2022 5th International Conference on Computational Intelligence and Networks (CINE)最新文献

筛选
英文 中文
Distributed Hash Table with Extensible Remote Procedure Calls 具有可扩展远程过程调用的分布式哈希表
2022 5th International Conference on Computational Intelligence and Networks (CINE) Pub Date : 2022-12-01 DOI: 10.1109/CINE56307.2022.10037367
Lars Creutz, Jens Schneider, Guido Dartmann
{"title":"Distributed Hash Table with Extensible Remote Procedure Calls","authors":"Lars Creutz, Jens Schneider, Guido Dartmann","doi":"10.1109/CINE56307.2022.10037367","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037367","url":null,"abstract":"In this paper we present Grond, a Python implementation of a distributed hash table based on the Chord protocol that was used inside the cyber-physical contract framework Fides. We implemented several extensions and improvements over the original Chord specification. Some of these enhancements are specific for the use with Fides, but most are general enhancements to improve the stability and security of the framework. The implementation can be transferred to other domains due to its extensibility with custom remote procedure calls and is also useable on lightweight hardware, which we show in reproducable measurements.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130176622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Futuristic Opportunities and Challenges for Cognitive Tutoring Systems 认知辅导系统的未来机遇与挑战
2022 5th International Conference on Computational Intelligence and Networks (CINE) Pub Date : 2022-12-01 DOI: 10.1109/CINE56307.2022.10037263
Ninni Singh, Vinit Kumar Gunjan, M. Chaurasia
{"title":"Futuristic Opportunities and Challenges for Cognitive Tutoring Systems","authors":"Ninni Singh, Vinit Kumar Gunjan, M. Chaurasia","doi":"10.1109/CINE56307.2022.10037263","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037263","url":null,"abstract":"Across a systematic review of literature, ITS have shown a great potential emerging as systems offering learning to the learner, in a manner that best suits the learner. But the growth rate is affected by specific challenges that are proving to be limiting factors. There are reasonable number of possible mechanisms unexplored as of now, that can be implemented listing opportunities for future directions of research in this field. This paper emphasizes on these limiting factors, opportunities, and describes the existing intelligent feature incorporated in the Intelligent Tutoring System.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128595461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach for Word Segmentation from a Line Segment in Odia Text Using Quartiles 一种基于四分位数的Odia文本线段分词方法
2022 5th International Conference on Computational Intelligence and Networks (CINE) Pub Date : 2022-12-01 DOI: 10.1109/CINE56307.2022.10037532
Aradhana Kar, S. Pradhan
{"title":"An Approach for Word Segmentation from a Line Segment in Odia Text Using Quartiles","authors":"Aradhana Kar, S. Pradhan","doi":"10.1109/CINE56307.2022.10037532","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037532","url":null,"abstract":"This paper deals with word segmentation from a given line segment. These line segments may have alphabets and matras in one single line segment or the alphabets and matras of a line text in two different line segments. The line text is segmented into alphabets and the associated matras in two different line segments are reconstructed using Reconstruct Module. The approach introduced in this paper has three phases: Pre_Processing Module, Find_White_Spaces Module, and Analyse_White_Spaces Module. The Pre_Processing module is responsible for reading the input line segment, converting it to a gray image, removing white spaces that encapsulate the whole text, and then converting it to a binary image. The Find_White_Spaces module is responsible for finding the start and end of the white spaces between the words. The Analyse_White_Spaces module is responsible for analysing the widths of the white spaces using quartiles and storing the segmented words in the directory, ‘Segmented Words’. The proposed system has been tested with images of line segments consisting of only alphabets and alphabets with matras. The overall correctness accuracy of 99.9% has been achieved in this approach for word segmentation.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125172539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Learner's Comprehension Using Entailment-Based Question Generation 利用蕴涵生成问题提高学习者的理解能力
2022 5th International Conference on Computational Intelligence and Networks (CINE) Pub Date : 2022-12-01 DOI: 10.1109/CINE56307.2022.10037529
Aarthi Paramasivam, S. Nirmala
{"title":"Improving Learner's Comprehension Using Entailment-Based Question Generation","authors":"Aarthi Paramasivam, S. Nirmala","doi":"10.1109/CINE56307.2022.10037529","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037529","url":null,"abstract":"In recent decades, artificial intelligence has made significant contributions to education. With the rise of online learning, most tedious tasks have been transferred from human hands to machines and programs. Both human and machine intelligence require good questioning abilities. To improve learning efficiency, asking questions on the reading material is an effective approach. However, the learners' reading comprehension may diminish if the questions are similar to the original sentence. In this study, a question generation method based on textual entailment is proposed. A question is constructed from the inferred text of the original sentence to help readers improve their reading comprehension. As a result, in order to answer the questions, learners must comprehend textual entailment. The proposed system first generates the entailment for the sentence to which the question should be generated, then generates the question for the generated entailed sentence. Furthermore, the findings are evaluated based on lexical and semantic similarity to ensure that the generated questions are semantically consistent.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115299844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Software Agent-Oriented Traceability Milieu for Blockchain-Enabled Supply Chain 面向分布式软件代理的区块链供应链可追溯环境
2022 5th International Conference on Computational Intelligence and Networks (CINE) Pub Date : 2022-12-01 DOI: 10.1109/CINE56307.2022.10037458
Satyananda Swain, M. Patra
{"title":"A Distributed Software Agent-Oriented Traceability Milieu for Blockchain-Enabled Supply Chain","authors":"Satyananda Swain, M. Patra","doi":"10.1109/CINE56307.2022.10037458","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037458","url":null,"abstract":"Supply chain is a potential area that can immensely benefit from blockchain technology (BCT), making supply chain operations more reliable, safer, traceable, and trustworthy for all its stakeholders. However, there are numerous challenges such as scalability, coordination, safety, and traceability-related issues which are yet to be resolved. Multi-agent systems (MAS) offer a completely new dimension for sustainability and operational traceability in distributed culture. MAS consists of an assembly of automated agents which can be deployed to track operational states both internally and externally in a distributed system. In this work, an effort has been made to develop a comprehensive traceability framework consisting of multiple agents for a large-scale product manufacturing supply chain enabled by blockchain technology. The agents are designed to monitor and drive the supply chain workflow to ensure traceability of the system. This framework can eliminate the limitations of the existing supply chains concerning traceability.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127472693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Consensus Algorithms in Blockchain Based on Post Quantum Cryptosystems 基于后量子密码系统的区块链共识算法研究
2022 5th International Conference on Computational Intelligence and Networks (CINE) Pub Date : 2022-12-01 DOI: 10.1109/CINE56307.2022.10037353
J. Jose, P. V.
{"title":"A Survey on Consensus Algorithms in Blockchain Based on Post Quantum Cryptosystems","authors":"J. Jose, P. V.","doi":"10.1109/CINE56307.2022.10037353","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037353","url":null,"abstract":"Blockchain is a distributed, decentralized ledger mechanism with a various features. It is used in diverse applications nowadays, from financial sector to password management. It does not have any central tool to validate and verify the transactions, yet every transaction in the Blockchain is secured and verified. This is achieved because of a consensus algorithm in the network. Latest study reports show that emergence of quantum computing will impact the overall safety of Blockchain and its internal working. Attacks using Grover's and Shor's algorithm can threaten the hashing and public key schemes in cryptography. It will force a complete redesign of the Blockchain systems to withstand quantum attacks. So there is a need to develop quantum-safe Blockchain systems. Consensus mechanisms like Proof of Work (PoW) and Signing algorithms like Elliptic Curve Cryptography used in Blockchain can be modified to overcome quantum attacks. Here a comparative study and analysis of different consensus algorithms developed using post-quantum cryptosystems are done, which can be implemented in Blockchain systems to make them quantum safe.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128898141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
map-A*: A Goal Oriented Optimum Path Finding Algorithm for Differential Drive Movement map-A*:一种面向目标的差动驱动运动最优寻径算法
2022 5th International Conference on Computational Intelligence and Networks (CINE) Pub Date : 2022-12-01 DOI: 10.1109/CINE56307.2022.10037305
Rapti Chaudhuri, Sumanta Deb, P. Das
{"title":"map-A*: A Goal Oriented Optimum Path Finding Algorithm for Differential Drive Movement","authors":"Rapti Chaudhuri, Sumanta Deb, P. Das","doi":"10.1109/CINE56307.2022.10037305","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037305","url":null,"abstract":"Cognitive intelligent path searching procedures are evolving as significant perspective in both research and application level of WRN (Wheeled Robot Navigation). The superimposition of Machine Vision and Augmented Reality have provided clarity, precision and optimality to PTP (Point To Point) robot locomotion strategies. Performance of various existing graph theoretic as well as bio inspired path planning techniques have been computationally evaluated and improvised in certain research works. This concerned work primarily focuses on achievement of optimum Goal-oriented robot navigation with proposed map-A * algorithm. This structured algorithm is inspired from the characteristic features of RGB-D SLAM (Red, Green Blue Depth Simultaneous Localization And Mapping) for real-time trajectory scan of the explored route by the considered differential drive design. It has been followed by a simultaneous intelligent Grid-based path finding mechanism for desired goal completion. The interposition of path mapping has made the mobile agent comparative easier and quicker to get a snap of already traversed non-optimum route and decide its further movement. Input 3D data format has been captured by RGB-D sensor for its superiority in obstacle detection using its colour gradient feature. The algorithmic construction of the proposed procedure has been included with experimental analysis. Performance of the algorithm is bench-marked with conventionally used technique which cites its efficiency and reliability in the concerned working domain.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125347665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recommender Credibility-Based Trust Model for Secure V2X Communication 基于推荐可信度的安全V2X通信信任模型
2022 5th International Conference on Computational Intelligence and Networks (CINE) Pub Date : 2022-12-01 DOI: 10.1109/CINE56307.2022.10037554
F. Lone, H. Verma, K. Sharma
{"title":"Recommender Credibility-Based Trust Model for Secure V2X Communication","authors":"F. Lone, H. Verma, K. Sharma","doi":"10.1109/CINE56307.2022.10037554","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037554","url":null,"abstract":"An Intelligent Transportations System (ITS) can realise a sustainable transportation system by alleviating traffic congestion and offering a safe travel experience. V2X communication is the backbone of an ITS because it enables the exchange of information between vehicles and ITS entities. Despite the vast potential applications of V2X communication, its open wireless nature makes it susceptible to attacks. An attack by a malicious user in a delay-sensitive V2X network can have fatal consequences. Although cryptographic solutions offer robust security against external attacks, they fail in the case of inside attackers. Consequently, it is necessary to supplement cryptographic solutions with trust-based models to secure the highly vulnerable V2X networks. This paper suggests a recommender credibility-based trust model for better trust calculation for detecting and consequently avoiding communication with malicious nodes. The proposed model keeps track of previous node misbehaviours and filters bogus recommendations received from malicious nodes for enhancing the security of V2X communication. The performance of the proposed model is compared with the existing model in terms of PDR and FNR.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight DoS and DDoS Attack Detection Mechanism-Based on Deep Learning 基于深度学习的轻量级DoS和DDoS攻击检测机制
2022 5th International Conference on Computational Intelligence and Networks (CINE) Pub Date : 2022-12-01 DOI: 10.1109/CINE56307.2022.10037402
Swati P Satpathy, S. Mohanty, Rakesh Kumar
{"title":"A Lightweight DoS and DDoS Attack Detection Mechanism-Based on Deep Learning","authors":"Swati P Satpathy, S. Mohanty, Rakesh Kumar","doi":"10.1109/CINE56307.2022.10037402","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037402","url":null,"abstract":"Denial of Service (DOS) attacks are one of the major attacks on any network and a potential threat to internet resources and services. This threat amplifies with Distributed Denial of Service (DDoS) attacks as these attacks do not give any alert or time for the victim to act. With the increase in devices connected to the internet, the intensity and frequency of attacks are also growing daily. Existing solutions like intrusion detection systems(IDS) cannot provide better results with the complexity of DDoS attacks because their filtering criteria have been static to distinguish attack traffic from regular traffic. So, with the robustness of attacks, the solutions need to be robust enough. The proposed method here is to use the state-of-art CNN model, i.e. EfficientNet and ResNet. EfficientNet model being a lightweight model, can be integrated with any device to avoid DDoS attacks. Since the prediction time is minimal, the proposed method can pinpoint the attack to act immediately.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117133125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continuous Cloud User Authentication By Efficient Facial Recognition 通过高效的面部识别连续云用户认证
2022 5th International Conference on Computational Intelligence and Networks (CINE) Pub Date : 2022-12-01 DOI: 10.1109/CINE56307.2022.10037567
Soumya Prakash Otta, Siddharth Kolipara, Vijay Kumar Malhotra, Aman Raj Singh, S. Panda, C. Hota
{"title":"Continuous Cloud User Authentication By Efficient Facial Recognition","authors":"Soumya Prakash Otta, Siddharth Kolipara, Vijay Kumar Malhotra, Aman Raj Singh, S. Panda, C. Hota","doi":"10.1109/CINE56307.2022.10037567","DOIUrl":"https://doi.org/10.1109/CINE56307.2022.10037567","url":null,"abstract":"Designing any cloud-based application typically includes a vital step for securing user identification and access control. A potential approach to increase security against mali-cious and unauthorized access to protected applications is multi-factor authentication based on biometrics. A versatile and reliable method of biometric identification is facial recognition since it can be implemented with less specialized hardware. Facial recognition-based continuous authentication is a promising strat-egy for assuring security. Because Convolutional Neural Networks are capable of comprehending the high level characteristics required to recognize human faces, they are known to be the most accurate and reliable approach for used identification. Their broad use is restricted by the computational requirements that results from utilizing this method for facial recognition. In order to minimize the computational load and boost the functional speed of authentication, this research suggests creating a modular facial recognition system that integrates techniques like frame differencing and face detection and face recognition process. A system of modular processing phases is designed to make the continuous authentication process efficient, as respective modules are activated when triggered by changes in the input data.","PeriodicalId":336238,"journal":{"name":"2022 5th International Conference on Computational Intelligence and Networks (CINE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124384186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信