{"title":"A Key based Distributed Approach for Data Integrity and Consistency in JSON and XML(Hierarchical Data Exchange Formats)","authors":"Gaurav Goyal, K. Garg, Rupali Gill","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181305","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181305","url":null,"abstract":"The payload delivery is a challenging task as data may be corrupted anywhere by anyone in this present era. The existing standards of symmetric and asymmetric key algorithms provide confidentiality and authentication; meantime data integrity & consistency are the other two important parameters. The lightweight data like JavaScript Object Notation (JSON) and ExtensibleMarkup Language (XML) are introduced to make data access easier and faster. These objects follow the traditional method of generating digests using traditional approaches such as MD5 and Hash algorithms, but they need better treatment since they are different by nature. Message digests can be generated in a distributed fashion to achieve the highest level accuracy. This paper suggests a distributed approach for data integrity and consistency in JSON and XML and discusses the advantages of the same.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134084221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical Classifications of Side Channel Attacks, Glitch Attacks and Fault Injection Techniques: Their Countermeasures","authors":"Shaminder Kaur, Balwinder Singh, Harsimranjit Kaur","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181324","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181324","url":null,"abstract":"Cryptographic devices have many encrypted and secured solutions to protect them against attacks. Hardware engineers infuse lot of time and effort in implementing cryptographic algorithms, keeping the analysis of design constraints into consideration. Engineer's face a challenge for building resistant free embedded system against attacks called as side channel attacks. Therefore, there is a strong need to address issues related to side channel attacks. This paper is a review into the field of hardware security that will provide a deep investigation of types of side channel attacks & fault injection techniques with some real life examples further enhancing the researcher's vision to build efficient and secure systems in order to thwart attacks. Researchers will also be acquainted with some countermeasures against various attacks. Lastly, we have also discussed some future perspective that can give upcoming researchers a new domain to work on.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127658504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Survey of Machine Learning Techniques for Prediction of Parkinson's Disease","authors":"Merry Saxena, S. Ahuja","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181368","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181368","url":null,"abstract":"Prognosis and progression of Parkinson's disease is a critical question among the clinicians since there is a disparity of parameters taken into the diagnostic consideration thereby making the decision process difficult. Different datasets have been independently explored and applied through machine learning to analyze the incidence of occurrence and progression of the disease. The present paper is an updated report of the types of Supervised Machine Learning algorithms which have gained prominence within a span of last 5 years (2015- 2019). Further it highlights the use of hybrid intelligence models to improve the prediction accuracy and sensitivity over standalone methods. Conclusively the paper also emphasis on the need of development of multiparametric, big data based holistic predictive system","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116807129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Execution of Big Data Analytics in Automotive Industry using Hortonworks Sandbox","authors":"Sukhpreet Singh, G. Jagdev","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181314","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181314","url":null,"abstract":"The market landscape has undergone dramatic change because of globalization, shifting marketing conditions, cost pressure, increased competition, and volatility. Transforming the operation of businesses has been possible because of the astonishing speed at which technology has witnessed the change. The automotive industry is on the edge of a revolution. The increased customer expectations, changing ownership, self-driving vehicles and much more have led to the transformation of automobiles, applications, and services from artificial intelligence, sensors, RFID to big data analysis. Large automobiles industries have been emphasizing the collection of data to gain insight into customer's expectations, preferences, and budgets alongside competitor's policies. Statistical methods can be applied to historical data, which has been gathered from various authentic sources and can be used to identify the impact of fixed and variable marketing investments and support automakers to come up with a more effective, precise, and efficient approach to target customers. Proper analysis of supply chain data can disclose the weak links in the chain enabling to adopt timely countermeasures to minimize the adverse effects. In order to fully gain benefit from analytics, the collaboration of a detailed set of capabilities responsible for intersecting and integrating with multiple functions and teams across the business is required. The effective role played by big data analysis in the automobile industry has also been expanded in the research paper. The research paper discusses the scope and challenges of big data. The paper also elaborates on the working technology behind the concept of big data. The paper illustrates the working of MapReduce technology that executes in the back end and is responsible for performing data mining.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126117494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Capacitated Covering and Related Problems","authors":"Mong-Jen Kao","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181321","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181321","url":null,"abstract":"The Capacitated Covering Problem is a natural generalization of classical covering problems that takes quantified demand-to-supply assignment model into consideration. In recent years, this problem has received more and more attention, and a rich body of research progress has been made not only on this problem itself but also on its natural extensions and variations. In this paper we present a literature survey on the capacitated covering problem and the research progress that has been made.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126380087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrinsic Parameters based Quality Assessment of Indian OpenStreetMap Dataset using Supervised Learning Technique","authors":"Saravjeet Singh, Jaiteg Singh","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181313","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181313","url":null,"abstract":"Accuracy of the data plays a crucial role in the effective working of data-driven systems. OpenStreetMap being the source of a spatial database for many location-based services highly contributes towards their performance. OpenStreetMap is a volunteered, non-proprietary dataset so it is more vulnerable to errors and discrepancies. To use the OpenStreetMap data for location-based services, it is mandatory that data should not suffer from topological and geometrical errors. In this paper, topological errors associated with different objects in OpenStreetMap (OSM) data are detected. OSM data of Punjab and Haryana (India) has been taken as test data for finding topological errors. This study is focused on developing a framework for augmenting the topological consistency of OSM data by users. A supervised decision tree approach is presented to find the topological errors in the OSM database. The framework uses REST APIs for communication of data to and from the OSM server. The outcome of this study would certainly help the users to improve the quality of OSM data.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121661990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Risab Biswas, Avirup Basu, Abhishek Nandy, Arkaprova Deb, K. Haque, Debashree Chanda
{"title":"Drug Discovery and Drug Identification using AI","authors":"Risab Biswas, Avirup Basu, Abhishek Nandy, Arkaprova Deb, K. Haque, Debashree Chanda","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181309","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181309","url":null,"abstract":"The paper deals with identifying and creating new drugs using AI technique. We are implementing a process using Intel Open VINO toolkit for identification of drugs. With this detection technique we can identify the reactants which are added as drugs and automates the entire flow. We are using Intel OpenVINOtoolkit with custom object detection technique to train the model using the faster Region Based Convolutional Neural Network (R-CNN)method with labeled drugs (organic compounds) which act as Reactants. Using this approach, the entire drug discovery process of clinical trial for the process can be reduced to very small time of 3-4 months (which generally takes 10-12 years) and we can generate simulated drugs to see the behavior and implementation becomes faster. We are also creating a customized dataset of drugs or molecules which are used for identifying the drugs. We are using the Canonical SMILES for the molecules so we will map SMILES with organic compounds being detected.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122098808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Implementation of Face Recognition with Deep Learning based on a Container-Orchestration Platform","authors":"Winggun Wong, Cheng-Sheng Lee","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181343","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181343","url":null,"abstract":"As a lightweight alternative to a virtual machine, a container runs applications only with the necessary environmental variables, libraries, etc. Moreover, many more containers can be run on the same computer compared to traditional VMs, which take up a lot of computing resources. Currently, Docker container and Kubernetes (K8s), which is a container-orchestration platform, are very popular tools. In addition, K8s is a high availability (HA) system with many features that can provide containers to implement more applications. In this project, a face recognition application is implemented with deep learning on Kubeflow, which is a machine learning platform running on K8s. Also, the deep learning method output features instead of classifications. This method computes the distance between two images with Triplet loss function and Euclidean distance. K8s runs on the server as a private cloud, on which our face recognition application runs.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123778091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Identity Recognition and Liveness Detection System for Mobile Phones","authors":"Ding Lee, Tse-Yu Pan, Min-Chun Hu","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181332","DOIUrl":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181332","url":null,"abstract":"The rise of Fintech has produced a variety of innovative financial services. In this work, we present a system for mobile phone financial services, which can be utilized by users registering their own accounts and for accessing the created account using their own faces. In the proposed system, face recognition and landmark detection methods are used to achieve identity recognition and liveness detection tasks from face images captured by a mobile phone. However, sometimes malicious actors attempt to use a face photo of owners to illegally access their accounts. To prevent the illegal access, we further design a mechanism for users to interact with the system and acess their accounts followed by random instructions. In the experiment, the accuracy and execution time results were found to be acceptable. In addition, we further recruited subjects for the purpose of a subjective evaluation using the System Usability Scale (SUS) and the Technology Acceptance Model (TAM), and the results showed the proposed system is acceptable for use.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127947312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}