2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)最新文献

筛选
英文 中文
Designing a Security Framework for Enhancement of Electronic Transactions 设计一个加强电子交易的保安架构
K. Kumar, Himanshu Gupta
{"title":"Designing a Security Framework for Enhancement of Electronic Transactions","authors":"K. Kumar, Himanshu Gupta","doi":"10.1109/icrito51393.2021.9596545","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596545","url":null,"abstract":"With the popularity of e-commerce websites, online transaction options have too gained prominence among customers. Ensuring security is still a major issue that professionals focus on. Though digital transactions enhance customer-merchant experience, there are various risks and challenges involved. Existing techniques such as Address Verification System (AVS), Card Verification Value (CVV), etc. help in verifying customer authenticity. From a customer's perspective, there are no authentication frameworks that will inform them about dishonest merchants. This paper suggests a system model that will use interactive modules to generate a Trust Factor (TF) which will help in detecting fraudulent merchant accounts at financial institutions. This financial technology will generate reports that can be used for analysis to understand the behavior of fraud activities in real time using sophisticated machine learning algorithms, thereby, mitigating merchant and transactional frauds.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124969737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Augmented Reality Android App To Shoot Prefab on Scanned Surface 增强现实安卓应用程序拍摄预制件扫描表面
Manisha Pant, R. Agarwal, Harivansh prasad Sharma
{"title":"Augmented Reality Android App To Shoot Prefab on Scanned Surface","authors":"Manisha Pant, R. Agarwal, Harivansh prasad Sharma","doi":"10.1109/icrito51393.2021.9596394","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596394","url":null,"abstract":"In today world we surrounded by technology. AR technology is now being used in a lot of field like education, health care, entertainment, gaming, military simulation, modular design and military training simulation. Big tech giants like google, apple, Facebook are in race to create the best and immersive Augmented Reality. They provide us the platform like ARCore by google, ARKit by apple and AR Studio by Facebook. Unity integrated with ARCore with inbuild feature like motion tracking, lighting, environmental awareness we can easily created our own app.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129539750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Teen-alyse: A Mobile Application for Parental control, Teen Self-Monitoring and Active Mediation 青少年分析:父母控制,青少年自我监控和积极调解的移动应用程序
Nikita Sangal, Dhairya Singhvi, Madhura Pharande, D. Patole
{"title":"Teen-alyse: A Mobile Application for Parental control, Teen Self-Monitoring and Active Mediation","authors":"Nikita Sangal, Dhairya Singhvi, Madhura Pharande, D. Patole","doi":"10.1109/icrito51393.2021.9596148","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596148","url":null,"abstract":"The unprecedented COVID scenario has exponentially increased the exposure of internet to adolescent age group of the world population. The sudden extended online presence of this age group has created an area of concern in parenting fraternity as this is accompanied by restrictions on the normal social life of children. However, study states that direct parental control methods lessen the trust and the bond between the parent and the teen. If the teens are explained about the possible consequences of their online actions in a friendly manner, it helps them to understand the need of self-regulation and caution when they are being part of online community actively or passively. In this work, a self- regulation model is proposed. The self-regulation model is developed as a Mobile app called “Teen-alyse”. This app is designed to help in achieving a balance in parental guidelines and teen self-regulation. Further, the idea of active mediation has been included which encourages both, parent, and teen to have conversation for the time limit set for the mobile apps. By applying an analysis algorithm, the teen's YouTube activities are classified as flagged and not flagged contents and a report is generated, which alerts teens as well as parents. The work proposes the model of teen self-regulating app by following values of parental control, teen self-monitoring and active mediation.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124068134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Crop Analysis Using Deep Learning 使用深度学习的作物分析
Rhythm, Tanvi Dalwani, Purushottam Sharma, Vikasdeep, V. Shukla
{"title":"Crop Analysis Using Deep Learning","authors":"Rhythm, Tanvi Dalwani, Purushottam Sharma, Vikasdeep, V. Shukla","doi":"10.1109/icrito51393.2021.9596194","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596194","url":null,"abstract":"Food is one of the necessities of a person for endurance. With the population increasing with each day, it gets clear to produce adequate harvests to take care of the increasing numbers. In addition, the economy depends on agriculture too. Yet, there is a critical danger to agriculture production and thus arises the need of automatic identification and analysis of crops.This paper introduces a methodology for building an automatic system which recognizes infection using the leaf pictures and some features like recommending the remedy for that infection. A model has been created using convolution neural network and transfer learning approach using Inception v3 and ResNet 50 .The best-fit model has been chosen to be Inception v3 based on the accuracy of the models. Further this model has been implemented and the data for remedies for the infectious crops has been indicated and added in the model.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127738905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Trade Promotion to Maximize Overall Supply Chain Profitability using Mathematical Optimization 利用数学优化的贸易促进设计使供应链整体盈利能力最大化
Ashwini Bambal, Sunil Kumar, J. Abraham
{"title":"Design of Trade Promotion to Maximize Overall Supply Chain Profitability using Mathematical Optimization","authors":"Ashwini Bambal, Sunil Kumar, J. Abraham","doi":"10.1109/icrito51393.2021.9596277","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596277","url":null,"abstract":"Manufacturers offer Trade Promotions to retailers with the objective of making their products more accessible to end consumers or reducing the inventory level. There are two broad types of trade promotions - off-invoice and scan-back. Retailers prefer off-invoice promotions, but this often leads to lesser profit for manufacturers because of the forward buying from retailers in the promotion period. Manufacturers prefer scan-back-based promotions. But retailers are not attracted to the simple Scan-back deals due to the risk involved in selling the product to the end consumer in the stipulated promotion period. The proposed model designs a promotional strategy that is acceptable to both parties - manufacturer and retailer. The promotion strategy is designed in such a way that it maximizes the manufacturer's profit while ensuring that the retailer's profit is greater than or equal to the retailer's profit in an off-invoice case. Two approaches are tried out to check the overall profitability of the supply chain: without Inventory cost and with Inventory cost. The system uses the log-log regression model to assess the impact of the product's price and its corresponding demand, thereby providing the price elasticity value, which is one of the essential input parameters. The optimization model is a constrained nonlinear optimization model.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125247848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual Band and Polarised Cross STDA MIMO System for the Base Station Antenna for 5G Communications 面向5G通信的基站天线双频极化交叉STDA MIMO系统
Mohd Wasim, Shelej Khera
{"title":"Dual Band and Polarised Cross STDA MIMO System for the Base Station Antenna for 5G Communications","authors":"Mohd Wasim, Shelej Khera","doi":"10.1109/icrito51393.2021.9596164","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596164","url":null,"abstract":"A novel dual polarized cross STDA for the base station 5G application is presented in this paper. The resonant frequency of the proposed antenna is 3.3 to 3.8 GHz and 4.8 to 5 GHz with average realized gain 24 dBi and 26.5 dBi in the upper band and lower band respectively with the stable radiation pattern. It consists of two circular tapered dipole antennas with parasites element feed with adjusted balun system. In this design feed point are shifted along with the balun feed by adjustment. The three-dimensional cross-sectional area is 68 × 68 × 94 mm.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"60 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132069970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Paper with Dhaincha Fiber (Sesbania aculeata) 田菁茶纤维造纸的研制
Surabhi Das, A. Rani
{"title":"Development of Paper with Dhaincha Fiber (Sesbania aculeata)","authors":"Surabhi Das, A. Rani","doi":"10.1109/icrito51393.2021.9596514","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596514","url":null,"abstract":"The current study revolves around development of paper from dhaincha fiber (Sesbania aculeata). Dhaincha is a basically cultivated for improvisation of soil quality. Due to deforestation worldwide, various sources of raw materials are used in paper industries. Indian pulp and paper industry is the world's major paper industry. In this study extraction of dhaincha fiber was done followed by retting, combing, chemical analysis and by making of pulp with dhaincha fiber. The dhaincha pulp was then used for making a paper from dhaincha fiber. The thickness of the dhaincha paper was then tested with paper thickness tester. By doing further processing dhaincha paper can be used commercially by paper industry.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain Empowered Framework for Peer to Peer Lending 区块链授权的点对点借贷框架
Nisha Arora, P. Kaur
{"title":"Blockchain Empowered Framework for Peer to Peer Lending","authors":"Nisha Arora, P. Kaur","doi":"10.1109/icrito51393.2021.9596552","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596552","url":null,"abstract":"P2P(Peer to Peer) lending is the process of extending credit to unknown individuals through digital platforms. Trust is an imperative component for P2P lending. Blockchain and smart contracts have the potential to accelerate the growth of Peer-to-Peer lending as trust-inducement and decentralization are the two prominent features of blockchain. Lending on social platform is particularly unsecured because they are not backed up by collateral. In this paper, a token generation mechanism is proposed in lieu of the submission of digital assets and virtual currency as collateral. The paper also deploys the self executing smart contracts to allow investors to lend money to borrowers on pre-determined terms and conditions. In addition, a smart compensation management contract has been deployed to repay the outstanding amount to lender if the borrower has charged off.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130004910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Use of AES Algorithm in development of SMS Application on Android Platform AES算法在Android平台短信应用开发中的应用
Manvika Gaur, Ritu Gupta, Abhilasha Singh
{"title":"Use of AES Algorithm in development of SMS Application on Android Platform","authors":"Manvika Gaur, Ritu Gupta, Abhilasha Singh","doi":"10.1109/icrito51393.2021.9596488","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596488","url":null,"abstract":"Encrypting the data when it comes to security from foreign intrusions is necessary. Being such a vast field the search for the perfect algorithm is crucial. Such an algorithm which is feasible, scalable and most importantly not easy to crack is the ideal algorithm for its use, in the application “CRYPTOSMS”.SMS (Short messaging service) is not encrypted end to end like WhatsApp. So, to solve the problem of security, CRYPTOSMS was created so that all the messages sent and received are secured. This paper includes the search for the ideal algorithm for the application by comparison with other algorithms and how it is used in making of the application.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130215222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble Learning based Classification of UNSW-NB15 dataset using Exploratory Data Analysis 基于探索性数据分析的UNSW-NB15数据集集成学习分类
N. Sharma, N. Yadav
{"title":"Ensemble Learning based Classification of UNSW-NB15 dataset using Exploratory Data Analysis","authors":"N. Sharma, N. Yadav","doi":"10.1109/icrito51393.2021.9596213","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596213","url":null,"abstract":"Recent advancements in machine learning have made it a tool of choice for different classification and analytical problems. Over the last decade, data has increased exponentially in networking domains, so naturally, there is a need to understand this data to get useful insights. This paper deals with a critical field of computer networking: network security and the possibilities of machine learning automation in this field. We will be doing exploratory data analysis on the benchmark UNSW-NB15 dataset. This dataset is a modern substitute to the outdated KDD'99 dataset as it has greater uniformity of pattern distribution. We will also implement several ensemble algorithms like Random forest, Extra trees, AdaBoost and XGBoost to derive insights from the data and make useful predictions. We calculated all the standard evaluation parameters for a comparative analysis among all the classifiers used. This analysis gives knowledge, investigate difficulties, and future opportunities to propel machine learning in networking. Along these lines, it is a beneficial contribution to enhance the understanding of machine learning for networking, pushing the limits of automation using machine learning for better network management. This paper can give a basic understanding of the data analytics in terms of security using Machine Learning techniques.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134311859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信