{"title":"Evaluation on Utilization and Emaciation of Data Mining Techniques in Information System","authors":"Trupti G.Ghongade, R. Khobragade","doi":"10.1109/OTCON56053.2023.10114009","DOIUrl":"https://doi.org/10.1109/OTCON56053.2023.10114009","url":null,"abstract":"Data mining is a critical issue of data extraction and data analysis. Data mining has given answers to numerous fields which include authorities’ data structures additionally. As the era is growing exponentially Zeta byte of data is producing each day. So, it’s far very hard to expecting correct data, we want new strategies and technology to intellectually examine the data. Analyzing such data may be very critical for enhancing the overall performance of information system. In some other way, we can say that data mining strategies are used to extract beneficial data from big data. DM performs an essential position in numerous fields like education, healthcare, enterprise, the clinical arena, etc. The cause is to manipulate a higher knowledge among enterprise targets and consumer needs. This paper evaluates the contributions of numerous authors within side the discipline of data mining. It additionally discusses specific data mining strategies, algorithms within side the discipline of information system.","PeriodicalId":265966,"journal":{"name":"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115151142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security analysis of Three-Factor Authentication Protocol Based on Extended Chaotic-Maps","authors":"Suresh Devanapalli, Kolloju Phaneendra","doi":"10.1109/OTCON56053.2023.10113994","DOIUrl":"https://doi.org/10.1109/OTCON56053.2023.10113994","url":null,"abstract":"In data security network communication, the authentication protocol is crucial. Therefore, the authentication protocol must offer protection against all recognised threats, including password guessing, insider, and identity theft assaults. However, a lot of protocols in the literature fall short of these security standards. In this paper, we evaluate the very lately put out Shuming et al. protocl. The three-factor authentication protocol demonstrates that it is susceptible to assaults from privileged insiders, offline password guessing attacks, user identity attacks, and parallel session attacks; as a result, their system is unable to thwart known session-based transient data attacks. Additionally, it lacks robust user anonymity and is susceptible to DoS and smart card loss attacks.","PeriodicalId":265966,"journal":{"name":"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123074892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hannatu K. Ali, Luwam Major Kefali, Shantipriya Parida, S. Dash
{"title":"Amharic ATS - A Comparison Between Graph Based and Statistical Based Approach using Rouge Metric and Human Evaluation","authors":"Hannatu K. Ali, Luwam Major Kefali, Shantipriya Parida, S. Dash","doi":"10.1109/OTCON56053.2023.10114029","DOIUrl":"https://doi.org/10.1109/OTCON56053.2023.10114029","url":null,"abstract":"This paper presents a study into existing Automatic Text Summarization models applied on the Amharic languagea widely used and spoken language in Ethiopia. With more than 40 million speakers across the world, including the diaspora, it is of significance to have a mechanism where large Amharic texts can be condensed into understandable and short paragraphs. The models that have been implemented and used previously have shown great results and promise, especially the TextRank algorithm, which has been studied in this paper, along with TF-IDF and Cosine Similarity algorithms. Our paper mainly concentrated on the evaluation aspect of summarized Amharic texts with human summaries, which are likely to have more depth and context. The study compares and contrasts human generated summaries with machine generated ones, on the same text. The evaluation comprised of human evaluation and the Rouge Metrics. The results in both cases signified TextRank, a graph-based approach, to lead to optimal summaries.","PeriodicalId":265966,"journal":{"name":"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127439779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malware Detection in PE files using Machine Learning","authors":"Samarth Tyagi, Achintya Baghela, Kashif Majid Dar, Anwesh Patel, Sonali Kothari, Snehal Bhosale","doi":"10.1109/OTCON56053.2023.10113998","DOIUrl":"https://doi.org/10.1109/OTCON56053.2023.10113998","url":null,"abstract":"Malware has become one of the most challenging threats to the computer domain. Malware is malicious code mainly used to gain access and collect confidential information without permission. The internet coverage has boomed a lot in today’s time leading to people downloading various files and installing executable files like.exe,.bat, and.msi files. This leads to many complications as these files are the vector for malicious code. Through this paper, we present a technique to detect executable files as malicious by a detailed search of the Portable Executable (PE) files that come along with the executable files. Our approach uses the static analysis technique to get features from PE files. We use these with supervised learning algorithms to classify malware. We also compare the performance of different algorithms to determine the best way to approach our problem.","PeriodicalId":265966,"journal":{"name":"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115519633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aaliya Ali, Saransh Agrawal, Tanvi Pisalkar, S. Dongre
{"title":"Modernising E-commerce Warranties using Non-Fungible Tokens on the Blockchain","authors":"Aaliya Ali, Saransh Agrawal, Tanvi Pisalkar, S. Dongre","doi":"10.1109/OTCON56053.2023.10113919","DOIUrl":"https://doi.org/10.1109/OTCON56053.2023.10113919","url":null,"abstract":"With the rise of internet accessibility and situations like the pandemic, the world has seen an ever-increasing number of people turning to online shopping. Over the years, these E-commerce websites have been able to win the trust of their users. With this trust in mind, people have started buying high-value goods like electronics, smart gadgets and even furniture. While these goods are delivered with ease, another important concern in regard to these items is product warranties. Present-day warranties exist in two forms a) Physical Warranties and b) Digital Warranties. Physical warranties involve paperwork, can be easily tampered with and manipulated and are almost non-transferable. Digital warranties, although they do not need paperwork, do not ensure complete ownership transfers. To overcome the abovementioned issues, we propose a new blockchain-based solution. Our proposed solution uses Non-Fungible Tokens to issue and verify warranties. This research proposes a new way of issuing, managing and validating product warranties by making use of Non-Fungible Token(NFT). The NFT Warranty stays on the blockchain as long the warranty is valid after which it ‘burns’.","PeriodicalId":265966,"journal":{"name":"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116147917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sourabh Kumar, S. K. Chandra, R. Shukla, Lipismita Panigrahi
{"title":"Industry 4.0 based Machine Learning Models for Anomalous Product Detection and Classification","authors":"Sourabh Kumar, S. K. Chandra, R. Shukla, Lipismita Panigrahi","doi":"10.1109/OTCON56053.2023.10114045","DOIUrl":"https://doi.org/10.1109/OTCON56053.2023.10114045","url":null,"abstract":"Automation has made tremendous changes in the industries. It has been used to automate the manual processes involved in different physical units of the industries. The purpose was to increase the production in the manufacturing. Now, Computers are being used in the industries to monitor functionalities of different production units with the help of artificial intelligence and internet of things (IoT). The IoT has revolutionized the industries. It is an interconnected network system of physical units. The core purpose of it to gather and share information among different physical units. The IoT has great impact on the many areas such as business, industry, medicine, the economy, transport, industrial robots and automation systems. IoT with artificial intelligence has wide range of industrial applications. Industry 4.0 is used in the industries where different industrial units are connected over the internet and interacting to make decisions via machine-to-machine communication. It has increased the benefits of industries in terms of production and supply chain management. Manufacturing industry monitors its production units in every 10 milliseconds to capture features of the product that is being produced. The features generated in this process are huge in amount. Critical observation is performed on the generated features to categorize the product as anomalous or good. Product classification is difficult task in the labeled datasets due to human bias in labeling the final product as anomalous or good. In this work, machine learning models is being used to detect and classify faulty product produced by manufacturing industry. Both qualitative and quantitative study will be carried out to compare various machine learning models.","PeriodicalId":265966,"journal":{"name":"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122369911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Short Term Recursive Matrix Pencil Based Distribution System Protection Scheme","authors":"B. Deshmukh, D. Lal, S. Biswal","doi":"10.1109/OTCON56053.2023.10113999","DOIUrl":"https://doi.org/10.1109/OTCON56053.2023.10113999","url":null,"abstract":"The occurrence of a single line to ground (SLG) fault including high impedance faults (HIFs) in different grounding systems results in a fault current with low magnitude. This causes difficulties for the existing protection unit to detect the fault and identify the faulty feeder. To overcome, this manuscript aims for a new fault detection approach based on the sliding window-based recursive matrix pencil method (RMPM). The proposed method begins with the reconstruction of the fault signal using RMPM and then computes the transient error by subtracting the reconstructed fault signal from the original signal. This transient error is used as a fault detection index (FDI) which is also used to classify the faulty feeder. Results show the effectiveness of the addressed method, obtained by simulating different worst scenarios (fault and non-fault).","PeriodicalId":265966,"journal":{"name":"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122401340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bharti, C. K. Upadhyay, Sanjeev Kumar Garg, M. Ghai
{"title":"Impact of digital media marketing on purchasing behavior in the low hill urban areas of Himachal Pradesh","authors":"Bharti, C. K. Upadhyay, Sanjeev Kumar Garg, M. Ghai","doi":"10.1109/OTCON56053.2023.10113971","DOIUrl":"https://doi.org/10.1109/OTCON56053.2023.10113971","url":null,"abstract":"This research is to investigate from a societal standpoint that factors influencing digital media advertising on the purchasing decisions of FMCG consumers. The primary data were collected from 500 beneficiaries of Low Hills (Urban) areas, northern states of India, i.e., Himachal Pradesh using purposive sampling during July 2018 to Jan 2019. Factor analysis was used for data analysis. The findings of the analysis lead one to the conclusion that many of the respondents watch digital advertisements to gather information. Their livesrevolve around sitting in front of the television and, more specifically, watching advertisements in hilly areas.","PeriodicalId":265966,"journal":{"name":"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122911611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution of Low - Power Blockchain Technology by using Iterative Sharding for IoT Environment","authors":"Suniti Purbey, Ashutosh Choudhary, B. Dewangan","doi":"10.1109/OTCON56053.2023.10113981","DOIUrl":"https://doi.org/10.1109/OTCON56053.2023.10113981","url":null,"abstract":"This Blockchains are considered as high security linked-list based models that can be used to incorporate immutability, distributed processing, high transparency, and high trustworthiness for scalable deployments. But as the chain length increases, these blockchains require larger mining delays and higher energy consumption which limits their applicability for low-power use cases. Existing low-power blockchains require complex miner-level evaluations, which increases their computational complexity levels. To overcome these issues, this text proposes design of a novel low-power blockchain via iterative sharding for IoT (Internet of Things) deployments. The proposed model initially collects temporal information about the current IoT scenario and uses an Elephant Herding optimization (EHO) based model to form low-energy & low-delay sidechains. The length of these chains is iteratively modified, which assists in reducing computational complexity even under large scale networks. The EHO Model formulates a mining-delay & mining-energy based fitness function, that allows the model to select optimal chain lengths for context-specific use cases. Due to these enhancements, the proposed model is able to reduce the computational delay by 8.3%, and mining energy by 4.5% when compared with standard blockchain & sidechain models under different realtime use cases. This also allows the model to improve communication throughput and reduce the number of delay jitters for large-scale communication scenarios.","PeriodicalId":265966,"journal":{"name":"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114569858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparison of Deep Learning Algorithms Dealing With Limited Samples in Hyperspectral Image Classification","authors":"Pallavi Ranjan, Ashish Girdhar","doi":"10.1109/OTCON56053.2023.10114005","DOIUrl":"https://doi.org/10.1109/OTCON56053.2023.10114005","url":null,"abstract":"Hyperspectral Imaging, also known as Spectroscopy, is used in various areas such as medicine, defense, submarine, remote sensing, and environmental monitoring. Several supervised or unsupervised deep learning algorithms have been developed to classify such hyperspectral images. A significant problem in HSI is insufficient data availability, as annotating the samples is time-consuming and labor-intensive. This study provides a comparison of deep learning algorithms that have been developed to deal with the limited data problem in the HSI domain. It compares the performance, classification accuracy and other relevant parameters that exist during the development of such algorithms.","PeriodicalId":265966,"journal":{"name":"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117325484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}