{"title":"Design of an Early Warning Intelligent Model for Enterprise Industrial and Commercial Crisis based on Multi-Dimensional Computing Data Outlier Analysis","authors":"Tongwei Ling","doi":"10.1109/ICOSEC54921.2022.9951977","DOIUrl":"https://doi.org/10.1109/ICOSEC54921.2022.9951977","url":null,"abstract":"This paper analyzes and studies the effect of the selection of the number of real clusters on the outlier detection in the cluster-based outlier detection algorithm and proposes an outlier detection algorithm based on the automatic clustering method. Firstly, factor analysis, mean test and correlation analysis are used to screen financial indicators and corporate governance variables, respectively, to obtain representative indicator variables, and then use support vector machine method to conduct empirical analysis. The research results show that the support vector machine model has a strong predictive ability for enterprise bankruptcy risk. Using the distance relationship between each candidate outlier and its data block and adjacent data blocks, it is determined which processor each candidate outlier needs to carry out network communication. Metrics, Alerts, Diagnoses and Gaining Experience.","PeriodicalId":221953,"journal":{"name":"2022 3rd International Conference on Smart Electronics and Communication (ICOSEC)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115566331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Vinayagam, A. Hameem Irfana, K. Sireesha, N. Tabassum Fathima, K. Tanuja
{"title":"An AI Tool for Emergency Medical Assistance system","authors":"P. Vinayagam, A. Hameem Irfana, K. Sireesha, N. Tabassum Fathima, K. Tanuja","doi":"10.1109/ICOSEC54921.2022.9951990","DOIUrl":"https://doi.org/10.1109/ICOSEC54921.2022.9951990","url":null,"abstract":"This research work attempts to check the medical condition of human beings by incorporating a smart medical assistance center in public places such as pharmacies, shopping centers, transportation route stations, interstate highways, and areas, where clinical stores are limited. The major advantage of the proposed type of medical assistance model is that the people would be able to recognize their current health condition. Based on these findings, the developed machine recommends the medicine to the user’s registered mobile number. Today, with the increased availability of internet and other connectivity resources, people are frequently facing side effects without consulting with a Medical Practitioner. They basically self-medicate themselves, which either has no effect on the body or has too many consequences on the body causing early/unpredictable death(s). The main challenge or disadvantage of self-mediation is that even after the recovery, the individuals begin using that medication for the rest of their lives or the continuous unknown side effects can lead to unexpected health issues. To address this issue, this research study works on a Proof-of-concept approach, which will assist in proposing a useful medical assistance.","PeriodicalId":221953,"journal":{"name":"2022 3rd International Conference on Smart Electronics and Communication (ICOSEC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115700837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ahila, M. Geetha, S. Ramesh, C. Senthilkumar, N. P
{"title":"Identification of Malignant Attributes in Breast Ultrasound using a Fully Convolutional Deep Learning Network and Semantic Segmentation","authors":"S. Ahila, M. Geetha, S. Ramesh, C. Senthilkumar, N. P","doi":"10.1109/ICOSEC54921.2022.9952130","DOIUrl":"https://doi.org/10.1109/ICOSEC54921.2022.9952130","url":null,"abstract":"Breast ultrasonography is a non-radiation imaging technology that is used to detect and categorize breast malignancies. Individuals have a minimal prevalence of adverse symptoms to it, and it is simple to incorporate therapeutic procedures. The proposed study has used a fully convolutional deep learning network to extract features from breast ultrasound images in order to identify different characteristics of breast imaging and data system terminology. This in turn simplify the procedure of categorizing tumors as benign or malignant. Using the BI-RADS vocabulary, 378 breast ultrasound images are analyzed and from that seven potentially cancerous characteristics are discovered. The mean accuracy and mean IU for the feature extraction are 32.82% and 28.88% respectively. Both the area under the curve and the normalized interconnection over union were observed to be higher than the results obtained by the equivalent feature extraction connections such as SegNet and U-Net by using the same range of data. The area under ROC curve has been 89.47% as well as the graded interconnection placed above a white confederation was 85.35%. By utilizing the ultrasonography to screen for breast cancer, the proposed research study suggests that it would be beneficial to make use of a deep learning network in conjunction with the BI-RADS terminology as a substantial supplementary diagnostic tool.","PeriodicalId":221953,"journal":{"name":"2022 3rd International Conference on Smart Electronics and Communication (ICOSEC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114308577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Commonalities in Social Engineering Attacks through E-Commerce Shopping Platforms & Online Gaming Programs","authors":"Jasiel Garcia, Paul Oburu, Shajina Anand","doi":"10.1109/ICOSEC54921.2022.9951970","DOIUrl":"https://doi.org/10.1109/ICOSEC54921.2022.9951970","url":null,"abstract":"After the pandemic, the usage of internet and remote working is on the rise, and the malicious users have also increased. Many users are getting affected by social engineering attacks every day. Social engineering is the practice of gathering personal information from individuals by deceiving them. There are multiple ways in which malicious users can perform social engineering attacks, with approaches like phishing, baiting, pretexting, etc. The gamut of social engineering attacks spreads across anything online i.e., it could be a shopping website, online gaming network, enterprise mailing platform, etc. How to take preventive action against such attacks is very important. In this paper, two user groups are considered - online gamers and shoppers, and their vulnerability to such attacks. The social interactions and psychological factors of online gamers which make them vulnerable to social engineering threats are reviewed. This paper covers extensive secondary research and analysis, on the different types of social engineering attacks and the psychological factors making an individual vulnerable to such social engineering attacks. Few studies have analyzed the behaviors and relationships of gamers and their online interactions as well. This work also examines different preventive action tools that malicious attackers typically use. This study provides a framework for different types of social engineering attacks on online gamers, psychological and behavioral patterns that make them vulnerable, and what preventive actions/tools can be leveraged.","PeriodicalId":221953,"journal":{"name":"2022 3rd International Conference on Smart Electronics and Communication (ICOSEC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115323193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Environmental Sensor Network Construction and Real-Time Monitoring System for Rural Environmental Pollution Control","authors":"Li Zhou","doi":"10.1109/ICOSEC54921.2022.9952030","DOIUrl":"https://doi.org/10.1109/ICOSEC54921.2022.9952030","url":null,"abstract":"This article takes the pollution source treatment of the ecological environment in rural construction as the research object. First, introduces the experience and reference of ecological environmental protection in rural construction at home and abroad; exploratory research on the cloud computing platform in the laboratory environment, and builds based on Hadoop The environmental sensor cluster network of the company realizes the dynamic configurability of system resources, and studies the access interface of the MapReduce algorithm, which lays the foundation for the real-time monitoring system, processing and information fusion. The system is based on the Web sensor architecture, and realizes data synchronization with the existing online monitoring system of national pollution sources used by environmental protection departments, which can greatly improve the work efficiency of environmental monitoring personnel to 6.74%.","PeriodicalId":221953,"journal":{"name":"2022 3rd International Conference on Smart Electronics and Communication (ICOSEC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122136750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Ramesh, P. Manikandan, P. Naveen, M. Saravanan, S. R. Ashok Kumar, C. Swedheetha
{"title":"Energy Efficient High Performance Adder/Subtractor Circuits","authors":"G. Ramesh, P. Manikandan, P. Naveen, M. Saravanan, S. R. Ashok Kumar, C. Swedheetha","doi":"10.1109/ICOSEC54921.2022.9952136","DOIUrl":"https://doi.org/10.1109/ICOSEC54921.2022.9952136","url":null,"abstract":"Integrated circuit has been widely used in different applications. The design and development of CMOS transistor provides various advantages such as low power dissipation, cost efficient solutions, enhanced processor performance and size reduction. The main aim of the proposed research work is to increase the performance of the processor and reduce the area by increasing the performance of the adder circuits. The adder circuits enable its availability in many processors. In the processor, ALU is considered as the main functional block for performing any arithmetic operations. A novel high performance adders circuits were designed with the 0.18μm technology in TSMC Spice Simulator. Pass transistor logic has been used to reduce the transistors count in the circuit and hence the performance has increased by 10% when compared with the existing CMOS structure.","PeriodicalId":221953,"journal":{"name":"2022 3rd International Conference on Smart Electronics and Communication (ICOSEC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Satellite Image Dehazing Using Fast Iterative Domain Gaussian Guided Image Filtering","authors":"N. U. Kumar, Nakka Shivakumar, S. Bachu","doi":"10.1109/ICOSEC54921.2022.9951947","DOIUrl":"https://doi.org/10.1109/ICOSEC54921.2022.9951947","url":null,"abstract":"In general, satellite images are foggy due to factors such as noise, snow, thin cloud, dust, and so on, resulting in image contrast reduction. Dehazing is described as the elimination of noise or ambient contaminants from a image in order to improve image quality. However, most state-of-the-art technologies failed to completely eliminate atmospheric influences and noise from satellite images. To address this issue, this study focuses on the creation of a grey world optimization method for the correct estimate of satellite atmospheric light. The study also creates a unique technique for estimating and refining dark channel prior-based transmission maps at the pixel and patch levels. As a consequence, every pixel-based patch contains information about how satellite atmospheric effects were addressed. The fast iterative domain gaussian guided image filtering (FID-GGIF) method was created to provide output that is smooth with dehazing properties. According to the simulation results, the suggested study beats cutting-edge approaches in terms of both quantitative and qualitative results","PeriodicalId":221953,"journal":{"name":"2022 3rd International Conference on Smart Electronics and Communication (ICOSEC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126151685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adversary Distributed Time Series Routing Protocol for Improving the Performance of Linkage Data Collection in WSN","authors":"J. Abinesh, M. Prakash","doi":"10.1109/ICOSEC54921.2022.9952155","DOIUrl":"https://doi.org/10.1109/ICOSEC54921.2022.9952155","url":null,"abstract":"A Wireless Sensor Network (WSN) is a network of devices that transfer all the data collected from the monitoring area via a wireless connection. Data is transmitted over multiple nodes, and the portal connects the nodes to other networks. The sensor collects the data and relays it to the receiver in a single-hop or multi-hop path. WSN with mobile receivers can help prevent hotspot issues and extend the network’s life. Sink nodes can have an important impact on network performance. As the energy capacity of each sensor is low, it is important to improve the receiver location routing. Nonetheless, the mobile sink node cannot change the routing optimally due to less energy and transmission speed constraints. Efficient data transmission is the main problem in Wireless Sensor Networks (WSNs). Due to poor data transmission, the packet delivery ratio, throughput, and network lifetime are minimized, and the packet drop ratio performance is increased. To address these issues, an Adversary Distributed Time Series Routing Protocol (ADTSR) is proposed for efficient data transfer. The proposed algorithm first analyses the node’s current location and then investigates the sink and relay nodes for data transfer. The proposed algorithm efficiently improves performance parameters, namely Packet delivery ratio, throughput, and network lifetime and then minimizes the packet drop ratio than previous methods.","PeriodicalId":221953,"journal":{"name":"2022 3rd International Conference on Smart Electronics and Communication (ICOSEC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129749855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Hybrid Parallel Cloud Architecture in Java+Oracle Implementation of Enterprise Management Innovation","authors":"Wei Song","doi":"10.1109/ICOSEC54921.2022.9952058","DOIUrl":"https://doi.org/10.1109/ICOSEC54921.2022.9952058","url":null,"abstract":"This article takes the application of multi-management system integration and operation in enterprises as the research object, hoping to solve the “run-in” pain caused by the parallel operation of multiple management systems at this stage. Therefore, the article proposes to improve the organizational structure, and at the same time analyzes and discusses the performance and optimization technology of Oracle database, and expounds the architecture of the enterprise management information system. And learn the basic knowledge of related financial accounting used in the enterprise. In terms of development technology, the author mainly studied core technologies such as C/S architecture, Java programming language, and Oracle database system.","PeriodicalId":221953,"journal":{"name":"2022 3rd International Conference on Smart Electronics and Communication (ICOSEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128395822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Java Implementation of Intelligent Platform for English Training based on Intelligent Test Data Generation Algorithm","authors":"Fenghua Tang","doi":"10.1109/ICOSEC54921.2022.9951882","DOIUrl":"https://doi.org/10.1109/ICOSEC54921.2022.9951882","url":null,"abstract":"Firstly, the research results of genetic algorithm and particle swarm optimization algorithm, which are most frequently used in the generation of test data based on intelligent optimization algorithm, are summarized and summarized, and the research status is analyzed. Then, the test data based on intelligent optimization algorithm is briefly introduced. Generation tools. Based on the analysis of system functional requirements, the teaching resource library and the front and back functional modules of the learning platform are determined. Based on the technical foundations of Java, JSP, Hibernate framework, etc. Earn points by doing fun English quizzes and learning competitions","PeriodicalId":221953,"journal":{"name":"2022 3rd International Conference on Smart Electronics and Communication (ICOSEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130573181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}