2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)最新文献

筛选
英文 中文
Web Application Security on Top of Public Cloud 公共云之上的Web应用安全
2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS) Pub Date : 2022-05-01 DOI: 10.1109/ICPS55917.2022.00045
M. S, Gokula Santhiya R, Jeni V, Joshika Bhavna J
{"title":"Web Application Security on Top of Public Cloud","authors":"M. S, Gokula Santhiya R, Jeni V, Joshika Bhavna J","doi":"10.1109/ICPS55917.2022.00045","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00045","url":null,"abstract":"The prevalence of Microservices has made it quintessential to build web applications in a Cloud-Native fashion. While building applications in a cloud-native way, almost the entire infrastructure of an organization relies on an arbitrary Cloud Service Provider’s data center as the individual components of the organization’s on-premise infrastructure are morphed into the modern Infrastructure as a Service(IaaS) model in pay-as-you-go strategy. In this scenario, every Cloud Service Provider(CSP) ensures that they are responsible for securing the data at rest. But the data in transit is left to the user’s responsibility. Some prominent Cloud Service Providers offer services to encrypt the data in-transit as well. But under such circumstances, a copy of our enciphering keys are in any way kept under their premises which in turn is undesirable for many individual users and organizations. So, the solution is to do Client Side Encryption(CSE) to ensure the security ourselves. We are proposing a cryptosystem such that it solidifies the integrity of in-transit data by implementing the Homomorphic encryption technique using a modified form of RSA algorithm. (A study on in-flight data security using cloud services is also done.)","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126460326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Machine Learning Techniques To Predict Breast Cancer 应用机器学习技术预测乳腺癌
2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS) Pub Date : 2022-05-01 DOI: 10.1109/ICPS55917.2022.00011
K. Shilpa, T. Adilakshmi, K. Chitra
{"title":"Applying Machine Learning Techniques To Predict Breast Cancer","authors":"K. Shilpa, T. Adilakshmi, K. Chitra","doi":"10.1109/ICPS55917.2022.00011","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00011","url":null,"abstract":"Breast cancer is most occurring leading cancer amongst women in the world after lung cancer. The doctors are facing problems to prepare a medication treatment owing to a deficiency of the greatest diagnosis results that may prolong patient survival time. Breast cancer was scary and risky before the 20th century. A machine learning algorithm plays a substantial role in early-stage breast cancer prediction. The main objective of a research paper is to find the best classification algorithm. In this paper, the Wisconsin dataset has used. First, it predicts on data set of breast cancer and finds whether it is Malignant(M) or Benign(B). Second, it analyses theperformance and accuracy of various Machine learning algorithms, and third, it compares various machine learning algorithms. The research paper proposed an approach that improves accuracy and enhances the performance of algorithms. The efficient Machine learning algorithms are used such as Naïve Bayes, J48, Sequential Minimal Optimization (SMO) and Instance- Based for K-Nearest neighbor (IBK). The investigational results illustration in the proposed IBK algorithm gives the maximum accuracy of 100% when differentiate from the other three algorithms, this result will benefit in selecting the best classification algorithm for the breast cancer prediction and can be used for detection and treatment","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124018210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Behavioral Chatbot Using Encoder-Decoder Architecture : Humanizing conversations 使用编码器-解码器架构的行为聊天机器人:人性化对话
2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS) Pub Date : 2022-05-01 DOI: 10.1109/ICPS55917.2022.00017
T. Jalaja, Dr. T. Adilakshmi, Manchi Sarapu Sharat Chandra, Mohammed Imran Mirza, MVSashi Kumar
{"title":"A Behavioral Chatbot Using Encoder-Decoder Architecture : Humanizing conversations","authors":"T. Jalaja, Dr. T. Adilakshmi, Manchi Sarapu Sharat Chandra, Mohammed Imran Mirza, MVSashi Kumar","doi":"10.1109/ICPS55917.2022.00017","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00017","url":null,"abstract":"Though there are so many ways of building conversational chatbots, they lack the human touch and sound very robotic. We don’t have any chatbots that aim to imitate even a speck of a personality or human-like traits, while we very well possess everything that we need in terms of data and computation. This project aims to make both efficient and human-like chatbot using the modern encoder-decoder architecture. There are many frameworks and libraries available to develop AI-based chatbots including program-based, rule-based and interface-based. But they lack the flexibility in developing real dialogues and understanding humans. The popular chatbot models don’t aim to hold conversations that imitate real human-like interactions. Current chatbots employ a rule-based approach, basic machine learning algorithms, or a retrieval-based strategy that does not provide humanized outputs, i.e., these chatbots are incapable of producing engaging dialogues. In this paper, we tried to develop a Behavioural chatbot, using modern deep learning techniques like Seq2Seq aiming to develop chatbots to understand humans and make some situation agnostic conversations that remind us of our desirable personalities. This chatbot model was trained on real human conversations extracted out of Hollywood movies, hence the dataset possesses around 2.3 lakh truly organic dialogues. The model was trained with ~4.2 million parameters, 250 epochs and attained an accuracy of 95%. This chatbot is capable of displaying subtle sarcasm and also tries to be funny at times, thanks to the dramatic Hollywood dialogue writers.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114462760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
System for Biometric Recognition as a Security Agent Through Gps Protocols 基于Gps协议的生物识别安全代理系统
2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS) Pub Date : 2022-05-01 DOI: 10.1109/ICPS55917.2022.00048
Santiago Rubiños, W. Auccahuasi, Lucas Herrera, K. Rojas, Walter Maguiña, Herbert Grados, Juan J. Mendoza, Freedy Sotelo, Edwin Huarcaya, Verónica Tello, J. Grados, A. Cuzcano
{"title":"System for Biometric Recognition as a Security Agent Through Gps Protocols","authors":"Santiago Rubiños, W. Auccahuasi, Lucas Herrera, K. Rojas, Walter Maguiña, Herbert Grados, Juan J. Mendoza, Freedy Sotelo, Edwin Huarcaya, Verónica Tello, J. Grados, A. Cuzcano","doi":"10.1109/ICPS55917.2022.00048","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00048","url":null,"abstract":"The development of technology allows us to develop multiple solutions, thanks to the use of various sensors that we can use and integrate into different applications, to solve various problems. In the research we present a recognition system based on biometric techniques, analyzing patterns found in the \"Iris\", in order to control and access vehicles, the system is complemented with a GPS device to access its geo location. As a result we present the processes to process the images as well as the final design of the device, the system has the potential to be replicated and scaled.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"92 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121010537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visualization and Diagnosis of Medical Images, Using Virtual Reality Tools 医学图像的可视化和诊断,使用虚拟现实工具
2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS) Pub Date : 2022-05-01 DOI: 10.1109/ICPS55917.2022.00018
W. Auccahuasi, Lucas Herrera, Richard Aguilar Paredes, E. Felix, Esteban Medina Rafaile, Jorge Figueroa Revilla, Ana Barrera Loza, Z. Ayvar, Wilfredo Meza, Moisés Tongo, C. Ovalle, Hernando Martín Campos Martinez
{"title":"Visualization and Diagnosis of Medical Images, Using Virtual Reality Tools","authors":"W. Auccahuasi, Lucas Herrera, Richard Aguilar Paredes, E. Felix, Esteban Medina Rafaile, Jorge Figueroa Revilla, Ana Barrera Loza, Z. Ayvar, Wilfredo Meza, Moisés Tongo, C. Ovalle, Hernando Martín Campos Martinez","doi":"10.1109/ICPS55917.2022.00018","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00018","url":null,"abstract":"The training and diagnostic imaging processes are performed by viewing medical images in digital format, which are presented on medical grade monitors, taking advantage of their resolution, this procedure is performed in an established place in medical centers and in Most of the cases there are several doctors performing the same procedure, the present proposal consists of making the medical diagnosis using virtual reality glasses, we managed to share the images thanks to a connectivity through a wireless WIFI network, between the workstations and the glasses. Thanks to the Virtual Desktop application, which allows duplicating what is observed as well as taking control of the workstation, to be able to use the different options that allow working and processing medical images, this maneuverability is carried out thanks to the controls that have virtual reality glasses, one of the advantages it provides The lenses is to be able to eliminate all types of distracting agent thanks to the fact that the doctor can observe only the image that he is diagnosing as well as provide an environment formed by a background and a music that can be chosen randomly, the results that we present show that the image is displayed without presenting problems in its resolution, we present the visualization of mammography images in Dicom format and a sequence of angiography images in video format, by using the same workstation as a reading agent for medical images. You can use any type of medical image as well as viewers that can be used.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121666180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Security In Medical Image Steganography -A Hybrid Approach Using Spatial And Transform Domain 增强医学图像隐写安全性的空间域和变换域混合方法
2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS) Pub Date : 2022-05-01 DOI: 10.1109/ICPS55917.2022.00043
Anumol V B, Pooja Thejus, Leena Vishnu Namboothiri
{"title":"Enhanced Security In Medical Image Steganography -A Hybrid Approach Using Spatial And Transform Domain","authors":"Anumol V B, Pooja Thejus, Leena Vishnu Namboothiri","doi":"10.1109/ICPS55917.2022.00043","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00043","url":null,"abstract":"Image steganography is an essential method in the subject of information hiding, which is the art of concealing confidential data within a regular image to prevent tampering. There is a risk of tampering with medical images when they are transmitted over an insecure public network, which makes it difficult for diagnosis. As a result, it's critical to ensure the integrity of these images to avoid any unwanted changes. In this paper, we use the SHA256 technique to calculate the hash value of ROI to ensure medical image integrity. DCT and IDCT will be used to embed the hash in the RONI. We may check the image's authenticity by evaluating the hash value at the receiver end. The hash function does not match if there is any tampering. This study presents a hybrid approach to enhancing security. The altered image is encased in a regular-looking image. It aids in the concealment of confidential data. This multi-pronged approach will improve security.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117156301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber Attack Detection and Mitigation Through System Identification 通过系统识别检测和缓解网络攻击
2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS) Pub Date : 2022-05-01 DOI: 10.1109/ICPS55917.2022.00024
Anil Kumar Badavath, Y. V. Hote, Avinash Singh, Bhawna Jain
{"title":"Cyber Attack Detection and Mitigation Through System Identification","authors":"Anil Kumar Badavath, Y. V. Hote, Avinash Singh, Bhawna Jain","doi":"10.1109/ICPS55917.2022.00024","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00024","url":null,"abstract":"In this paper, conventional controllers, PI and PID are used to counter various types of cyber-attacks such as Gain attack and Man-in-the-middle (MITM) or deception attack. In this ARX estimator is used to estimate new plant dynamics. This ARX estimator is invoked by an attack detector, which works on safety band theory. The overall plant dynamics obtained by ARX estimator is used to compute conventional controllers gains for compensator. This new compensator will mitigate the after effects of cyber-attacks on the plant and makes the plant to operate normally. The validation of the proposed approach is carried out on the servo system and simulated in MATLAB-SIMULINK environment.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130859766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle Tracking and Speed Estimation Using Deep Sort 基于深度排序的车辆跟踪与速度估计
2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS) Pub Date : 2022-05-01 DOI: 10.1109/ICPS55917.2022.00035
G. B. Sekhar, M. Srilatha, J. Srinivasulu, M. Chowdary
{"title":"Vehicle Tracking and Speed Estimation Using Deep Sort","authors":"G. B. Sekhar, M. Srilatha, J. Srinivasulu, M. Chowdary","doi":"10.1109/ICPS55917.2022.00035","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00035","url":null,"abstract":"In the developing countries like India, the vehicle riders are increasing day by day, where it also constitutes to increase in the number of accidents across the country. The current system which lacks of proper surveillance is the main cause for growth of accident rate each year. Proper surveillance in heavy traffic zones such as junctions might decrease the death rate caused by the most of the accidents by tracking the vehicles in real time. To overcome this problem, we need a system that analyze a footage of camera in a selected junction calculating motion and dimensions of vehicle using You Only Look Once (YOLO v4 which is implemented using Convolution Neural Network (CNN)) and tracking vehicles using Simple Online and Realtime Tracking (SORT) with deep correlation metric and finding their speeds frame by frame accurately with efficient computations. The system is an improvised version of current tracking architectures which is capable of classifying the vehicles and calculating their speeds.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123589933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Suicidal Prediction Using Video, Audio, And Text Analysis 使用视频、音频和文本分析进行自杀预测
2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS) Pub Date : 2022-05-01 DOI: 10.1109/ICPS55917.2022.00015
Gagan Chordia, Yash Mehta, S. Nayan, Harshit Soni, Aayush Gupta, J. K
{"title":"Suicidal Prediction Using Video, Audio, And Text Analysis","authors":"Gagan Chordia, Yash Mehta, S. Nayan, Harshit Soni, Aayush Gupta, J. K","doi":"10.1109/ICPS55917.2022.00015","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00015","url":null,"abstract":"In today's society, suicide has evolved into a legitimate social medical issue. Suicidal ideation refers to people's plans to commit suicide. Suicide ideas and attempts can be triggered by a variety of factors, including long-term exposure to negative emotions or life events. Early detection of suicidal ideation is possibly the most effective method of suicide prevention of all. People can share their sufferings and sentiments in real-time thanks to developments in internet communication and interpersonal connection benefits, which provides a source for suicide thought identification. Suicide has a variety of causes, and suicidal variables vary from person to person.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123359950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberbullying Detection and Hate Speech Identification using Machine Learning Techniques 使用机器学习技术的网络欺凌检测和仇恨言论识别
2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS) Pub Date : 2022-05-01 DOI: 10.1109/ICPS55917.2022.00041
Tanmay Agrawal, V. Chakravarthy
{"title":"Cyberbullying Detection and Hate Speech Identification using Machine Learning Techniques","authors":"Tanmay Agrawal, V. Chakravarthy","doi":"10.1109/ICPS55917.2022.00041","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00041","url":null,"abstract":"Bullying has been prevalent since the beginning of time, It’s just the ways of bullying that have changed over the years, from physical bullying to cyberbullying. According to Williard (2004), there are eight types of cyberbullying such as harassment, denigration, impersonation, etc. It’s been around 2 decades since social media sites came into the picture, but there haven’t been a lot of effective measures to curb social bullying and it has become one of the alarming issues in recent times.Our paper presents an analytical review of cyberbullying detection approaches and assesses methods to recognize hate speech on social media. We aim to apply traditional supervised classification methods as well as some novel ensemble machine learning techniques using a manually annotated open-source dataset for this purpose. This paper does a comparative study of various Supervised algorithms, including standard, as well as ensemble methods. The evaluations of the result based upon the scores obtained by accuracy shows that Ensemble supervised methods have the potential to perform better than traditional supervised methods.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127793502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信