{"title":"Metamorphic Cryptography using 8-Way Dynamic DNA Sequencing & KIMLA Method","authors":"Ritima Tripathi, Lokendra Singh Umarao, Abhinandan Tripathi","doi":"10.1109/icacfct53978.2021.9837376","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837376","url":null,"abstract":"In the digital world transfer of information can take place in secure way by encrypting the secret message and hiding encrypted message in to various multimedia such as text, image, audio & video. Cryptography along with steganography provides security by embedding the encrypted text message in such a way that any intruder is unaware about the message is embedded in it. Cipher text produced by encryption process that create confusion but the concept of steganography hiding doubtful characters of encrypted text message. So, it is well protected. This paper emphasizes on the encryption of secret text message and concealing the encrypted message in to gray scale image. To encrypt the secret text message 8-way dynamic DNA sequencing is used and for further security improved LSB (KIMLA) method has used an image for hiding the encrypted text message. The proposed approach provides better security & also efficient in term of payload capacity and robustness.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125019519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Image Encryption Technique for Reversible Data Hiding using Binary Block Embedding","authors":"Subodh Kumar, Rajendra Kumar","doi":"10.1109/icacfct53978.2021.9837358","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837358","url":null,"abstract":"This paper proposed an improved binary block embedding approach for embedding the “secret data” into any “binary image”. In this approach we propose an algorithm which embeds the secret information into an image after finding the capacity. The proposed method divides the pixel values into good and bad type depending on the pixel values. Embedding rate, block capacity, correlation analysis is deduced for security analysis.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116719465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing A Secure Vehicular Internet of Things (IoT) using Blockchain: A Review","authors":"Atul Lal Shrivastava, Rajendra Kumar Dwivedi","doi":"10.1109/icacfct53978.2021.9837373","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837373","url":null,"abstract":"In the modern era developments in many technologies and customers’ ability to link gadgets such as cellphones to home PCs, the future of IoT is essentially infinite. Despite its growing popularity around the world, the Internet of Things (IoT) still has privacy and security concerns. There are enabling technologies for a variety of essential applications in the vehicular Internet of Things (IoT), such as collaborative automatic driving and enhanced transportation systems. Traditional centralized control fails to provide sufficient quality of service for connected vehicles, due to vehicle mobility, strict application requirements, and limited communication resources. It requires a decentralized approach to meet the needs of delay-sensitive and mission-critical applications. This paper presents a brief survey on Security in Vehicular Internet of Things using blockchain. In this paper, we are going to develop an understanding of the concept of blockchain technology as well as recent research advances. We are going to focus on how to adapt blockchain security to Internet of Vehicles in detail, as well as the available secure options.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122274768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anurag Sinha, Pawan Mishra, Md. Ramish, Hassan Raza Mahmood, K. K. Upadhyay
{"title":"Employing Unsupervised Learning Algorithm for Stock Market Analysis and Prediction","authors":"Anurag Sinha, Pawan Mishra, Md. Ramish, Hassan Raza Mahmood, K. K. Upadhyay","doi":"10.1109/icacfct53978.2021.9837372","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837372","url":null,"abstract":"Predicting the stock market is the typical task because of the unstructured nature of stock market data. There are multiple factors involved like physical, rational, and so on. Thus, all these later aspects make stock prices volatile and extremely hard to estimate accurately. In today’s era, artificial intelligence is playing in front of technological innovation. Every single business is using data science and AI technique directly or indirectly. In that queue machine learning, which is a subset of AI is letting AI systems learn and automate things without being explicitly programmed. In this paper, we have unsupervised a learning algorithm to predict future instances of stock market supplied the volatile and unstructured nature of stock data. The algorithm used in ml is taken from statistics itself and adhere better precision, this, we have used Arima model, LSTM for predicting stock prices with the accuracy of 88.7%.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114502118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of Anxiety and Depression Using DASS-21 Questionnaire and Machine Learning","authors":"Astha Singh, Divya Kumar","doi":"10.1109/icacfct53978.2021.9837365","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837365","url":null,"abstract":"Identification or psychologically associated emotional activities through machine learning techniques and artificial intelligence is found to be widely explored in various research publications. Studies revealed the relevance of machine learning techniques along with artificial intelligence for the recognition of human emotions such as sadness, anger, happiness, etc. using datasets like face image, person video, audio, questionnaire-response, etc. Human emotions come from psychological activities that may he affected by outside daily life routines. The proposed study reveals the configuration of anxiety and depression symptoms from the questionnaire-based dataset. In the present manuscript, we have used the standard DASS-21 questionnaire for the identification of anxiety and depression by applying machine learning algorithms on the user responses. We have analyzed and presented the comparative performance or five classification algorithms i.e., SVM, Decision Trees, Random Forest, Naïve Bayes and KNN on the aforementioned problem of identification of users under Depression and Anxiety.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127493219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of TFET with Ferroelectric Gate Material for Low Power Applications","authors":"Rituraj Kawale, Ankit Pachouri, Yogendra Pratap Singh, Lucky Agarwal","doi":"10.1109/icacfct53978.2021.9837374","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837374","url":null,"abstract":"TFETs are modern emerging structures for scaling the devices at sub-nanometer regime to continue with Moore’s law. To upsurge the performance of TFETs, a negative capacitance concept has been introduced. Moreover, its performance can be enhanced by using Ferroelectric material as a gate oxide material. In the current paper, it has been observed that the channel surface potential amplification induced by the negative capacitance effect gives the desired characteristics of FETs. The TFETs exhibits better control of short channel effects (SCEs) over the FinFET device. The significance of the ferroelectric material with a variation of oxide length poses the use of TFETs to procure the better performance such as high on-current (Ion), lower DIBL, and smaller subthreshold swing (SS). The simulation was carried by SILVACO ATLAS, and it shows that TFETs device with ferroelectric material as a gate oxide draws attention for low power application.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126696827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crop Disease Classification Through Image Processing and Machine Learning Techniques Using Leaf Images","authors":"Vibhor Kumar Vishnoi, K. Kumar, B. Kumar","doi":"10.1109/icacfct53978.2021.9837353","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837353","url":null,"abstract":"The role of the agriculture sector in global economic development is important. The development of agriculture and growth in production is essential for achieving global food security. Diseases in plants/crops are the responsible agents for the loss of agricultural production globally. Most of the diseases in plants initially strike the leaves of the plant, later its symptoms are evident on all parts of the plant. The diseases significantly affect the quality and quantity of total crop production. Typically, plant diseases are identified through visual observation or laboratory investigations by phytopathologists, but this is very challenging for farmers or non-specialists. Image processing and machine learning together can play an important role in helping farmers to identify the diseases in crops. The major steps in such methods generally include image acquisition, image pre-processing, image segmentation, feature extraction, and disease classification. This paper presents an analysis of some of the major classification techniques used in such methods. The experiments are carried out for two important crops Apple (Malus domestica) and Blackgram (Vigna mungo) to analyze baseline classifiers such as decision tree, naive Bayes, logistic regression, k-nearest neighbor, linear discriminant analysis, support vector machine, and random forest using plant leaf images. The leaf images of apple are taken from a benchmark PlantVillage dataset, while images of blackgram (urdbean) leaves are obtained from a self-prepared dataset. In both datasets, the leaf images contain a simple eliminated background.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of a Hybrid Medium Access Control Protocol for Machine-to-Machine Networks","authors":"Rohit Khatri, Ansh Verma, P. Verma, R. Verma","doi":"10.1109/icacfct53978.2021.9837337","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837337","url":null,"abstract":"A hybrid medium access control protocol is discussed that combines slotted-ALOHA and time division multiple access technique. Here, the network operates on frame-by-frame basis where each frame contains a contention and a reservation part. The performance of the network is measured in terms of three parameters: throughput, average packet delay and reservation ratio. The objective of this paper is to find duration of contention period (CP) in a frame at which the performance of the network is maximum. To achieve this, an optimization problem is identified and a method, which uses MATLAB, is discussed to solve this problem. Moreover, the variation of parameters with data traffic is presented and the obtained results are compared with a related work already done, and our results show an average deterioration of 32.49% in throughput, improvement of 84.02% in average packet delay and, improvement of 86% in reservation ratio.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116754095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wind Turbine Fed Dynamic Voltage Restorer Using Fuzzy Logic Controller for Voltage Disturbance Mitigation","authors":"Apoorva Srivastava, K. Kumar, Akhilesh Kr. Maurya","doi":"10.1109/icacfct53978.2021.9837378","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837378","url":null,"abstract":"In order to mitigate disturbances in the distributed system the use of Dynamic Voltage Restorer plays a very important role. A DVR deployed in a wind system which is connected to the grid, is typically used to protect voltage across grid voltage swell and sag which behaves normally under nominal voltage condition across the grid. Therefore for improving DVR’s utilities, this paper proposes the correctness of swell and sag conditions for voltages across the grid, a wind farm is to be included in the DVR so that the same DVR is used to generate energy and fed to the grid from wind farm. The current model makes use of a wind turbine to power Dynamic Voltage Restorer fed by Permanent Magnet Synchronous Generator (WT-PMSG-DVR). The paper presents DVR with fuzzy logic controller which is connected across the wind systems. Propose technique like DVR design to compensate for disturbances in voltages like swell or sag for keeping the load voltages at the desired level. The performance of a traditional DVR topologies can be improved by using controlled strategies like FLC. Simulink modelling depicts use of wind system having DVR functioning in order to compensate for voltage variations. In a MATLAB/SIMULINK environment, performances in WT-PMSG-DVR with controlling techniques like FLC and traditional Proportional Integral (PI) controller was compared. Simulations show that when DVR is supplied from a wind farm, it performs better.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126341216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Security Attacks in Healthcare and associated Cyber-harms","authors":"M. Aijaz, Mohammed Nazir, Malik Nadeem Anwar","doi":"10.1109/icacfct53978.2021.9837349","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837349","url":null,"abstract":"The integration of various technologies into healthcare systems provide numerous benefits to end-users. However, these technologies also bring a variety of security attacks aimed at patient data, healthcare operations, and critical assets. These attacks cause harm to patients and healthcare organizations alike. However, there is a lack of appropriate methods for classifying and analyzing these attacks. This paper provides an in-depth insight into the potential attacks to the healthcare system via a taxonomy. It also discusses the associated harms, countermeasures and propagation of harms in the whole system. Overall, this research aims to increase the awareness of the stakeholders by enabling them to identify the potential security attacks, associated cyber-harms and the corresponding mitigations.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122881400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}