{"title":"Identification of Security Requirements from the Selected Set of Requirements under Fuzzy Environment","authors":"Javed Ahmad, C. W. Mohammad, M. Sadiq","doi":"10.1109/ICCCIS51004.2021.9397153","DOIUrl":"https://doi.org/10.1109/ICCCIS51004.2021.9397153","url":null,"abstract":"The elicitation of software requirements is an essential activity of requirement engineering whose task is to collect, gather, or identity the stakeholders requirements. The requirements elicited are of various types like performance requirements, testing requirements, system requirements, functional requirements, etc. according to the need of the stakeholders. Among all the requirements, security requirements play a crucial role to safeguard valuable information from unauthorized users in an organization. In our review process, we found that security requirements elicitation methods lack in answering that how to gather the security requirements from the selected set of functional requirements when stakeholders take part in decision making process and preferences of the software requirements are specified by the use of linguistic variables. Therefore, in order to tackle this problem, in this paper, for the selection of security requirements we propose a fuzzy-based method, so that identification, authentication, and authorization of security requirements can be elicited only for those requirements which are important according to the security point of view. The applicability of the proposed method is discussed by means of an example.","PeriodicalId":316752,"journal":{"name":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128102667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexible Circularly Polarized Antenna for LTE-V2X/5G Vehicular Safety Applications","authors":"S. Virothu, M. Satya Anuradha","doi":"10.1109/ICCCIS51004.2021.9397124","DOIUrl":"https://doi.org/10.1109/ICCCIS51004.2021.9397124","url":null,"abstract":"A circularly polarized wideband antenna for wireless and vehicle-to-everything (V2X) applications is presented in this work. Investigations are carried out on connected vehicles for road safety applications in the 3.4 GHz to 3.8 GHz frequency band. The chosen band facilitates wide-area connectivity and reduces the propagation effects at the 5.9 GHz dedicated short-range communication (DSRC) band. Supporting rising media like stream video and other V2N applications, the 5G services in the 3.4 GHz - 3.8 GHz licensed band is a crucial requirement. This work concentrates on the design of two CPW fed flexible circularly polarized antennas to operate in the frequency range of 2 GHz to 5 GHz to cover 3.4 GHz - 3.8 GHz and LTE 2600 MHz (Uplink: 2500 MHz - 2570 MHz and Downlink: 2620 MHz - 2690 MHz) frequency bands. Here cylindrical curvature is considered to place the antenna structure. Polyimide material is selected for the fabrication of antenna models. The effect of curvature on performance metrics such as S11, axial ratio, and gain is studied here. The experimented results are in close agreement with simulation results. The antenna structure is simulated in a virtual vehicular environment using the Ansys Savant SBR technique. The antenna is placed on the vehicle rooftop and side-view mirror positions to study the antenna far-field patterns in the vehicular applications. From the results, the designed circularly polarized antennas cover 2.5 GHz - 2.57 GHz and 2.62-2.69 GHz and 3.4 GHz - 3.8 GHz bands with sufficient gain (more than 3.2 dB).","PeriodicalId":316752,"journal":{"name":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125673719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Vehicle Detection through Aerial Images: Various Challenges, Issues and Applications","authors":"Sandeep Kumar, E. G. Rajan, S. Rani","doi":"10.1109/ICCCIS51004.2021.9397116","DOIUrl":"https://doi.org/10.1109/ICCCIS51004.2021.9397116","url":null,"abstract":"Nowadays vehicle detection and counting at the border of countries, as well as states/cities, has become popular through aerial images because of security concerns. It will play a vital role to reduce the various crimes i.e. (children kidnapping, drug/alcohol smuggling, traffic misconduct, weapons smuggling, sexual misconduct and mission of country-related crime, etc.) at the border of the cities as well as countries. Vehicle detection and counting have various other applications like traffic management, parking allotment, tracking the rescue vehicle in hill areas, digital watermarking, vehicle tracking at the toll plaza and urban planning, etc. However, vehicle detection and counting task are very challenging and difficult because of the complex background, the small size of the vehicle, other similar visual appearance objects, distance, etc. Till now, traditional methodology introduced several robust algorithms which has limitations while extracting the features from aerial images. Recently, deep learning-based algorithms introduced and the outcomes of these algorithms are robust for such kind of applications in the area of computer vision. But accuracy of these algorithms is not optimized in aerial images because the deep learning algorithm required a huge amount of data to train the machine and the size of the object in aerial images is also too small. All these factors affecting the efficiency of the real-time device. This paper provides a brief description of traditional algorithms as well as machine learning and deep learning concepts to identifying the object through aerial images. The study has shown the comprehensive analysis of benchmark datasets and their parameters and corresponding challenges used by researchers and scientists in the area of object detection/tracking through aerial images","PeriodicalId":316752,"journal":{"name":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115876750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Nagaraju, Dr. S. K. V. Jayakumar, S.SHANMUGA Priya
{"title":"An Effective Mutual Authentication Scheme for Provisioning Reliable Cloud Computing Services","authors":"S. Nagaraju, Dr. S. K. V. Jayakumar, S.SHANMUGA Priya","doi":"10.1109/ICCCIS51004.2021.9397113","DOIUrl":"https://doi.org/10.1109/ICCCIS51004.2021.9397113","url":null,"abstract":"Cloud computing facilitates an economic data storage, expertise software, and scalable computing resources through infrastructure, platform, and software (as a service). However, due to the non-transparent and openness of cloud computing, security is the pressing issue that may hamper the adoption and growth of cloud services. Moreover, conventional authentication management solutions are inadequate and cannot be directly adopted in cloud computing environments. Existing schemes have addressed the above issue, and a comprehensive study of the literature helped in formulating the current research. This research intends to develop an effective mutual authentication scheme for reliable cloud service provisioning. The performance is analysed in terms of computational overhead, communication cost, and resistance to various security characteristics.","PeriodicalId":316752,"journal":{"name":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132083913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design Robust Secured Communication for Untrusted Miso CRNs","authors":"Nikhil Ranjan","doi":"10.1109/ICCCIS51004.2021.9397240","DOIUrl":"https://doi.org/10.1109/ICCCIS51004.2021.9397240","url":null,"abstract":"In the spectrum sensing, hidden node issue is a most challenges. which occurs when the CR is shadowed, in severe multipath fading or inside multistory with high penetration loss, while a PU is working in the vicinity Behind the reason of hidden node, a CR may fail to notice the presence of the PU and then will access the licensed channel and cause interference to the authorized model. To solve the hidden node issue in CRNs, multiple cognitive users can cooperate to conduct spectrum detecting. It has been represented that spectrum detecting improvement can be higher with an increase of the number of cooperative groups.In this paper to locate the quantity of optimal users in a situation to upgrade the discovery likelihood and reduce overhead leading better utilization of resources. The MOP are utilizing to locate an ideal estimation of threshold. The high rate of interference and Noise creates untrusted scenario of transmission. This scenario compromised with security threats of communication. For the minimization of untrusted signal used ANN(artificial neural network). The ANN model work as signal filter. The design signal filter work with feedback process. The design algorithm reduces the security risk of transmission and provide reliable secured communication in cognitive radio network. Here our organization of paper, section I-introduction, section- previous work done, section III-methodology,section IV-result analysis finally section V- conclusion & future work.","PeriodicalId":316752,"journal":{"name":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130394343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defense Against Frequency Analysis In Elliptic Curve Cryptography Using K-Means Clustering","authors":"Bh. Padma, D. Chandravathi, Lanka Pratibha","doi":"10.1109/ICCCIS51004.2021.9397065","DOIUrl":"https://doi.org/10.1109/ICCCIS51004.2021.9397065","url":null,"abstract":"Elliptic Curve Cryptography (ECC) is a revolution in asymmetric key cryptography which is based on the hardness of discrete logarithms. ECC offers lightweight encryption as it presents equal security for smaller keys, and reduces processing overhead. But asymmetric schemes are vulnerable to several cryptographic attacks such as plaintext attacks, known cipher text attacks etc. Frequency analysis is a type of cipher text attack which is a passive traffic analysis scenario, where an opponent studies the frequency or occurrence of single letter or groups of letters in a cipher text to predict the plain text part. Block cipher modes are not used in asymmetric key encryption because encrypting many blocks with an asymmetric scheme is literally slow and CBC propagates transmission errors. Therefore, in this research we present a new approach to defence against frequency analysis in ECC using K-Means clustering to defence against Frequency Analysis. In this proposed methodology, security of ECC against frequency analysis is achieved by clustering the points of the curve and selecting different cluster for encoding a text each time it is encrypted. This technique destroys the regularities in the cipher text and thereby guards against cipher text attacks.","PeriodicalId":316752,"journal":{"name":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131806967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Slotted Wideband Frequency Selective Reflectors for Sub-6 GHz 5G Devices","authors":"Ankush Kapoor, Ranjan Mishra, P. Kumar","doi":"10.1109/ICCCIS51004.2021.9397157","DOIUrl":"https://doi.org/10.1109/ICCCIS51004.2021.9397157","url":null,"abstract":"Due to the large spectrum usage, frequency selective surfaces (FSS) are of considerable importance. A study of numerous slotted frequency selective reflectors (SFSR’s) consisting of rectangle, circular, hexagonal and elliptical angular stability slots has been addressed in this manuscript. This paper consists of four designs proposed for exhibiting frequency reflective behavior in sub-6 GHz 5G applications. Slotted frequency selective reflectors fall in the category of spatial filters which enable them to operate in a variety of frequency ranges when combined with flat or curved sub-reflectors. The proposed FSS configurations operate in the n77, n78 and n79 sub-6GHz 5 G spectrum bands and have a broad stop band from 3.30 GHz to 5.00 GHz. In the proposed architectures of simplified arrangements, angular stability has been obtained. Ansys ® HFSS designer is used to perform analytical study.","PeriodicalId":316752,"journal":{"name":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133535303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Machine Learning Based Movie Status Evaluation System for Bangladesh Movies","authors":"S. Akter, M. Huda","doi":"10.1109/ICCCIS51004.2021.9397206","DOIUrl":"https://doi.org/10.1109/ICCCIS51004.2021.9397206","url":null,"abstract":"This study develops a machine learning based on movie status evaluation system for Bangladesh movies. The number of movie production rate is growing day by day worldwide and the movie maker invests highly in the movie industry. In such a scenario, this is very important to evaluate movie status. In our proposed research, we evaluate the status of Dhallywood movie (Bangladesh Cinema) based on three different types of Machine Learning (ML) based classification, Binary classifier that includes two targeted classes, Triple classifier that includes three targeted classes and, four classifier that includes four targeted classes. Here, we will give our detailed analysis of data because Bangladeshi movie data collection is the main challenge of our work and consequently, we analyze our data in different ways to set target variable to improve the accuracy of models. For the first time any research focuses on Dhallywood movie data where we have used different machine learning based models for analyzing data. We apply the same ML algorithm for each of the three different class classifications to find which classifier is performing well for our data and the problem by comparing the obtained accuracies. From the experiments, it is observed that the triple class classification accuracy is higher than binary and four class classifications. Among the five applied ML algorithms, the Random Forest shows the best accuracy around 85%. Our research provides a quite different approach to set target variable class based on Wikipedia data, news, actor- actress biography, and viewer response on YouTube for a particular movie. We go for this approach because Bangladeshi movie rating is not perfect on IMDb also the budgets and revenues are not found for all movies.","PeriodicalId":316752,"journal":{"name":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128864383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Choppala, Vandana Gullipalli, Manikanta Gudivada, Bhargav Kandregula
{"title":"Design of Area Efficient, Low Power, High Speed and Full Swing Hybrid Multipliers","authors":"P. Choppala, Vandana Gullipalli, Manikanta Gudivada, Bhargav Kandregula","doi":"10.1109/ICCCIS51004.2021.9397106","DOIUrl":"https://doi.org/10.1109/ICCCIS51004.2021.9397106","url":null,"abstract":"The multiplier is the most basic unit of an arithmetic circuit which is predominantly used in digital processing units and several integrated circuits. The efficiency of a processing unit is measured by its speed and power consumption. The multiplier circuit involves an extensive use of adders that generally add to its hardware complexity and thus is a major bottleneck to fast processing and also consumes high power. Thus it becomes critical to improve speed and reduce power consumption in the multiplier module. The conventional multipliers implemented using the CMOS and GDI technologies and their combination versions, albeit showing improved speed and low power consumption, still suffer from high hardware complexity. This paper proposes the design of an 8-bit hybrid Wallace tree multiplier. The key idea here is to use the power efficient GDI technology based 1-bit hybrid full adder within the popularly used array and Wallace tree multipliers to obtain a new multiplier design with fewer transistors and full output voltage swing. The proposed designs are implemented using Tanner EDA with 250nm technology and simulation results show substantial improvement when compared with the state-of-the- art.","PeriodicalId":316752,"journal":{"name":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115204337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chronic Kidney Disease Prediction using Machine Learning Ensemble Algorithm","authors":"Nikhila","doi":"10.1109/ICCCIS51004.2021.9397144","DOIUrl":"https://doi.org/10.1109/ICCCIS51004.2021.9397144","url":null,"abstract":"Chronic Kidney Disease is one among the non-contagious illnesses that affect most of the individual in the world. The main factors of risk for the Chronic Kidney Disease are Diabetes, Heart Ailment, Hypertension. The Chronic Kidney Disease shows no symptoms in the early stages and most of the cases are diagnosed in the advanced stage. This leads to delayed treatment to the patient which may be fatal. Machine learning technique provides an efficient way in the prediction of Chronic Kidney Disease at the earliest stage. In this paper, four ensemble algorithms are used to diagnose the patient with Chronic Kidney Disease at the earlier stages. The machine learning models are evaluated based on seven performance metrics including Accuracy, Sensitivity, Specificity, F1-Score, and Mathew Correlation Coefficient. Based on the evaluation the AdaBoost and Random Forest performed the best in terms of accuracy, precision, Sensitivity compared to Gradient Boosting and Bagging. The AdaBoost and Random Forest also showed the Mathew Correlation Coefficient and Area Under the curve scores of 100%. The machine learning model proposed in this paper will provide an efficient way to prevent Chronic Kidney diseases by enabling the medical practitioners to diagnose the disease at an early stage.","PeriodicalId":316752,"journal":{"name":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124312931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}