Proceedings of the 1st International Conference on Innovation in Computer and Information Science最新文献

筛选
英文 中文
Review on the Application of Machine Learning Methods in Landslide Susceptibility Mapping 机器学习方法在滑坡易感性制图中的应用综述
D. S. Mwakapesa, Ye Li, Xiangtai Wang, Binbin Guo, Mao Yimin
{"title":"Review on the Application of Machine Learning Methods in Landslide Susceptibility Mapping","authors":"D. S. Mwakapesa, Ye Li, Xiangtai Wang, Binbin Guo, Mao Yimin","doi":"10.5220/0010790400003167","DOIUrl":"https://doi.org/10.5220/0010790400003167","url":null,"abstract":": Machine learning is a very important in computer science field which has gained attention in numerous applications. This paper reviewed various machine learning methods including supervised and unsupervised learning and highlighted their applications, advantages and disadvantages in landslide susceptibility mapping. The review has also mentioned the challenges of machine learning algorithms for achieving higher performance accuracy from the supervised and unsupervised learning algorithms during landslide susceptibility. Moreover, highlights on the application of deep learning methods as the current research in landslide susceptibility mapping has also been reported. Finally, this paper argued the necessity of thorough preparation of relevant and enough data being significant important to obtain high performance results from the review methods.","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114508394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of Machine Learning and Big Data Analytics Paradigms in Cyber-security and Cloud Computing Platforms 机器学习和大数据分析范式在网络安全和云计算平台中的性能
G. Kabanda
{"title":"Performance of Machine Learning and Big Data Analytics Paradigms in Cyber-security and Cloud Computing Platforms","authors":"G. Kabanda","doi":"10.5220/0010789900003167","DOIUrl":"https://doi.org/10.5220/0010789900003167","url":null,"abstract":"The purpose of the research is to evaluate Machine Learning and Big Data Analytics 7 paradigms for use in Cybersecurity. Cybersecurity refers to a combination of technologies, 8 processes and operations that are framed to protect information systems, computers, devices, 9 programs, data and networks from internal or external threats, harm, damage, attacks or 10 unauthorized access. The main characteristic of Machine Learning (ML) is the automatic data 11 analysis of large data sets and production of models for the general relationships found among 12 data. ML algorithms, as part of Artificial Intelligence, can be clustered into supervised, 13 unsupervised, semi-supervised, and reinforcement learning algorithms. collected of opportunity 30 for cyber crimes and other forms cybersecurity risks, especially among interconnected devices now at household 31 level. 32 The research paper is focused on the Performance of Machine Learning and Big Data Analytics paradigms in 33 Cybersecurity and Cloud Computing platforms. The purpose of the research is to evaluate Machine Learning 34 and Big Data Analytics paradigms for use in Cybersecurity. This is relevant due to the rapid advances in 35 machine learning (ML) and deep learning (DL) as we explore the potency of efficient and cost-effective cloud 36 computing platforms and services. Evaluation of the attacks and defenses using ML and Big Data paradigms 37 is the key subject of this research paper. However, ML and DL techniques are resource intensive and require 38 huge volumes of training data with excellent performance, as is often provided by computational resources such 39 as high-performance graphics processing units (GPUs) and tensor processing units. Security issues related to 40 virtualisation, containerization, network monitoring, data protection and attack detection are interrogated whilst 41 strengthening AI/ML/DL security solutions that involve encryption, access control, firewall, authentication and 42 intrusion detection and prevention systems at the appropriate Fog/Cloud level. 43 Cybersecurity consolidates the confidentiality, integrity, and availability of computing resources, networks, 44 software programs, and data into a coherent collection of policies, technologies, processes, and techniques 45","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116747676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Unmanned Aerial Vehicle Attack Detection using Snort 使用Snort进行无人机攻击检测
Shahzad Mujeeb, S. Chowdhary, Abhishek Srivastava, R. Majumdar, M. Kumar
{"title":"Unmanned Aerial Vehicle Attack Detection using Snort","authors":"Shahzad Mujeeb, S. Chowdhary, Abhishek Srivastava, R. Majumdar, M. Kumar","doi":"10.5220/0010789700003167","DOIUrl":"https://doi.org/10.5220/0010789700003167","url":null,"abstract":": In recent times, security issues relating to unmanned aerial vehicles (UAVs) and drones have anticipated a staid attention from research communities in various domains in the form of networking, communication, and civilian as well as in defence zone. It has its widespread functionality in the area of agriculture, commerce, and transportation, the use of unmanned aerial vehicles (UAVs)/ drones, is increasing. The ground control systems (GCS) are used to remotely monitor UAVs over the network. Since UAVs are vulnerable to security risk, they become the targets of various attacks such as GPS spoofing, jamming attack, network attacks and many other forms so to tackle with such issues the prime concern will be to identify these attacks followed by to prevent the UAVs or drones from UAV attacks. On contrary network-controlled UAVs however are equally vulnerable to threats like DOS attacks, GPS spoofing etc. In this work a network surveillance approach is projected for UAV attack detection system by means of Snort. Snort uses a set of guidelines and rules set by the user itself to help in identifying the malicious network behaviour and to locate packets that fit them and create user warnings with those rules. It is an open-source tool that records traffic analysis and packets in real time.","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128979365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy Efficient Cool Roof System to Reduce Carbon Footprint 节能冷却屋顶系统,减少碳足迹
Ritik Sharma, Gulzar Miglani, Nitin Sharma, Shivam Pundir, S. Chowdhary, Abhishek Srivastava, M. Kumar
{"title":"Energy Efficient Cool Roof System to Reduce Carbon Footprint","authors":"Ritik Sharma, Gulzar Miglani, Nitin Sharma, Shivam Pundir, S. Chowdhary, Abhishek Srivastava, M. Kumar","doi":"10.5220/0010790100003167","DOIUrl":"https://doi.org/10.5220/0010790100003167","url":null,"abstract":"","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128377941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post COVID 19 Pandemic Impacts on Socio-economic Development COVID - 19大流行对社会经济发展的影响
Himani Kohli, Manoj Kumar, Anuj Rani
{"title":"Post COVID 19 Pandemic Impacts on Socio-economic Development","authors":"Himani Kohli, Manoj Kumar, Anuj Rani","doi":"10.5220/0010789500003167","DOIUrl":"https://doi.org/10.5220/0010789500003167","url":null,"abstract":"","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android TV App for Video Conferencing 安卓电视视频会议应用程序
Arvind Garg, Rahul Saini, S. Rawat, S. Chowdhary, M. Kumar
{"title":"Android TV App for Video Conferencing","authors":"Arvind Garg, Rahul Saini, S. Rawat, S. Chowdhary, M. Kumar","doi":"10.5220/0010789800003167","DOIUrl":"https://doi.org/10.5220/0010789800003167","url":null,"abstract":": Abstract: During the coronavirus (COVID-19) pandemic, many people work from home and hold meetings online from the past decade video conferencing become more popular. It is very efficient, distance learning and very effective now a days. We have lots of channels for video conferencing like Zoom, Ms teams, hangouts and Jitsi meet. This can be operated over the mobile phones our personal laptops. But we do not have any application by which we can use the video conferencing over the Android Tv directly. There are many steps by which we can broadcast our mobile or laptop screen over the Android Tv but there is no such application by which we can directly use the application directly on the Android Tv screen. In this Research paper, by using the API integration of the Jitsi meet or connectivity, Android Tv application can be created. From the last year, IT sector becomes more powerful because of the Work from Home Policies due to Pandemic Situation. All the work is going online, which is called distance video conferencing. For the effective learning we need a big screen, which would be very effective for distance learning. With the help of The Android Tv video conferencing application USER can learn the things quickly and without any trouble over the big screen. It will be very helpful for the students at Schools, Universities and for the employees of corporate world.","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125780329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on Mobile Banking and e-Wallet Usage and its Security Concerns 流动银行及电子钱包的使用情况及其保安问题调查
Anubhav Bose, Chetna Choudhary, S. Chowdhary, M. Kumar
{"title":"Survey on Mobile Banking and e-Wallet Usage and its Security Concerns","authors":"Anubhav Bose, Chetna Choudhary, S. Chowdhary, M. Kumar","doi":"10.5220/0010789600003167","DOIUrl":"https://doi.org/10.5220/0010789600003167","url":null,"abstract":"","PeriodicalId":346698,"journal":{"name":"Proceedings of the 1st International Conference on Innovation in Computer and Information Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121435210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信