测模型的端到端流量消除
K. Umamaheswari, M. Sivaram, V. Manikandan, K. Batri, P. Saranya, V. Porkodi
{"title":"End-to-End Elimination of Traffic Elimination Using Self-Adaptive Prediction Model in Cloud","authors":"K. Umamaheswari, M. Sivaram, V. Manikandan, K. Batri, P. Saranya, V. Porkodi","doi":"10.1109/ICCAKM50778.2021.9357700","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357700","url":null,"abstract":"In recent advancement in cloud computing, Traffic Redundancy Elimination (TRE) offers an effective solution to reduce the bandwidth cost. It is found that both short-term and long term data redundancy tends to appear in the network traffic and the TRE - trace driven approach captures both the data traffic redundancy. In this paper, we hence improve the design of a cooperative end-to-end TRE solution in order to improve the process of detection and removal of data redundancy between multiple layers, where the operations between them is in cooperative manner. The proposed method uses a self-adaptive prediction algorithm to increase the efficiency of TRE in multi-layer design that uses hit ratio of predictions to adjust dynamically the prediction window size. The experiment evaluation shows that proposed method reduces the operational cost in terms of reduced energy and makespan through proper scheduling.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127565436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quicker Sort Algorithm: Upgrading time complexity of Quick Sort to Linear Logarithmic 快速排序算法:将快速排序的时间复杂度提升到线性对数
S. Budhani, Naveen Tewari, Mukesh Joshi, Kshitij Kala
{"title":"Quicker Sort Algorithm: Upgrading time complexity of Quick Sort to Linear Logarithmic","authors":"S. Budhani, Naveen Tewari, Mukesh Joshi, Kshitij Kala","doi":"10.1109/iccakm50778.2021.9357725","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357725","url":null,"abstract":"Quick Sort is a famous algorithm. It was the fastest algorithm at one point in time. However, sometimes it can give polynomial time complexity. The only thing that is important in this algorithm is the selection of Pivot Element. In this paper, we proposed a new algorithm, which is based on Quick Sort, and through our testing, we conclude that this algorithm is giving good results for small as well as large data sets.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133885258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geo-SID: A new Geocast Safety Information Dissemination protocol in VANET for urban areas Geo-SID:一种新的城市地区VANET地球广播安全信息发布协议
Oussama Senouci, Z. Aliouat, S. Harous
{"title":"Geo-SID: A new Geocast Safety Information Dissemination protocol in VANET for urban areas","authors":"Oussama Senouci, Z. Aliouat, S. Harous","doi":"10.1109/iccakm50778.2021.9357723","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357723","url":null,"abstract":"Recently, many researches on Vehicular Ad Hoc Networks (VANETs) have been performed because of the many related applications. Data dissemination is among the challenging issues face by these kinds of networks to overcome several problems, such as broadcast storm, and network fragmentation. In this respect, the present work proposes a new Geocast-based Safety Information Dissemination protocol for VANETs, called Geo-SID. The proposed protocol is used for dissemination of safety information in a V2V scenario. It is specifically designed and suitable for an urban environment. The main goal of Geo-SID scheme is to perform the safety information dissemination process within a Zone of Relevance (ZoR) and without using the Zone of Forwarding (ZoF) similar to existing dissemination protocols in the literature. Furthermore, our solution aims to eliminate the broadcast storm problem by avoiding irrelevant alert messages and providing an efficient safety data dissemination across a ZoR area by extending the coverage area, reducing the network overhead and improving the latency. We simulate our proposed protocol using network simulator NS-3 and SUMO environment. Our proposed protocol outperforms similar protocols available in the literature based on the obtained simulation results.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"488 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115880702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Single sink position in wireless sensor networks 无线传感器网络中的单sink位置
Deghima Manel, Lemia Louail, S. Harous
{"title":"Single sink position in wireless sensor networks","authors":"Deghima Manel, Lemia Louail, S. Harous","doi":"10.1109/ICCAKM50778.2021.9357762","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357762","url":null,"abstract":"In a wireless sensor network, the sensor nodes collect information from the environment where they are deployed and send it to the base station, also called the sink, to be delivered to the end user. Many metrics such as the latency of communications and the energy consumption can be affected by the position of the sink. This position should be found before exploiting the network and routing information. In this paper, we propose two sink placement techniques in a wireless sensor network using the position of the other nodes in the network in order to minimize the latency of communication and the energy consumption. The computed position of the sink is as close as possible to every node of the network. Simulation results show that the average latency of communication and the average energy consumption of both proposed sink placement techniques are better than similar works existing in the literature.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130079189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信