2021 International Conference on Computing Sciences (ICCS)最新文献

筛选
英文 中文
A Pre-processing Model for Feature Extraction Based on K-mean, PSO and ABC 基于k -均值、粒子群和ABC的特征提取预处理模型
2021 International Conference on Computing Sciences (ICCS) Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00031
Mrinalini Rana, Jimmy Singla
{"title":"A Pre-processing Model for Feature Extraction Based on K-mean, PSO and ABC","authors":"Mrinalini Rana, Jimmy Singla","doi":"10.1109/ICCS54944.2021.00031","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00031","url":null,"abstract":"To achieve efficient rule mining feature selection or preprocessing is need to be handled before the implementing the optimization technique. For these different methods are available. In the proposed model $K$ means clustering is used to generate the clusters. Then PSO-ABC hybrid approach is for feature optimization. For the obtained result, PSO-ABC represent more normalized features as compared to using PSO only.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127214971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reviewers: ICCS 2021 审稿人:ICCS 2021
2021 International Conference on Computing Sciences (ICCS) Pub Date : 2021-12-01 DOI: 10.1109/iccs54944.2021.00060
{"title":"Reviewers: ICCS 2021","authors":"","doi":"10.1109/iccs54944.2021.00060","DOIUrl":"https://doi.org/10.1109/iccs54944.2021.00060","url":null,"abstract":"","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116090268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On a Way Together - Database and Machine Learning for Performance Tuning 在一起的路上-数据库和机器学习的性能调优
2021 International Conference on Computing Sciences (ICCS) Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00032
Cherry Khosla, B. Saini
{"title":"On a Way Together - Database and Machine Learning for Performance Tuning","authors":"Cherry Khosla, B. Saini","doi":"10.1109/ICCS54944.2021.00032","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00032","url":null,"abstract":"Database Management systems are the crucial components in data intensive applications. For efficiently processing and analyzing the data, the database systems should be at par in terms of performance. Tuning the database is nowadays the major goal to improve DBMS's operations. Optimizing the databases to increase the performance and to meet the needs of an application has surpassed the abilities of the humans. Therefore, the researchers have explored how machine learning can be used to tune the databases automatically. In this paper, we have reviewed and discussed various areas of the database tuning, and how machine learning is used to automatically tune the configurations. We have also discussed the various approaches that can be used to integrate the machine learning with database systems. Lastly, we discussed the open problem in tuning database systems.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126405295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Intelligence Techniques Using Data Analytics: An Overview 使用数据分析的商业智能技术:概述
2021 International Conference on Computing Sciences (ICCS) Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00059
Pooja Mallam, Ashu Ashu, Baljeet Singh
{"title":"Business Intelligence Techniques Using Data Analytics: An Overview","authors":"Pooja Mallam, Ashu Ashu, Baljeet Singh","doi":"10.1109/ICCS54944.2021.00059","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00059","url":null,"abstract":"Business intelligence and data analytics areas identify areas where business is at stake or performing well. A much better view of where business may be dropping short is observed. Business Analytics and Data analytics use evidence accumulated over years and get useful information to know where is deformity in businesses. This means that the info is organized and presented that allows it to be visualized. While raw numbers are important, once information becomes valuable and demonstrate value, making insights more straight forward to understand. This paper gives you a brief review of development of business intelligence over course of time using Data Analytics.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122255413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods of Sentiment Analysis for Hindi and English Languages 印地语和英语情感分析方法
2021 International Conference on Computing Sciences (ICCS) Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00065
Aarsh Agrawal, Vinay Bhardwaj
{"title":"Methods of Sentiment Analysis for Hindi and English Languages","authors":"Aarsh Agrawal, Vinay Bhardwaj","doi":"10.1109/ICCS54944.2021.00065","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00065","url":null,"abstract":"Social media is widely regarded as one of the most important unstructured data. Analyzing and extracting meaning from such data is a time-consuming process. Because of the enormous data available on social media platforms, sentiment extraction has gotten a lot of attention. Microblogging is a relatively new phenomenon, with Twitter being the most widely utilized. It's one of the most comprehensive free and open data sources available. Today's society sees a lot of differing viewpoints on Twitter. Researchers can use opinion mining to obtain the present emotion and mood of the public. Sentiment Analysis is defined as the technique of extracting and finding the polarity of a given material to get insight into the hidden information, emotion, feeling contained within a text. The ultimate objective of sentiment analysis is to extract meaningful material from various sources of information. The first analysis of tweets was done using the Natural Language Processing (NLP) method. For further analysis of the opinionated data, two approaches are available: the Lexicon Based Approach (LBA) and the Machine Learning Approach (MLA) based on supervised learning. The LBA approach employs a resource dictionary, namely the Hindi SentiWordNet, and a Hybrid Based Approach (HBA) that joins the Lexicon based and Machine learning for categorizing tweets as positive or negative","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133131454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Network Attacks at Data Link Layer and its Mitigation 数据链路层网络攻击分析及防范
2021 International Conference on Computing Sciences (ICCS) Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00061
Ravi Shanker, Aman Singh
{"title":"Analysis of Network Attacks at Data Link Layer and its Mitigation","authors":"Ravi Shanker, Aman Singh","doi":"10.1109/ICCS54944.2021.00061","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00061","url":null,"abstract":"Various packet capturing tools are available to capture packets in the form of datasets and several well-known datasets available now a day for benchmarking the network attacks for intrusion detection system and attracted the researchers to further analyse these attacks for future attacks also. These datasets contain several parameters that can be utilized for identification of attack at cross layers. Here the cross layer refers the data link layer, network layer, transport layer and application layer. These datasets can be used in research for identification and automation of novel attack. This paper concentrates on the attack types and classification of network attacks on data link layer. Post analysis will investigate the possibility of using Snort as intrusion detection tool for identifying attack at data link layer. Snort generally works at network layer and above so not all data link layer attack can be identified by IDS. For the current work a various solution already researched will be put together to analyse attack at data link layer with the help of Snort. This analysis will help in understanding the possibility to put together various attack at data link layer using Snort or provide already suggested solution done by various researcher.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117261090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning-Based Heart Patient Scanning, Visualization, and Monitoring 基于机器学习的心脏病人扫描、可视化和监测
2021 International Conference on Computing Sciences (ICCS) Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00049
Ahmed Al Ahdal, D. Prashar, Manik Rakhra, Ankita Wadhawan
{"title":"Machine Learning-Based Heart Patient Scanning, Visualization, and Monitoring","authors":"Ahmed Al Ahdal, D. Prashar, Manik Rakhra, Ankita Wadhawan","doi":"10.1109/ICCS54944.2021.00049","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00049","url":null,"abstract":"Heart diseases leading most causes of death globally according to World Health Organization cardiovascular or all heart related disease are responsible for 17.9 million death every year. An early detection and diagnosis of the disease is very important and maybe it's the key of cure. The major challenge is to predict the disease in early stages therefor most of scientists and researches focus on Machine learning techniques which have the capability of detection with accurate result for large and complex data and apply those techniques to help in health care. The purpose of this work is to detect heart diseases at early stage and avoid consequences by implementing different Machine Learning Algorithm for example, KNN Decision Tree (DT), Logistic Regression, SVM, Random Forest (RF), and Naïve Bayes (NB).","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129416104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Face Spoof Detection Using Gray Level Co-Occurrence Matrix and Discrete Wavelet Transform Feature Extractor 基于灰度共生矩阵和离散小波变换特征提取的人脸欺骗检测
2021 International Conference on Computing Sciences (ICCS) Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00011
Amal Mathew, Kaushik Daiv, Polkumpally Rohan Goud, Piyush Talreja, Sai Sanjana Reddy Vatte
{"title":"Face Spoof Detection Using Gray Level Co-Occurrence Matrix and Discrete Wavelet Transform Feature Extractor","authors":"Amal Mathew, Kaushik Daiv, Polkumpally Rohan Goud, Piyush Talreja, Sai Sanjana Reddy Vatte","doi":"10.1109/ICCS54944.2021.00011","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00011","url":null,"abstract":"Face identification using ML (machine learning) is well-known. Attendance structures may benefit from this method. Using this method, you may achieve the desired area, as well as beneficial attributes and a dataset, by preparing two sets of data again for test and training phases. To distinguish between a testing set and a test sets, a photograph is used as a testing set. An ensemble classification method is used to sort the test images into categories like “identified” and “unidentified.” This model can't provide reliable findings since it simply divides data into two categories. The development of GLCM was motivated by the need to use texture properties to identify faces. The existence of the query picture is noted once face detection has taken place. In simulation findings, the new model outperforms the baseline models in terms of accuracy. Keywords—Ensemble classifier, GLCM, Face Spoof, SVM, DWT","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127287510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining Blockchain Multi Authority and Botnet to Create a Hybrid Adaptive Crypto Cloud Framework 结合区块链多授权和僵尸网络创建混合自适应加密云框架
2021 International Conference on Computing Sciences (ICCS) Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00028
Ravikumar Ch, Isha Batra, A. Malik
{"title":"Combining Blockchain Multi Authority and Botnet to Create a Hybrid Adaptive Crypto Cloud Framework","authors":"Ravikumar Ch, Isha Batra, A. Malik","doi":"10.1109/ICCS54944.2021.00028","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00028","url":null,"abstract":"Blockchain technology has now spread like wildfire across the internet. Blockchain has emerged as a game-changing technology for complex industrial processes as a result of its openness, availability, and security. In this study, we used a hybrid adaptive crypto cloud framework that combines blockchain technology with multiple authorities and a botnet framework to improve cloud security while reducing computation time. The proposed adaptive crypto cloud system divides the cloud security framework into stages to organize secure data communication and reduce communication latency while detecting internal and external threats. In order to compute authentication using hash mapping and deploy an authentication system to safeguard the various users' authentication information, the whole system placed a major emphasis on block chain technology. The technology not only improves security but also makes the role-based access control system and anonymous authentication system more user-friendly.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131040164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis of Various Models for Assessment of Trust in Digital Age Accelerated by Covid-19 新型冠状病毒肺炎加速的数字时代各种信任评估模型比较分析
2021 International Conference on Computing Sciences (ICCS) Pub Date : 2021-12-01 DOI: 10.1109/ICCS54944.2021.00039
Aseem Kumar, A. Malik
{"title":"A Comparative Analysis of Various Models for Assessment of Trust in Digital Age Accelerated by Covid-19","authors":"Aseem Kumar, A. Malik","doi":"10.1109/ICCS54944.2021.00039","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00039","url":null,"abstract":"The Coronavirus pandemic has made Irreversible changes in our society and the business world. Almost all aspects of the business and daily routine have shifted to the digital platforms and various forms of personal, indirect communications and suit the current environment in guarding us against coronavirus. The outbreak also brought a refreshing load of creativity in the people who found new ways to solve everyday problems. The key to solving problems is effective communication. With the help of mobile devices and computers, people were able to change their environment so that their expression of thoughts and their tasks of daily routine got aligned with social media platforms. People express themselves as if they are not going to get another chance to express themselves. They use doodles, poetic tweets, and many other forms of colloquial language. Using mixed language such as Hinglish became a norm for the commoner. In this research work, an attempt has been made to review techniques that can be used to work trust models from which meaning insights can be drawn in times such as covid-19 pandemic. From this study it can be inferred that no single approach of modeling complex scenarios such trust in times of covid-19 can be done. There is an urgent need to take inspiration from multiple techniques and approaches to assess the trust level in the digital society.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信