2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)最新文献

筛选
英文 中文
Intelligent Transport System using Cloud Computing & PSY Key Generation for V2V Communication 基于云计算的智能交通系统&车对车通信的PSY密钥生成
Prdeep Kumar K, Salma Itagi, Nagarathna C, A. S, S. N
{"title":"Intelligent Transport System using Cloud Computing & PSY Key Generation for V2V Communication","authors":"Prdeep Kumar K, Salma Itagi, Nagarathna C, A. S, S. N","doi":"10.1109/CCIP57447.2022.10058634","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058634","url":null,"abstract":"The Internet of Things (IoT) connects many sensors to the internet so that it will provide services and applications for smart cities. Vehicles connected to the internet can communicate, sense, analyze and also make decision on their own. Vehicular Cloud (VC) is new idea proposed to enhance vehicular services through mobile cloud computing and networking. This proposed paper highlights an Intelligent Transportation System (ITS) which provides creative applications and services related to traffic management and also to access the information for various users. A model is developed taking picture of vehicles in detail, time of availability of vehicle in a given region. A new paradigm to collect the data for tracking the intelligent system in vehicular communication is considered. The simulation results are produced regarding involvement of vehicles in low percentage in dynamic VCN which provides data for intelligent system.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124438035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aadhaar Secure: An Authentication System for Aadhaar Base Citizen Services using Blockchain Aadhaar Secure:使用区块链的Aadhaar基础公民服务认证系统
Veena N, Thejaswini S
{"title":"Aadhaar Secure: An Authentication System for Aadhaar Base Citizen Services using Blockchain","authors":"Veena N, Thejaswini S","doi":"10.1109/CCIP57447.2022.10058669","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058669","url":null,"abstract":"In the past decades, people had to carry a bunch of documents for acquiring citizen beneficiary services such as opening a bank account, issue of a new sim card, new gas connection, Pradhan Mantri Jan Dhan Yojana etc. In this digital era, Aadhaar is acting as the driving force to gain all citizen services. Unfortunately, lot of security breaches have been occurred on compromising the Aadhaar details which is stored in the database. Providing security to Aadhaar data and mitigate the misuse of other's Aadhaar data to gain citizen services by unauthenticated users is a main concern. Hence, a secure and authenticated system is required to store and use the Aadhaar details securely by authenticated user. In this paper, we are proposing a secure authenticated system which uses IPFS to store finger prints of the customers and blockchain is used to store the Aadhaar details of the registered citizens. In this system, the biometric is integrated with blockchain to secure Aadhaar details and authenticate the customers before providing any citizen services. The system also generates the Aadhaar card after passing redundancy check for customers who do not have Aadhaar card to access the citizen services. The system is tested and verified for multiple citizen services.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127977242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Based Smart Blind Stick Using GPS and GSM Module 基于物联网的智能盲棒,使用GPS和GSM模块
Punyashree B, Shalparni P Y, Sushma D, M. Dakshayini
{"title":"IoT Based Smart Blind Stick Using GPS and GSM Module","authors":"Punyashree B, Shalparni P Y, Sushma D, M. Dakshayini","doi":"10.1109/CCIP57447.2022.10058668","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058668","url":null,"abstract":"It is unsafe for visually challenged people to move on a busy road. It may lead to some accidents, when they get some obstacles on their way and are not able to identify them, which may not be known to their parents or guardians. Without having some kind of navigator, it is challenging for such people to navigate their surroundings and commute. Hence, we propose an IOT based navigating solution, the smart blind stick equipped with an ultrasonic distance sensor to identify obstacles and also the GPS system to help their parents and guardians to know their location. GSM module is used to send SoS messages to particular people in case of emergency. The smart blind stick is a tool for defining their environment. Smart Stick, ensures the security and effective mobility of visually challenged people. This is useful to avoid abstractions and help them in easy commuting and to send emergency message alerts.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121326938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Approaches to Improve the Production of Cost-Effective Software Artifacts 改进具有成本效益的软件工件生产的新方法
N. E., Niranjanamurthy M, A. J, Dayananda P
{"title":"Novel Approaches to Improve the Production of Cost-Effective Software Artifacts","authors":"N. E., Niranjanamurthy M, A. J, Dayananda P","doi":"10.1109/CCIP57447.2022.10058661","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058661","url":null,"abstract":"For more than 5 decades, the software has made enormous computing facilities for mankind to optimize individual actions in almost all sectors of society, but design and implementation have become a challenging discipline. Many software problems include cost overruns, project cancelations, extending schedules, high maintenance costs, etc., and these problems are caused by several factors. Measuring the quality after the development activity does not reduce the cost of producing the software as the technology and requirements change from day-to-day life. So, quantitative analysis at the analysis and design level has the scope to reduce the overall cost of software development. So far, there is no optimum method(s) to predict the analysis and design quality of an object-oriented software system. Because of object-oriented and heterogeneous projects, the quality is depended on the producer of the software and the amount of object orientation involved in the software. Alternatively, the cost can be reduced after the software delivery by applying novel ideas/approaches/methodologies/techniques in the process of software development.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116886895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficacious Opportunities and Implications of Virtual Reality Features and Techniques 虚拟现实特性和技术的有效机会和含义
B. Nithva, V. Asha, K. Kumar, Jitendra Giri
{"title":"Efficacious Opportunities and Implications of Virtual Reality Features and Techniques","authors":"B. Nithva, V. Asha, K. Kumar, Jitendra Giri","doi":"10.1109/CCIP57447.2022.10058642","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058642","url":null,"abstract":"Virtual Reality (VR) is a computer-generated environment that allows the user to interact with the environment virtually. It provides visualization to feel the virtual environment similar to the real world. Augmented reality, virtual reality, and mixed reality are commonly used in extended reality. Virtual reality is completely based on technology, it acts as an intermediator between humans and the real world. There are various input and output devices that are used for generating a virtual reality environment. VR techniques are currently used in numerous fields like education, entertainment, gaming. Primarily, the paper has elaborated on Virtual Reality with its significance. The importance and need for virtual reality are conferred with its impact in the modern world. The framework of Virtual Reality and the steps leading to its development over the years has been elaborated. Various tools and techniques used in VR, the applications of VR in the current world and the implication of VR for the future are emphasized.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117088453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Performance Comparison using QR Code through Blockchain Technology 通过区块链技术使用QR码的安全性和性能比较
Sonali Dash, Rajasekar V
{"title":"Security and Performance Comparison using QR Code through Blockchain Technology","authors":"Sonali Dash, Rajasekar V","doi":"10.1109/CCIP57447.2022.10058672","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058672","url":null,"abstract":"Advances and transitions in healthcare system is constantly changing and acquiring fresh forms. The requirement of modern smart health systems is to protect sensitive patient data from attacks by potential adversaries. The secure data access mechanism ensures that only authorized personnel can access patient's health information. Therefore, in distributed method, it protects data in the healthcare system. Here it provides patients and doctors with an efficient and secure access mechanism based on blockchain data collection. In this health system the proposed system can also protect the privacy of patients. Security analysis depends upon architecture to prevent from attacks and maintain integrity of system. In addition, the implementation of system based Ethereum used for feasibility test of proposed system. By hiding private information in the coverage environment in a way that a third party cannot discover this confidential information. In today's era, with the emergence of new technologies, QR codes have become one of the most popular codes. Provide mechanisms for protecting sensitive information QR codes are the most reliable method of hiding data because they do not use error correction levels and because it is difficult to change the encoded information. The process is divided into different categories, and various statistical parameters are used to evaluate its performance.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Degree Issuing and Verification Using Blockchain 使用区块链的数字学位颁发和验证
Subhajit Halder, H. A. Kumar, Shantanu Lavu, Reeja S R
{"title":"Digital Degree Issuing and Verification Using Blockchain","authors":"Subhajit Halder, H. A. Kumar, Shantanu Lavu, Reeja S R","doi":"10.1109/CCIP57447.2022.10058644","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058644","url":null,"abstract":"Blockchain is a distributed, secure, and quick shared immutable ledger. They are transparent, non-modifiable, and technically impenetrable. Any asset may be tracked and recorded using blockchain, which lowers risk. More effectively than other existing systems, blockchain can address current problems. We may use it to secure the existing academic model and change it. As a result, there is a lot of potential for this technology to lead to numerous advancements. One of the most crucial documents for students to have is an academic certificate, which is granted by educational institutions, when applying for jobs, taking tests, applying for higher education, etc. There are several opportunities to produce false academic certifications because the current system for awarding certificates is not at all effectively auditable. The distributed ledger characteristic of the blockchain technology can be used to combat the forged and fake certificates in order to resolve this issue. Our decentralised blockchain application aims to correct this. Since it would be connected to our certificate, we will also use the Aadhar card to increase its authenticity. They will be kept on distributed file systems called IPFS servers.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114566154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video Deduplication using CNN(Conv2d) and SHA-256 hashing 视频重复数据删除采用CNN(Conv2d)和SHA-256哈希
Sriraksha Pj, S. Chaudhari, A. R.
{"title":"Video Deduplication using CNN(Conv2d) and SHA-256 hashing","authors":"Sriraksha Pj, S. Chaudhari, A. R.","doi":"10.1109/CCIP57447.2022.10058663","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058663","url":null,"abstract":"We all know that there is an exponential growth in the production of digital data. The user of the internet approaches the cloud service providers to upload the video data into the cloud. The cost and size of the digital videos is huge. Hence there is great need for techniques which aims at optimizing the cost and size for storing the data. This paper provides a comprehensive overview of video deduplication system by extracting the global and local features of the video. The major techniques employed in the process of video deduplication are Conv2d i.e., CNN algorithm to extract the local features of the video and hashing algorithms like SHA-256 to extract the global features of the video.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127315007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Algorithmic determination for the secure dominance in a fuzzy network and its application in medical diagnosis 模糊网络安全优势的确定算法及其在医疗诊断中的应用
S. Sivasankar, Syed Ibrahim Maaz
{"title":"An Algorithmic determination for the secure dominance in a fuzzy network and its application in medical diagnosis","authors":"S. Sivasankar, Syed Ibrahim Maaz","doi":"10.1109/CCIP57447.2022.10058680","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058680","url":null,"abstract":"In communication networks, secure connectivity is critical. The failure of a dominant node may jeopardize the network's stability. As the network grows in size, it becomes increasingly difficult to maintain track of all of its dominant nodes and secure connections. As a result, large network analysis can be performed quickly and easily using a computer system that understands networks as matrices, and a fit algorithm will make calculating work simple and quick. In this paper, we present two algorithms for determining the dominance number and secure dominance number of a fuzzy network, with the objective of comparing the concepts of dominance and secure dominance in a fuzzy structure to diagnose the patient symptoms which guide them to appropriate medical treatment.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"8 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123593295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prognostic Evaluation of Cervical Cancer Using Various Classifiers 不同分类对宫颈癌预后的评价
T. Thotakura, Sumitra Kopparapu, Reeja S R
{"title":"Prognostic Evaluation of Cervical Cancer Using Various Classifiers","authors":"T. Thotakura, Sumitra Kopparapu, Reeja S R","doi":"10.1109/CCIP57447.2022.10058662","DOIUrl":"https://doi.org/10.1109/CCIP57447.2022.10058662","url":null,"abstract":"Cervical HPV (human papillomavirus) infection is almost invariably the prominent reason for cervical cancer. The most prevalent malignancy in female is cervical cancer and it substantially affects the risk factor for mortality. Cervical cancer is bound by a wide range of risk factors. Analyzing risk factors from each patient's medical history and screening outcomes, we created a prediction model in this study to forecast the course of cervical cancer patients. Early detection and diagnosis are the most effective methods of lowering the incidence of cervical cancer globally since it is a condition that is largely preventable. Early detection of the signs of this gynecologic disease can be challenging, particularly in nations without screening systems. Machine learning techniques can be utilized to identify malignant cancerous cells when cervical cancer was first discovered. We created a machine-learning technique that can handle massive volumes of data concurrently with greater accuracy. Based upon many parameters, such as age and lifestyle, can forecast a person's likelihood of developing cervical cancer. A Kaggle data repository Cervical Cancer dataset was retrieved, it had eight hundred and fifty-eight unique data sets from distinct cases involving thirty-six variants comprised of diverse risk and protective factors. And it had four types of attributes: Cytology, Hinselmann, Biopsy, and Schiller. Using these class attributes as a basis, this dataset was divided into four groups. To detect cancer and facilitate prompt identification, ML classification algorithms like Decision Trees (DT), Logistic Regression (LR), Random Forest (RT), Support vector machines (SVM), AdaBoost, and artificial neural networks have been implemented. After gathering the data, in order to investigate the prevalence of characteristics and interconnections between numerous unrelated parameters and the propensity to acquire cervical malignancy, we first carried out a descriptive statistical study. According to the study's inferences, appropriate network architecture, categorization, and ML algorithms are capable of properly and effectively detecting Cervical Cancer in its early stages utilizing diagnostic information. Eventually, while comparing the acquired outcomes, we scrutinized that SVM, AdaBoost, DT, and LR algorithms had exhibited hundred percentage of performance, while RF and ANN algorithms seemed to have ninety-nine percentage of performance. Since the goal of our research was an early cancer forecast. Than such, we suggest that future research should take into account expanding patient histories, for example, by integrating primary health information before hospital referral.","PeriodicalId":309964,"journal":{"name":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128283263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信