2022 5th International Conference on Contemporary Computing and Informatics (IC3I)最新文献

筛选
英文 中文
A Survey on the Impact of Data Analytics and Machine Learning Techniques in E-commerce 数据分析和机器学习技术在电子商务中的影响调查
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072652
S. Rajan, Sivajee Vavilapalli, Shahriar Hasan, Ritesh Kumar, NafisaNowal Rafa, I. Muda
{"title":"A Survey on the Impact of Data Analytics and Machine Learning Techniques in E-commerce","authors":"S. Rajan, Sivajee Vavilapalli, Shahriar Hasan, Ritesh Kumar, NafisaNowal Rafa, I. Muda","doi":"10.1109/IC3I56241.2022.10072652","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072652","url":null,"abstract":"Current article has been developed for understanding the impact of data analytics and machine learning technique in e-commerce. If the observation has been developed for the current market of this technology it can be detected that real-life industry increases their investment which showed the interest in getting advantages. Identification of the problem of costing and different algorithm suitability objectives has been set for understanding the real impact of e-commerce. Secondary data collection has been used for understanding the different usability of machine learning and data analytics for e-commerce. It has been detected that using machine learning brings the benefits of automation and improves continuous growth. Data analytics provide the scope of accuracy build-up. Apart from this different area of application and the different techniques has been analyzed. Understanding become easier and the scope of future benefits can be identified.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126681848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain Based Multi App Spy System 基于区块链的多应用间谍系统
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072438
Smriti Pal, Vishwas Kumar
{"title":"Blockchain Based Multi App Spy System","authors":"Smriti Pal, Vishwas Kumar","doi":"10.1109/IC3I56241.2022.10072438","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072438","url":null,"abstract":"Stealing personal information without users’ knowledge is one of the very common phenomena of the internet world in today’s era. We use multiple applications on our android smartphones or tablets. While using such applications, they often ask for hardware resource permission usage for running like camera, microphone or device location, etc. We access and deny them as per our intelligence but sometimes, even after denying certain permission, it is found that certain applications try to manipulate our system into accessing such requests and try to steal our device information. Multi App Spy System is designed to keep track of applications and monitor each and every resource request made by them and compare them with the permissions granted by the user in order to check which applications are making unauthorized requests and record them in blockchain database. With the help of such a system, users will be able to store every malicious access and access and control them as per their requirement.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121096413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Examination of the Pricing of IPOs:The Indian Perspective ipo定价研究:印度视角
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072855
R. Raut, Amruta Deshpande, Sugandha Arora, A. Mittal, Rohit Alandikar
{"title":"An Examination of the Pricing of IPOs:The Indian Perspective","authors":"R. Raut, Amruta Deshpande, Sugandha Arora, A. Mittal, Rohit Alandikar","doi":"10.1109/IC3I56241.2022.10072855","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072855","url":null,"abstract":"Companies opt for an initial public offer (IPO) to raise money from the capital market. It is observed that IPOs are generally underpriced and therefore investor subscribed for IPOs to earn listing day returns. This paper studies the pricing performance of 288 IPOs listed in India for the period of 2010-2021. Pricing performance of an IPO is assessed by calculating Market Adjusted Excess Return and Listing Day Return. Also, data visualization and regression analysis are used to identify the various variables which have significant impact on IPO. This study observes average positive listing day return indicating investors subscribing the IPOs can earn on listing the day of an IPO. An average 9.40 Market Adjusted Excess Return and 10.37 percent Listing Day Return is noted. Additionally, the analysis finds no significant correlation among issues price, issues size and Market Adjusted Excess Return. The study identifies that it is safe to invest in the IPO as average listing day return is positive. The findings presented using data visualization may be useful for content creators, stockbrokers to develop various modules to make qualitative information more attractive and appealing. This study provides an important insight in exploring parameters which have significant impact on IPO. The research contributes significantly to presenting data visualization as tool to measure the performance of IPO.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115635690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corporate Digital Responsibility: Perspectives till date and the way ahead 企业数字责任:迄今为止的观点和未来的道路
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073068
S. Yadav, Gaurav Mishra
{"title":"Corporate Digital Responsibility: Perspectives till date and the way ahead","authors":"S. Yadav, Gaurav Mishra","doi":"10.1109/IC3I56241.2022.10073068","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073068","url":null,"abstract":"With the advancement of digitalisation and sustainability practices across industries and related verticals, a new ideology in the name of Corporate Digital} {Responsibility (CDR) is emerging. Its inherent existence with aspects related to humanity and nature has triggered scholars to enrich its pace of emergence so that a more ethical, accepting and reliable version of gig economy can be prospered. Keeping all those discussions at the center this article explores and argues about the path we are going with and by examining the existing frameworks in the field, posits how organizations can be perceived socially economically and environmentally responsible. The article also traces the uncontrolled and unintended ramifications of the discussions about the CDR in a broader perspective. The article can be a guiding source for Scholars in extending the related research and to organizations, for more stakeholder centric policy making.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116607931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Structured Investigation of Network Security Strategies and its Applications 网络安全策略及其应用的结构化研究
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072695
Shanti Makka, Tripti Misra, Rajesh Deorari, D. Kumar, Vikas Kumar, Bhaker Pant
{"title":"A Structured Investigation of Network Security Strategies and its Applications","authors":"Shanti Makka, Tripti Misra, Rajesh Deorari, D. Kumar, Vikas Kumar, Bhaker Pant","doi":"10.1109/IC3I56241.2022.10072695","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072695","url":null,"abstract":"Organizations can utilize big data to spread information over a network, analyses vast amounts of complex data, and find hidden trends and correlations. The deployment of a platform that is both effective and secure is required since the information that moves across the networking of an institution is frequently important. Entire network has thus been promoted to the early stages of evaluation in the context of big data. computer protection technologies are created to recognize and thwart possible attacks in a real-time environment. must manage a significant volume of data that is both complex and varied. Unfortunately, because these systems are usually created using outdated techniques, securing vast volumes of information can be difficult. In this post, we’ll mostly talk about information protection for massive volumes of data and network security solutions. We start by talking about the variables that affect network security design in the Big Data environment. Then, we’ll talk about a few big data solutions that provide network-wide data protection in addition to current study findings.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125020324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation and Execution of Blockchain Technology in the Field of Education 区块链技术在教育领域的实施与执行
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072593
Radha Raman Chandan, M. Lourens, K. K. Ramachandran, S. Akram, Rohit Bansal, Dhiraj Kapila
{"title":"Implementation and Execution of Blockchain Technology in the Field of Education","authors":"Radha Raman Chandan, M. Lourens, K. K. Ramachandran, S. Akram, Rohit Bansal, Dhiraj Kapila","doi":"10.1109/IC3I56241.2022.10072593","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072593","url":null,"abstract":"Sharing student educational credentials is a crucial and essential part of the educational system, which includes a variety of stakeholders including students, educational institutions, firms, teachers, and the governing body. Currently, all of these parties must exert a great deal of effort to guarantee the validity and confidentiality of students’ educational credentials. Despite these initiatives, the process of transmitting student educational credentials is difficult, susceptible to mistakes, and not entirely safe. Our goal is to employ blockchain technology to lessen the security concerns that now exist with regard to the sharing of student educational credentials. Thus, this article employs blockchain technology to address security concerns about the sharing of student educational credentials. It suggests a revolutionary blockchain-based architecture, then goes on to describe how to implement it as a decentralized application (DApp). On the basis of the trials run, cost and performance analyses are also done.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125023611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Imep: Influence Maximization on Social Media with the Impact of E-Commerce Products Imep:通过电子商务产品的影响在社交媒体上实现影响力最大化
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072595
A. Mittal, Meenal Arora, A. Rana
{"title":"Imep: Influence Maximization on Social Media with the Impact of E-Commerce Products","authors":"A. Mittal, Meenal Arora, A. Rana","doi":"10.1109/IC3I56241.2022.10072595","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072595","url":null,"abstract":"Friends and family have a large influence on consumer purchasing decisions. Furthermore, many internet users prefer to wait for early adopter reviews before making a purchase decision in order to reduce the risk of adopting a new product. E-commerce corporations actively construct web-based social networks that enable users to share their experiences by submitting evaluations, evaluating other people’s assessments, and talking with genuine members. They act as a starting point for online customers and a means of directing them to other shopping sites. E-commerce companies have recently begun to collect data on consumer social interactions on their websites, with the potential goal of understanding and exploiting social influence in customer purchase decisions to improve customer relationship management and boost sales. This article proposed influence maximization on Social media with the impact of the E-Commerce Products (IMEP) framework. We collect dig and yelp datasets for finding the Social Influence (SI) for E-Commerce Products (EP). The IMEP framework utilized the United Community Recognition algorithm (UCR) to find influence maximization (IM) accuracy. The experimental results are discussed with greedy clustering and the performance measures are compared.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121401881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identifying Face Masks with OpenCv and Deep Learning 识别面具与OpenCv和深度学习
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072790
Alka Kumari, Kishori Shekokar
{"title":"Identifying Face Masks with OpenCv and Deep Learning","authors":"Alka Kumari, Kishori Shekokar","doi":"10.1109/IC3I56241.2022.10072790","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072790","url":null,"abstract":"During the course of this epidemic, the Corona virus had a significant influence not only regular lives but also on international business. Protecting one’s appearance has recently emerged as a widespread fashion trend and can now be considered the norm. In the present day or in the future, a large number of individuals will be obliged to wear masks in order to protect not only themselves but also the people around as well as the surrounding area. Face recognition has emerged as an increasingly vital tool in the fight against global terrorism. As part of this work, we are developing an AI system that will be able to determine whether or not a person is concealing their identity by wearing a mask. It will be of assistance to us in preventing the virus from spreading across the environment. In order to construct this work, we require the assistance of Machine Learning (ML), deep learning (DL), and Neural Network (NN), all of which will assist us in realizing the purpose of this work. We needed jupyter notebook in order to complete this work, and we also needed to install numpy, opencv, tensorflow, and numpy as well as a learning tool. This strategy will assist us in identifying the individual who is concealing their identity by wearing a mask in the imageand in real life picture. Additionally, it is able to recognize and distinguish a moving mask or face.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116776927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Blockchain and Internet of Things (IoT) for Ensuring Privacy and Security of Health Records and Medical Services 区块链和物联网(IoT)在确保健康记录和医疗服务隐私和安全中的应用
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072427
S. Makka, K. Sreenivasulu, B. S. Rawat, Komal Saxena, S. Rajasulochana, Surendra Kumar Shukla
{"title":"Application of Blockchain and Internet of Things (IoT) for Ensuring Privacy and Security of Health Records and Medical Services","authors":"S. Makka, K. Sreenivasulu, B. S. Rawat, Komal Saxena, S. Rajasulochana, Surendra Kumar Shukla","doi":"10.1109/IC3I56241.2022.10072427","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072427","url":null,"abstract":"The research’s introduction primarily focuses on the advantages of putting in place a data security framework to protect all health information. The medical associations should employ IoT and a wifi system to create an effective data security system. It is essential to think about all the benefits and the importance of using an information security management system to keep everything documents pertaining to medical facilities secure. In the study’s evaluation of the data, the advantages of utilising a security control system for information to protect health history are primarily the emphasis. All essential benefits and technology, though, must be primarily focused on managing all data security systems. It is crucial to possess all the knowledge necessary to keep healthcare data safe in order to correctly access all patient data. It is essential to create this data security management to keep all medical records secure and private secure. Two tests—a a one-sample T test and a regression test — were run during the data analysis phase, using the year and the prevalence of cryptography in the healthcare sector as independent variables in each test. An enhanced level of medical record security is the dependent variable. The outcomes were contrasted with the calculated values. The threshold for significance is fixed at 0.05.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122816439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Administration of Digital Identities Using Blockchain 使用区块链的数字身份管理
2022 5th International Conference on Contemporary Computing and Informatics (IC3I) Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072845
S. Kumar, M. Goyal
{"title":"Administration of Digital Identities Using Blockchain","authors":"S. Kumar, M. Goyal","doi":"10.1109/IC3I56241.2022.10072845","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072845","url":null,"abstract":"Since the last two decades, the problem of check theft and the data breaches from centralized systems has gotten worse. In this study, we looked at how blockchain technology is employed in identification systems and how it may be applied to verify an identity’s veracity and legitimacy. The drawbacks of the conventional identification systems were examined in depth, and the advantages of using a Blockchain-based identity system were discussed, including the removal of the middleman and the need for long wait times for verification, authorization, and attestation. Nobody can alter their identification data because the nodes in a blockchain are supposed to be immutable, and because asymmetric cryptography is utilized while sharing data, personal information is kept secure. We were able to effectively establish an identity wallet-a node in a chain on the Ethereum platform-and test a self-sovereign identification system for a single person.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122957354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信