{"title":"Distributed Hash Table with Extensible Remote Procedure Calls","authors":"Lars Creutz, Jens Schneider, Guido Dartmann","doi":"10.1109/CINE56307.2022.10037367","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037367","url":null,"abstract":"In this paper we present Grond, a Python implementation of a distributed hash table based on the Chord protocol that was used inside the cyber-physical contract framework Fides. We implemented several extensions and improvements over the original Chord specification. Some of these enhancements are specific for the use with Fides, but most are general enhancements to improve the stability and security of the framework. The implementation can be transferred to other domains due to its extensibility with custom remote procedure calls and is also useable on lightweight hardware, which we show in reproducable measurements.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130176622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Futuristic Opportunities and Challenges for Cognitive Tutoring Systems","authors":"Ninni Singh, Vinit Kumar Gunjan, M. Chaurasia","doi":"10.1109/CINE56307.2022.10037263","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037263","url":null,"abstract":"Across a systematic review of literature, ITS have shown a great potential emerging as systems offering learning to the learner, in a manner that best suits the learner. But the growth rate is affected by specific challenges that are proving to be limiting factors. There are reasonable number of possible mechanisms unexplored as of now, that can be implemented listing opportunities for future directions of research in this field. This paper emphasizes on these limiting factors, opportunities, and describes the existing intelligent feature incorporated in the Intelligent Tutoring System.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128595461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach for Word Segmentation from a Line Segment in Odia Text Using Quartiles","authors":"Aradhana Kar, S. Pradhan","doi":"10.1109/CINE56307.2022.10037532","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037532","url":null,"abstract":"This paper deals with word segmentation from a given line segment. These line segments may have alphabets and matras in one single line segment or the alphabets and matras of a line text in two different line segments. The line text is segmented into alphabets and the associated matras in two different line segments are reconstructed using Reconstruct Module. The approach introduced in this paper has three phases: Pre_Processing Module, Find_White_Spaces Module, and Analyse_White_Spaces Module. The Pre_Processing module is responsible for reading the input line segment, converting it to a gray image, removing white spaces that encapsulate the whole text, and then converting it to a binary image. The Find_White_Spaces module is responsible for finding the start and end of the white spaces between the words. The Analyse_White_Spaces module is responsible for analysing the widths of the white spaces using quartiles and storing the segmented words in the directory, ‘Segmented Words’. The proposed system has been tested with images of line segments consisting of only alphabets and alphabets with matras. The overall correctness accuracy of 99.9% has been achieved in this approach for word segmentation.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125172539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Learner's Comprehension Using Entailment-Based Question Generation","authors":"Aarthi Paramasivam, S. Nirmala","doi":"10.1109/CINE56307.2022.10037529","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037529","url":null,"abstract":"In recent decades, artificial intelligence has made significant contributions to education. With the rise of online learning, most tedious tasks have been transferred from human hands to machines and programs. Both human and machine intelligence require good questioning abilities. To improve learning efficiency, asking questions on the reading material is an effective approach. However, the learners' reading comprehension may diminish if the questions are similar to the original sentence. In this study, a question generation method based on textual entailment is proposed. A question is constructed from the inferred text of the original sentence to help readers improve their reading comprehension. As a result, in order to answer the questions, learners must comprehend textual entailment. The proposed system first generates the entailment for the sentence to which the question should be generated, then generates the question for the generated entailed sentence. Furthermore, the findings are evaluated based on lexical and semantic similarity to ensure that the generated questions are semantically consistent.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115299844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Distributed Software Agent-Oriented Traceability Milieu for Blockchain-Enabled Supply Chain","authors":"Satyananda Swain, M. Patra","doi":"10.1109/CINE56307.2022.10037458","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037458","url":null,"abstract":"Supply chain is a potential area that can immensely benefit from blockchain technology (BCT), making supply chain operations more reliable, safer, traceable, and trustworthy for all its stakeholders. However, there are numerous challenges such as scalability, coordination, safety, and traceability-related issues which are yet to be resolved. Multi-agent systems (MAS) offer a completely new dimension for sustainability and operational traceability in distributed culture. MAS consists of an assembly of automated agents which can be deployed to track operational states both internally and externally in a distributed system. In this work, an effort has been made to develop a comprehensive traceability framework consisting of multiple agents for a large-scale product manufacturing supply chain enabled by blockchain technology. The agents are designed to monitor and drive the supply chain workflow to ensure traceability of the system. This framework can eliminate the limitations of the existing supply chains concerning traceability.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127472693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Consensus Algorithms in Blockchain Based on Post Quantum Cryptosystems","authors":"J. Jose, P. V.","doi":"10.1109/CINE56307.2022.10037353","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037353","url":null,"abstract":"Blockchain is a distributed, decentralized ledger mechanism with a various features. It is used in diverse applications nowadays, from financial sector to password management. It does not have any central tool to validate and verify the transactions, yet every transaction in the Blockchain is secured and verified. This is achieved because of a consensus algorithm in the network. Latest study reports show that emergence of quantum computing will impact the overall safety of Blockchain and its internal working. Attacks using Grover's and Shor's algorithm can threaten the hashing and public key schemes in cryptography. It will force a complete redesign of the Blockchain systems to withstand quantum attacks. So there is a need to develop quantum-safe Blockchain systems. Consensus mechanisms like Proof of Work (PoW) and Signing algorithms like Elliptic Curve Cryptography used in Blockchain can be modified to overcome quantum attacks. Here a comparative study and analysis of different consensus algorithms developed using post-quantum cryptosystems are done, which can be implemented in Blockchain systems to make them quantum safe.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128898141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"map-A*: A Goal Oriented Optimum Path Finding Algorithm for Differential Drive Movement","authors":"Rapti Chaudhuri, Sumanta Deb, P. Das","doi":"10.1109/CINE56307.2022.10037305","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037305","url":null,"abstract":"Cognitive intelligent path searching procedures are evolving as significant perspective in both research and application level of WRN (Wheeled Robot Navigation). The superimposition of Machine Vision and Augmented Reality have provided clarity, precision and optimality to PTP (Point To Point) robot locomotion strategies. Performance of various existing graph theoretic as well as bio inspired path planning techniques have been computationally evaluated and improvised in certain research works. This concerned work primarily focuses on achievement of optimum Goal-oriented robot navigation with proposed map-A * algorithm. This structured algorithm is inspired from the characteristic features of RGB-D SLAM (Red, Green Blue Depth Simultaneous Localization And Mapping) for real-time trajectory scan of the explored route by the considered differential drive design. It has been followed by a simultaneous intelligent Grid-based path finding mechanism for desired goal completion. The interposition of path mapping has made the mobile agent comparative easier and quicker to get a snap of already traversed non-optimum route and decide its further movement. Input 3D data format has been captured by RGB-D sensor for its superiority in obstacle detection using its colour gradient feature. The algorithmic construction of the proposed procedure has been included with experimental analysis. Performance of the algorithm is bench-marked with conventionally used technique which cites its efficiency and reliability in the concerned working domain.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125347665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommender Credibility-Based Trust Model for Secure V2X Communication","authors":"F. Lone, H. Verma, K. Sharma","doi":"10.1109/CINE56307.2022.10037554","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037554","url":null,"abstract":"An Intelligent Transportations System (ITS) can realise a sustainable transportation system by alleviating traffic congestion and offering a safe travel experience. V2X communication is the backbone of an ITS because it enables the exchange of information between vehicles and ITS entities. Despite the vast potential applications of V2X communication, its open wireless nature makes it susceptible to attacks. An attack by a malicious user in a delay-sensitive V2X network can have fatal consequences. Although cryptographic solutions offer robust security against external attacks, they fail in the case of inside attackers. Consequently, it is necessary to supplement cryptographic solutions with trust-based models to secure the highly vulnerable V2X networks. This paper suggests a recommender credibility-based trust model for better trust calculation for detecting and consequently avoiding communication with malicious nodes. The proposed model keeps track of previous node misbehaviours and filters bogus recommendations received from malicious nodes for enhancing the security of V2X communication. The performance of the proposed model is compared with the existing model in terms of PDR and FNR.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Lightweight DoS and DDoS Attack Detection Mechanism-Based on Deep Learning","authors":"Swati P Satpathy, S. Mohanty, Rakesh Kumar","doi":"10.1109/CINE56307.2022.10037402","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037402","url":null,"abstract":"Denial of Service (DOS) attacks are one of the major attacks on any network and a potential threat to internet resources and services. This threat amplifies with Distributed Denial of Service (DDoS) attacks as these attacks do not give any alert or time for the victim to act. With the increase in devices connected to the internet, the intensity and frequency of attacks are also growing daily. Existing solutions like intrusion detection systems(IDS) cannot provide better results with the complexity of DDoS attacks because their filtering criteria have been static to distinguish attack traffic from regular traffic. So, with the robustness of attacks, the solutions need to be robust enough. The proposed method here is to use the state-of-art CNN model, i.e. EfficientNet and ResNet. EfficientNet model being a lightweight model, can be integrated with any device to avoid DDoS attacks. Since the prediction time is minimal, the proposed method can pinpoint the attack to act immediately.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117133125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Soumya Prakash Otta, Siddharth Kolipara, Vijay Kumar Malhotra, Aman Raj Singh, S. Panda, C. Hota
{"title":"Continuous Cloud User Authentication By Efficient Facial Recognition","authors":"Soumya Prakash Otta, Siddharth Kolipara, Vijay Kumar Malhotra, Aman Raj Singh, S. Panda, C. Hota","doi":"10.1109/CINE56307.2022.10037567","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037567","url":null,"abstract":"Designing any cloud-based application typically includes a vital step for securing user identification and access control. A potential approach to increase security against mali-cious and unauthorized access to protected applications is multi-factor authentication based on biometrics. A versatile and reliable method of biometric identification is facial recognition since it can be implemented with less specialized hardware. Facial recognition-based continuous authentication is a promising strat-egy for assuring security. Because Convolutional Neural Networks are capable of comprehending the high level characteristics required to recognize human faces, they are known to be the most accurate and reliable approach for used identification. Their broad use is restricted by the computational requirements that results from utilizing this method for facial recognition. In order to minimize the computational load and boost the functional speed of authentication, this research suggests creating a modular facial recognition system that integrates techniques like frame differencing and face detection and face recognition process. A system of modular processing phases is designed to make the continuous authentication process efficient, as respective modules are activated when triggered by changes in the input data.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124384186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}