{"title":"An Overview of Security Management in Saudi Arabia","authors":"M. Almutairi, G. Halikias, M. Yamin","doi":"10.23919/INDIACom49435.2020.9083725","DOIUrl":"https://doi.org/10.23919/INDIACom49435.2020.9083725","url":null,"abstract":"With the advancement and proliferation of technology and increasing cyber-attacks, Information security has become a critical aspect of asset protection. Cognizant of this fact, many organizations and countries like Saudi Arabia have put into place information security and enforcement policies for data security management. In this article we provide an overview of information security management in Saudi Arabia. Based on our research, we raise a number of critical concerns which should be addressed by the information security management authority in Saudi Arabia.","PeriodicalId":207958,"journal":{"name":"2020 7th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115583809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of Various Adder Architectures on 28nm CMOS Technology","authors":"Aishani Misra, S. Birla, Neha Singh","doi":"10.23919/INDIACom49435.2020.9083681","DOIUrl":"https://doi.org/10.23919/INDIACom49435.2020.9083681","url":null,"abstract":"Since miniaturization of CMOS has taken place, speed and power are the most important parameters for any circuit, like speed of an adder is a critical parameter in the overall performance of an Arithmetic Logic Unit (ALU). In order to identify the best suitable 2-bit adder in terms of speed, power dissipation, area and leakage current acomparative study of five different kinds of standard 2-bit adder architectures, Ripple Carry (RCA), Carry Look ahead (CLA), Manchester Carry Chain (MCC), Carry Select (CSL) and Kogge Stone (KSA) adders has been done in this paper.The adders are re-designed, implemented and analyzed at supply voltages ranging from 0.6 - 1 V on 28nm CMOS Technology to improve the speed and power. Simulation results for the different adders show that MCC at 0.6V is 32.4% faster than RCA and 15.6% faster than CLA. RCA having minimum transistor count has the least power dissipation and CLA gives minimum leakage current for lower supply voltages, but as the supply voltage increases MCC produces the least leakage current.","PeriodicalId":207958,"journal":{"name":"2020 7th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122900498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Gradient Descent Methods for Classification of Oranges using Deep Neural Network","authors":"Pooja Pathak, Himanshu Gangwar, A. S. Jalal","doi":"10.23919/INDIACom49435.2020.9083723","DOIUrl":"https://doi.org/10.23919/INDIACom49435.2020.9083723","url":null,"abstract":"Automatic classification of fruits is vital in packing and processing factories. In recent years many paradigms have been proposed to classify fruits from images. Gradient descent, being the backbone of most of the optimizers has been optimized frequently for fast convergence of cost function. In this paper, we have compared and analyzed the performance of the four different optimizers namely Gradient Descent, Stochastic Gradient Descent (SGD), RMSProp and Adam for the classification of oranges. The classifier with SGD with momentum=0.95 is 97.5% accurate in classifying the oranges. Different metrics precision, recall, F1 score, ROC-AUC have been evaluated which confirms the brilliance of the classifier. The trained model can now be used for classifying oranges on the production line in the processing industry.","PeriodicalId":207958,"journal":{"name":"2020 7th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130450363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining Comprehensible Classification Rules with Metaheuristic Strategy: AntMiner","authors":"Bhawna Jyoti, A. Sharma","doi":"10.23919/INDIACom49435.2020.9083683","DOIUrl":"https://doi.org/10.23919/INDIACom49435.2020.9083683","url":null,"abstract":"In mining, classification rules from knowledge-based discovery and expert systems. Nature-inspired algorithms are gaining popularity these days due to their metaheuristic approach used in discovering classification models in the sphere of data-mining. This paper explores an experimental study on six datasets by implementing AntMiner. Simulation study is carried out by comparing AntMiner with existing rule creation algorithmic strategies (JRIP and PART). NP-test are conducted for evaluating the performance measures of various algorithms in mining rules of classifiers and leads to the fact that cAntMiner-2 as well as cAntminer-PBoutperform over JRIP and PART algorithms.","PeriodicalId":207958,"journal":{"name":"2020 7th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132905392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 7th International Conference on Computing for Sustainable Global Development (INDIACom)","authors":"","doi":"10.23919/INDIACom49435.2020.9083688","DOIUrl":"https://doi.org/10.23919/INDIACom49435.2020.9083688","url":null,"abstract":"Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Operations Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved.","PeriodicalId":207958,"journal":{"name":"2020 7th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129613521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Shetty, K. Saravana, M. K. Vikas Vinugna, B. N. Murthy, Seema Patil, P. Sharan
{"title":"Quantum Dot Cellular Automata Based RBG to Gray Scale Conversion in Bio-Medical Applications","authors":"K. Shetty, K. Saravana, M. K. Vikas Vinugna, B. N. Murthy, Seema Patil, P. Sharan","doi":"10.23919/INDIACom49435.2020.9083702","DOIUrl":"https://doi.org/10.23919/INDIACom49435.2020.9083702","url":null,"abstract":"In nano-technology, Quantum dot is a new technology that has recently become one among the most prominent research areas that has the caliber of getting applied in construction of computers in near future. This paper includes additional features of achieving easiness in processing, deriving the features, compressing and storing the discrete images using reversible logic technique in Quantum dot Cellular Automata, over the translation of color space method. Additionally, we are employing the method of aggregation of color stream. The complete circuit is implemented in Quantum Dot Cellular Automata to reduce power dissipation and cell area. Further analysis has been done for delay and simulation time of each of the computing elements involved in the development of architecture of reversible full summer. The standard full summer is a core aspect of the design of aggregation of color stream architecture. This paper focuses on development of new logical circuits for some of the reversible gates that are needed to build a reversible summer. The designs that are being proposed in this paper are very unique, novel and efficient with its associated output waveforms. By using reversible gates, an effective reversible summer can be developed whose circuit diagram is discussed in the lower section. It is a well-known fact that reversible logic can be deployed to reduce the power dissipation and cell area, hence modelling and simulation has been done with reversible logic in QCA Designer. It has been observed that cell area of each computing element in the full summer is approximately 0.05µm2 which is very less and will ultimately lead to design of low power VLSI for fabrication. Also, it has been noticed that the average simulation time is 1000ms. This can be applicable in biomedical field to allow real time tissue imaging(bio-imaging), diagnosis, single molecule samples, and drug delivery among many otherfields.","PeriodicalId":207958,"journal":{"name":"2020 7th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126533749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Size and its Impact for Feature Creation in Transfer Learning using Neural Networks","authors":"S. Roy, Rajashekar Patil","doi":"10.23919/INDIACom49435.2020.9083690","DOIUrl":"https://doi.org/10.23919/INDIACom49435.2020.9083690","url":null,"abstract":"In this paper, it's looked upon how the two data set one of which is base data and the other is target data and by varying the sizes of these two data sets and using the transfer learning in neural networks, labeling of data is costly and time consuming, and the series of labeled instance are generally very small. It is a proposed variety of steps on how the source dataset and target dataset mapping play a crucial role in transfer learning scenarios where each scenario has its own effects. By either training, a target of classes from start or keeping the layers whichever is available within the network, for the Places 205 dataset and ImageNet and their subsequent scale down version of the datasets. By indicating how each scenario is differently supported the info size for Similar and Different datasets or Small and bigger categories where we freeze the weights for the first few layers of the network provide a good fit on the target set classes.","PeriodicalId":207958,"journal":{"name":"2020 7th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133042269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Development of User-Friendly Interface Environment for Accelerating Scientific Research Process: A Case Study for Nuclear Fusion Applications","authors":"D. Aggarwal, Ankit V. Shingala","doi":"10.23919/INDIACom49435.2020.9083729","DOIUrl":"https://doi.org/10.23919/INDIACom49435.2020.9083729","url":null,"abstract":"The integration of modern computational tools with legacy scientific applications is an ongoing process to preserve the efforts of scientists put in developing such applications while enhancing and extending their functionalities. This paper introduces the design and development of interface environment using a modern Python programming language for accelerating the standard operating procedure for scientific legacy codes developed mostly based on FORTRAN language. A methodology has been proposed which accelerates the scientific research process followed in nuclear fusion community applications. For the validation of the proposed methodology, a standalone graphical interface viz. ANISolve for 1-D Radiation Transport Code ANISN has been developed by coupling of the source code with its pre and post-processing tasks. ANISolve accelerates the setup and evaluation procedure followed in radiation transport calculations and provides a user-friendly environment for the experienced as well as novice users. Apart from legacy applications, the developed interface environment have also been used for ACTYS, a recently developed activation analysis code, to develop a user-friendly standalone interface viz. UI-ACTYS. UI-ACTYS helps in setting up the problem for performing the activation calculations and can be further enhanced for output visualization.","PeriodicalId":207958,"journal":{"name":"2020 7th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125042136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things for Military Applications","authors":"Lalita Mishra, Vikash, S. Varma","doi":"10.23919/indiacom49435.2020.9083730","DOIUrl":"https://doi.org/10.23919/indiacom49435.2020.9083730","url":null,"abstract":"The main purpose of IoT technology is to connect the real world to the virtual world with anytime-anywhere connectivity. IoT is trying to generate a world of living beings along with physical objects together with virtual data and the environment. So that everything can interact with each other. An immense number of devices are used and thus an ample amount of data is generated on an everyday basis. Further, IoT is sending this generated data to the designated place without hampering the security constraints. In this paper, the applications of IoT technology in defense are the key concern. Further, we will discuss the use of IoT in Object tracking, health care monitoring, underwater & underground monitoring, drone-based monitoring, digital forensic environment, etc, as a defense perspective. Further, we will discuss how can we use edge devices and edge technology for the collection of data in the military domain and how can we use those collected data to make our defense system more secure and robust.","PeriodicalId":207958,"journal":{"name":"2020 7th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129810955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sonekar, Madhuri Pal, Milind Tote, Supriya S. Sawwashere, Sonali Zunke
{"title":"Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks","authors":"S. Sonekar, Madhuri Pal, Milind Tote, Supriya S. Sawwashere, Sonali Zunke","doi":"10.23919/INDIACom49435.2020.9083710","DOIUrl":"https://doi.org/10.23919/INDIACom49435.2020.9083710","url":null,"abstract":"The wireless technology has knocked the door of tremendous usage and popularity in the last few years along with a high growth rate for new applications in the networking domain. Mobile Ad hoc Networks (MANETs) is solitary most appealing, alluring and challenging field where in the participating nodes do not require any active, existing and centralized system or rigid infrastructure for execution purpose and thus nodes have the moving capability on arbitrary basis. Radio range nodes directly communicate with each other through the wireless links whereas outside range nodes uses relay principle for communication. Though it is a rigid infrastructure less environment and has high growth rate but security is a major concern and becomes vital part of providing hostile free environment for communication. The MANET imposes several prominent challenges such as limited energy reserve, resource constraints, highly dynamic topology, sharing of wireless medium, energy inefficiency, recharging of the batteries etc. These challenges bound to make MANET more susceptible, more close to attacks and weak unlike the wired line networks. Theresearch paperismainly focused on two aspects, one is computation termination of cluster head algorithm and another is use of finite state machine for attacks identification.","PeriodicalId":207958,"journal":{"name":"2020 7th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130237217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}