Divyani Yadav, Deeksha Gupta, D. Singh, Devendra Kumar, Upasana Sharma
{"title":"Vulnerabilities and Security of Web Applications","authors":"Divyani Yadav, Deeksha Gupta, D. Singh, Devendra Kumar, Upasana Sharma","doi":"10.1109/CCAA.2018.8777558","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777558","url":null,"abstract":"Web applications are active websites which are composition of server based programs serving user interaction and various other functionalities. Web Server security is thus an important aspect for any organisation having web server connectivity with the internet and also to ensure customers using their websites, for a secure online portal. In this age of digital revolution, there has been a rise in demand of web developers who can produce user friendly web platforms such as mobile applications, web applications. The user base for online web applications is on a rise too. We have seen a huge emphasis on creating visual and catchy web applications but with large amount of sensitive user data at stake there should be more focus on providing web security to the applications developed.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114644542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A twin support vector machine based approach to classifying human skin","authors":"M. Chandra, S. S. Bedi","doi":"10.1109/CCAA.2018.8777536","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777536","url":null,"abstract":"The classification of color image that contain skin pixel is a challenging process. It is challenging due to certain factor such as brightness, background similar to human skin represent the obstacles thereof. The basic approach of skin detection is color based classification. The human skin image is the composition of RGB color. The data values of skin is calculated by randomly sampling RGB color values of different face images which have different age, race, genders sets. However, its performance has not really been high because of the high overlapped degree between “skin” and “non-skin” pixels. This paper describes the linear norm fuzzy based twin support vector machine (LN-FTSVM)) approach for discriminate skin and non-skin data values of skin dataset and to enhance the skin recognition performance. The concept of fuzzy is resolved the unclassified and overlapped data region problems. If no decision function is positive for a data set, this data set is classified into a class with the large membership value. By computational experiments shows that Experiments result shows that the accuracy is improved by linear norm fuzzy based TSVM (LN-FTSVM)) over the conventional methods.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116962104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pitfalls in ADC Characterization: Getting those extra dBs","authors":"Mohit Goyal, Mayank Bansal","doi":"10.1109/CCAA.2018.8777559","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777559","url":null,"abstract":"With complex applications and system requirements, the level of integration in modern day SoCs have increased many folds. Analog to digital Converters (ADCs) are important part of many networking and communication chips. Higher data rate requirements need ADC that can operate at high speed without much compromise in performance. As the speed, complexity and number of Analog to Digital Converters increases in a SoC, it makes its characterization and validation a challenging task. Though the tests that need to be performed are well defined in theory, performing those tests accurately to evaluate the system’s true performance is vital. The results obtained may not be as accurate as they seem, resulting in underestimating the product specifications. This paper focuses on pitfalls of dynamic measurements and propose methods to overcome them for true and accurate measurements of the Device Under Test (DUT). We also propose efficient and robust algorithms which can ease the process of calibration for more refined characterization.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127237258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Computer Vision Based Comparative Analysis of Dual Nutrients (Boron, Calcium) Deficiency Detection System for Apple Fruit","authors":"Tanya Makkar, Yogesh","doi":"10.1109/CCAA.2018.8777678","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777678","url":null,"abstract":"All the nutrients are necessary for any fruit for its full development and growth. But, due to some causes like-dry soils, waterlogging and other natural calamity factors can lead to deficiency disorder. So, there must be a system that could detect such deficiency and help in reducing manual intervention of detection and inspection. Hence, a different approach has been introduced in this paper depicting an application-based computer vision tool that deals with a comparative analysis of dual nutrient (Boron, Calcium) deficiency detection system for apply fruit. In order to provide an attractive communication between a user and program, a GUI (Graphical User Interface) has been modeled which has been executed with the help of MATLAB. The methodology of this paper mainly provides the user to detect the deficiency present in a fruit, that helps the user to discover the various use of image processing technique altogether and also decide the selective measures over the detected deficiency. The results show a very satisfactory performance of this tool and hence considered to be a flexible and robust technique by intuitive usage.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127483547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Response Based Information Quality Assessment of Social Media News Posts","authors":"Pragya Rawat, C. Gupta","doi":"10.1109/CCAA.2018.8777685","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777685","url":null,"abstract":"Information on social media platform suffers from lack of monitoring. So the evaluation of information credibility on the social media platform is an important subject. Specifically, social media have become popular for news consumption. News in its purest form, unbiased and trustworthiness is a big challenge. Through social media the information spread at such a fast rate, that false information perceives potential to cause real-world impacts on millions of users within a minute. Despite its importance, research has not taken its upliftment to mitigate the factors influencing information quality. In this paper, we will review the content dimension by studying Information quality of news on social media. We discuss this problem by presenting a dimension and levels to IQ. We test and validate the proposed model by computing IQI through distribution. The results show that based on user responses we can provide an IQ index to the news article. Providing a scale to measure the credibility of content. The prediction that a particular news article to what extent it is trustworthy based on the analysis of user responses to the dimension of IQ can be an important step to fight against digital misinformation.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124790608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of X-Ray Images with Image Processing Techniques: A Review","authors":"V. Kajla, Anju Gupta, Anil Khatak","doi":"10.1109/CCAA.2018.8777693","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777693","url":null,"abstract":"Human body suffers from various problems it consists of different parts such as legs, hands, bones, bones get cracked or discontinuity most of the times due to pressure applied on it which may be due to the accident, sports while playing etc. Osteoporosis is one of the major problems occurs due to extra use of bones radiologist suggests the patients take x-ray images of the bones for diagnosis purpose. This study is a tutorial review on medical imaging processing and repository techniques appeared in the literature. Many times, it is difficult and time-consuming to find out the location of fracture in the patient who is suffering from pain. Today medical imaging technique played the significant role in research and diagnosis field. X-ray imaging technique is used to diagnose and also used to represent anatomical structures such as bones, in human beings. This paper is a tutorial review of X-ray imaging technique which is used to detect bone fractures and then the obtained image is processed by different image processing methods such as Computer Aided Diagnosis, Edge Detection, segmentation which are beneficial for technicians.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125045154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Techniques for Indexing and Hashing in Big Data","authors":"Mitali Desai, R. Mehta, Dipti P Rana","doi":"10.1109/CCAA.2018.8777454","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777454","url":null,"abstract":"Conventional indexing and hashing solutions become ineffective to provide efficient storage and fast retrieval for Big Data due to challenging characteristics of Big Data. Thus, an effective method for Big Data indexing and hashing is required with optimized construction time, storage space, training time, query response time and query result accuracy. Existing Big Data indexing techniques are categorized as Non-Artificial Intelligent, Artificial Intelligent and Collaborative Artificial Intelligent indexing whereas Big Data hashing techniques are categorized as non-deterministic and deterministic hashing. This paper provides an extensive survey on widely used Big Data indexing and hashing techniques along with their parametric comparisons based upon various identified parameters","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126124674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Location Identification, Extraction and Disambiguation using Machine Learning in Legal Contracts","authors":"Sandeep Joshi, Parth Shah, A. Pandey","doi":"10.1109/CCAA.2018.8777631","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777631","url":null,"abstract":"Identifying the context of location (disambiguation) in legal contracts plays an import role in multiple use cases for lawyers (e.g. due diligence and M&A). Identifying the locations of the parties involved in the contract or agreement and also identifying the Governing law and Jurisdiction from the contract is an interesting problem in the legal space. AI has changed and changing many industries for a number of years (e.g. finance, e-comm, medical, education etc.) but it is relatively new to the legal domain. In this paper, we present a novel approach through which, a system can automatically determine the location of the parties involved and the law under which the contract is governed, as well as the jurisdiction under which contract belongs. The key concept of our approach is to look this problem as a classification task, followed by the extraction and then disambiguation of entities. In this view, we have examined each location context and determined whether it is a Party Location or Governing Law & Jurisdiction. A similar approach can be extended for identifying other key pieces of information from the legal contracts (e.g. change of control clauses, consideration amount, contract dates etc.). We have achieved relatively good accuracy on the limited training and test set described in section 4.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130413008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying the Pornographic Video on YouTube Using Vlog Stream","authors":"M. Islam, M. Ahmed, K. Z. Zamli","doi":"10.1109/CCAA.2018.8777614","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777614","url":null,"abstract":"Today, YouTube is the most used platform for sharing videos from individual to organizations. Along with the sharing videos, YouTube creates a social networking platform by allowing sharing of feelings, views, and opinions about a video called vlog. It also allows uploading of videos of all ages (child, young and old people). YouTube has its policy for defining age-restricted content on YouTube. But a lot of uploaded videos are not marked as age restricted though they actually contain pornographic contents. YouTube has a team for reviewing the video content upon receiving a report from the user only. All the existing methods identify the pornographic video based on the visual or audio-visual features of video. However, there is no automatic method exist the author aware of identifying them based on vlogger sentiment. Thus, the challenge of automatically detecting this kind of video content is significant in applications like content filtering, detection of illegal content, etc. In this paper, we present an automatic method for identifying the pornographic content on YouTube based on the vlog stream. The experiment has been executed on both the age-restricted vlog stream and non-restricted vlog stream to validate the proposed method. The experimental result shows the effectiveness of the proposed methodology with nearly 80% accuracy.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116327767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Lalitha, S. Varadhaganapathy, S. Santhoshi, D. R. Kumar
{"title":"A Review on Possibilities of Hearing Loss and Implantable Hearing Devices for Teenagers","authors":"K. Lalitha, S. Varadhaganapathy, S. Santhoshi, D. R. Kumar","doi":"10.1109/CCAA.2018.8777336","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777336","url":null,"abstract":"In the current world, one of the most predominant issues identified from children to older adults is hearing loss and it turns the attention of research community. The people identified with permanent sensori-neural hearing loss are required to use amplification devices, which is the most manageable option for them. This study brings out the causes and effects of hearing loss among teenagers and older adults and discusses the current IoT enabled techniques which provide the solution for hearing loss.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125726332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}