Atul Gupta, Vivek Srivastava, P. Choudekar, R. Ruchira
{"title":"IOT Enabled Home Automation Over Cloud","authors":"Atul Gupta, Vivek Srivastava, P. Choudekar, R. Ruchira","doi":"10.1109/CISES54857.2022.9844336","DOIUrl":"https://doi.org/10.1109/CISES54857.2022.9844336","url":null,"abstract":"This paper describes the design and development of a home automation system that links its component parts using Wi-Fi technology as the network architecture. Essentially, the proposed system comprises of just two parts. The server (web server), which regulates, coordinates, and keeps an eye on users' homes, is the crucial component because it houses the system's brain. Users and system administrators have local (LAN) and remote (Internet) access to manage and control system code (internet). The system supports a variety of home automation systems, including power management and security components. The suggested technique is more flexible and scalable than current home automation systems. Goal of the work is to utilize easily available electronics modules to implement a cost effective, Compact and efficient home automation project. We made a system which gives service at low cost compared to the cost of the on the market, there are a variety of home automation systems. and it is also very compact.","PeriodicalId":284783,"journal":{"name":"2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130635784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anurag Panwar, A. Singh, Akash Dixit, Gaurav Parashar
{"title":"Cloud Computing and Load Balancing: A Review","authors":"Anurag Panwar, A. Singh, Akash Dixit, Gaurav Parashar","doi":"10.1109/CISES54857.2022.9844367","DOIUrl":"https://doi.org/10.1109/CISES54857.2022.9844367","url":null,"abstract":"This study assesses the literature reviews and focuses on the present load balancing algorithms and the present condition of cloud computing. We used the standard systematic literature review method employing a search of 200 papers based on the total citations of the papers from 2018 to 2021. We screened 35 publications for inclusion and exclusion criteria before studying them and their proposed algorithms to address the four research questions and assess the paper’s quality. The algorithms proposed by various researchers were tested against the present and common load balancing techniques. As a result of the study findings, we determined that the best load balancing approach was a Hybrid Firefly, and Improved Particle Swarm Optimization.","PeriodicalId":284783,"journal":{"name":"2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121297801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashutosh Kumar Singh, Adarsh Singh, Brijesh Kumar Singh, A. Kumar, S. P. Singh
{"title":"STFT Based Classification for DNA Sequence","authors":"Ashutosh Kumar Singh, Adarsh Singh, Brijesh Kumar Singh, A. Kumar, S. P. Singh","doi":"10.1109/CISES54857.2022.9844337","DOIUrl":"https://doi.org/10.1109/CISES54857.2022.9844337","url":null,"abstract":"Genomic signal processing (GSP) focuses on the study of genomic data using digital signal processing technologies. Genomic data must be transformed or mapped to a numeric representation before tools of digital signal processing can be used. There are various DNA numeric representations (DNR) techniques such as Voss vector representation, integer sequence representation, real sequence representation, atomic number numerical representation, EIIP sequence representation, etc. In this paper, we have represented DNA sequence into numeric representations and then used short-time Fourier transform (STFT) for evaluation of PSD and correlation sequence of DNA. Genetic data can be used to identify patients who are at high risk of getting certain diseases and in this way, GSP can be used for better treatments of patients.","PeriodicalId":284783,"journal":{"name":"2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121437341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashutosh Kumar Singh, Sanjeev Kumar, A. Kumar, Mohd Usama
{"title":"Machine Learning based Intrusion Detection System for Minority Attacks Classification","authors":"Ashutosh Kumar Singh, Sanjeev Kumar, A. Kumar, Mohd Usama","doi":"10.1109/CISES54857.2022.9844381","DOIUrl":"https://doi.org/10.1109/CISES54857.2022.9844381","url":null,"abstract":"With the fast usage of internet services, the Internet of Things (IoT) and edge machines are also connecting to the World Wide Web (WWW). The frequent utilization of these devices poses a significant amount of challenge to network security researchers to deal with advanced or sophisticated cyber threats. Traditional based antiviruses and Intrusion detection system (IDS) mechanisms failed to detect advanced cyber threats like minority and majority attacks. Therefore, an efficient mechanism is required to counter this type of cyber-attacks. This paper introduces an efficient IDS mechanism using several supervised machine learning algorithms. The machine learning classifiers are performed on the CIC-IDS dataset 2017 to analyze and inspect the performance of the presented model. The presented method displayed the average accuracy (99%), recall (100%) for four classifiers, namely, Random Forest (RF), Decision Tree (DT), Extra Tree (ET), and K-Nearest Neighbor (K-NN).","PeriodicalId":284783,"journal":{"name":"2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122691566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Localization in Internet of Things: Techniques, Approaches, Technologies and Challenges","authors":"Gaurav Bhatia, Neeraj Jain","doi":"10.1109/CISES54857.2022.9844376","DOIUrl":"https://doi.org/10.1109/CISES54857.2022.9844376","url":null,"abstract":"In present scenario, the Internet of Things (IoT) has rapidly become a major use in people’s modern life. A network defines number of heterogeneous devices using a single communication like Wi-Fi, Bluetooth etc. In today’s real world, there are many ways to connect with the IoT object. IoT uses many technologies like Wi-Fi, GPRS, 5G etc. for identifying the location of an object. The objects can be of different categories like any device, home appliances, vehicle, building, machines etc. It is difficult to communicate with these objects using above technology either we are live in smart building or in smart cities. The major challenges in indoor is the presence of small obstacles, as of which finding the accurate location of an object is difficult compare to outer localization. So many algorithms developed for localization in both indoor and outdoor environment.","PeriodicalId":284783,"journal":{"name":"2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123613746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Story Clustering using K-Means Algorithm in Agile Requirement Engineering","authors":"B. Kumar, U. Tiwari, D. Dobhal, H. Negi","doi":"10.1109/CISES54857.2022.9844390","DOIUrl":"https://doi.org/10.1109/CISES54857.2022.9844390","url":null,"abstract":"In Agile software development user story plays an important role. User story is the concept of requirement engineering that manages requirements in the form of text as software requirement specification maintained in traditional development models. Proper format is used to write the user story which is easily understandable. The impact of poor user story design may lead to modifications in later phases of development. It also places negative impression on the customer, project and development team as well. Therefore the analysis of these user stories is necessary before they are assigned to the development team. In this paper we propose an approach of user story clustering using k-means algorithm to analyze these user stories. Through this approach similar user stories are clustered on the basis of similarity measures. Our experimental results show that as the value of k increases the quality of resulting cluster improves. To generate balanced clusters our approach uses tf-idf which is comparatively better than count vectorizer. This approach reduces the implementation time of requirements and hence the overall development life cycle of the software. To illustrate our approach we use a case study considering various user stories.","PeriodicalId":284783,"journal":{"name":"2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121357736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improve the Response Time with Content Mining based Web Page Ranking","authors":"P. Sharma, Divakar Yadav, A. Dumka","doi":"10.1109/CISES54857.2022.9844368","DOIUrl":"https://doi.org/10.1109/CISES54857.2022.9844368","url":null,"abstract":"The existing information retrieval systems use page ranking algorithms that rely solely on analysis of linked information and examination of text content of the linked sites resulting in retrieval of a huge collection of web pages by the user for a given query. Whereas it is required that the information retrieval system shall re-rank search results according to their relevancy with respect to the user query. In this paper we propose a mechanism to improve the response time using a novel content based web page ranking mechanism deployed at a proxy server that not only measures the quality of the webpages as per the relevance of the user query but also attempts to reduce the delay in response (perceived latency).","PeriodicalId":284783,"journal":{"name":"2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124359815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified Identify and Broadcast-based Encryption Scheme to Secure Cloud","authors":"Urvashi Rahul Saxena, Taj Alam","doi":"10.1109/CISES54857.2022.9844395","DOIUrl":"https://doi.org/10.1109/CISES54857.2022.9844395","url":null,"abstract":"Cloud computing is foreseen as the lineage framework model for Distributed Computing Environment and has escalated itself in due course of time owing to the advantages it provides to its service users, and also due to the unfolding ease, it renders to its customers. In recent times, especially because of pandemics, there has been a tremendous acceleration and dependency on the cloud environment and a sudden outburst in the increase of cloud users. However, it is significant to mention that the Cloud environment is quite susceptible to numerous attacks from intruders, thereby resulting in jeopardizing the system security and user privacy. Hence, one of the biggest challenges encountered by the researchers in the cloud domain is to propose algorithmic approaches or frameworks that ensure cloud security and maintain data integrity. Service users often hesitate to synchronize and store their data to cloud since they are not sure if their data privacy and confidentiality on the cloud environment will be preserved or compromised. This vulnerability of cloud systems eventually hinders cloud storage development. The objective of this paper is to project the trajectory towards maintaining privacy of the user data by assigning a restricted grant of permission to the user data stored on the cloud using cryptographic techniques. This work demonstrates an approach through which Identity validation along with Broadcast based Encryption mechanism aims to secure cloud data. This work depicts the functionality of various modules like set-up, encryption, and decryption processes, and the work is then finally compared with its peer research works based on the revocation rate.","PeriodicalId":284783,"journal":{"name":"2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126885254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruba M. Alhejaili, W. Yafooz, Abdullah A. Alsaeedi
{"title":"Hate Speech and Abusive Laungage Detection In Twitter and Challenges: Review","authors":"Ruba M. Alhejaili, W. Yafooz, Abdullah A. Alsaeedi","doi":"10.1109/CISES54857.2022.9844317","DOIUrl":"https://doi.org/10.1109/CISES54857.2022.9844317","url":null,"abstract":"The web' content is increasing every day, especially on social media, where all users can express their opinions freely and without restrictions. Accordingly, many negative activities emerged, such as abusive language, racism, and hate speech. Hate speech or abusive language is a manifestation of negative social media that requires tools to detect it. This work provides a comprehensive view of the concepts of abusive language and hate speech. The methods used for detection will also be presented. The paper also reviews previous studies in this field. Finally, the paper recalls the challenges facing the detection of abusive language or hate speech.","PeriodicalId":284783,"journal":{"name":"2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126959314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Title Page","authors":"GL Bajaj","doi":"10.1109/rtas.2019.00001","DOIUrl":"https://doi.org/10.1109/rtas.2019.00001","url":null,"abstract":"","PeriodicalId":284783,"journal":{"name":"2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131918356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}