{"title":"Comparison of Standard Computation Against Distributed Computation Using Hadoop Cluster","authors":"Reet Rahul Ghosh, Abhaya Kirtivasan, Swati Srivastava","doi":"10.2991/ahis.k.210913.028","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.028","url":null,"abstract":"Computing the solutions to real life problems has become the need of the hour and has become a matter of utmost importance. In earlier times, it took days/months to compute and use algorithms to make things work, but as time passed on, computers became faster and more efficient, and these computations took less time. Now a days, new computation techniques are being invented. One such technique which will be discussed in this paper is Distributed Computation using Hadoop. Instead of using a single computer to solve problems, multiple virtual machines will be set up and will be used to prove quantitatively the time taken to execute one job using standard computation is much more than the time taken to execute the same job using Distributed Computation using Hadoop. This will help in faster computation and less time to perform tasks, as compared to standard methods which do not use cloud technology.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114056479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. M. Vistro, M. Farooq, A. Rehman, Mohsin A. Khan
{"title":"Fraud Prevention in Taxation System of Pakistan Using Blockchain Technology","authors":"D. M. Vistro, M. Farooq, A. Rehman, Mohsin A. Khan","doi":"10.2991/ahis.k.210913.074","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.074","url":null,"abstract":"Taxation department of Pakistan collects and keeps record of legislated taxes imposed by governments. Pakistan is among those countries which still maintain records of taxations in registers, thus maintaining immutability of records is really hard. Tax records have great risk of being lost or altered by someone and results in leading towards committing fraud in taxes. Blockchain has provided advantage to many industries because of its enhanced security and traceability in current trustless environment. We have presented a tax management solution which has an objective to provide secure, efficient and auditable system in Pakistan environment using blockchain technology. Our proposed methodology is about digitizing of the records of taxations using the blockchain distributed ledger based technology. Finally, future work prediction is also given, which will help getting directions for controlling fraud cases from most senior officers","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"14 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114132085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Security Model for Pervasive Computing Using Machine Learning Techniques","authors":"Jayashree Agarkhed, Geetha Pawar","doi":"10.2991/ahis.k.210913.051","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.051","url":null,"abstract":"In recent mobile world the pervasive computing plays the vital role in data computing and communication. The pervasive computing provides the mobile environment for decentralized computational services where the user work and socializes. Pervasive computing in recent trend moves away from the desktop to make surrounding as flexible and portable dev ices like laptop, notepad, smartphones and personal digital assistants. Pervasive environment devices are worldwide and able to receive various communication services including TV, cable network, radio station and other audio-visual services. The users and the system in this pervasive environment may face the challenges of user trust, data privacy and user and device node identity. To give the feasible determination for these challenges. This paper aims to propose a dynamiclearning pervasive computing environment to refer the challenges’ proposed efficient trust model (ETM) for trustworthy and untrustworthy attackers. ETM model also compared with existing generic models, it also provides 97 % accuracy rate than existing models.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114572429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Brain Tumor and Parkinson’s Disease Diagnosis and Detection using Deep Learning","authors":"Sarvesh V. Warjurkar, Sonali Ridhorkar","doi":"10.2991/ahis.k.210913.044","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.044","url":null,"abstract":"Consider the possibility that we live in an area far from a doctor, or that we may not have enough resources to pay the hospital cost, or that we may not have enough time to take off work. The use of advanced computers to diagnose diseases will be lifesaving in such situations. Scientists have developed a number of artificially intelligent diagnostic algorithms for illnesses such as cancer, lung disease and Parkinson's disease. Deep learning employs massive artificial neural network layers of interlinked nodes that can reorganize themselves in response to updated data. This approach enables machines to self-learn without the need for assistance from humans. The emphasis of this article is on current developments in machine learning that have had major effects on identification for the detection of a variety of illnesses, such as brain tumor segmentation. Human-assisted manual categorization may lead to erroneous prediction and diagnosis, thus one of the most important and a useful technique is brain tumor segmentation tasks in medical image processing that are difficult. Furthermore, it is a difficult challenge because there is a vast volume of data to assist. Since brain tumors have such a wide range of appearances and since tumor and normal tissues are so close, extracting tumor regions from photographs becomes difficult. The advancement of clinical decision systems of support necessitates the identification and recognition of the appropriate biomarkers in relation to specific health problems. It has been established that handwriting deficiency is proportionate to the severity of the situation of individuals' Parkinson's disease (PD).","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117324391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Case Study: SYN Flood Attack Launched Through Metasploit","authors":"Ng Kar Zuin, Eugene, Vinesha Selvarajah","doi":"10.2991/ahis.k.210913.065","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.065","url":null,"abstract":"There are many different types of Denial of Service attacks like Ping flood attack and ICMP flood attack but this case study is about Denial of Service SYN flood attack that floods the victim machine with SYN packets and causes the victim machine performance to become slower. In this case study, the Kali Linux machine is used as a virtual machine and act as an attacker that attacks the victim machine, and the victim machine is using Windows 2008. Kali Linux is a well-known operating system used by unethical and ethical hackers out there performing their hacks to the victim or performing pen-testing. And there is a tool that used in Kali Linux to perform the SYN flood attack, the tool is Metasploit framework, which is also a well-known penetration testing framework that is currently using by all professional ethical hackers and also the unethical hackers because it is easier to use and it is a command-line interface which is more professional compare to the tools that is the graphical user interface. Hackers can easily launch the SYN flood attack if the hackers know the IP address of the victim machine and send all the SYN packets to the victim machine to jam the victim machine.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126412579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disaster Monitoring of Satellite Image Processing Using Image Classification Algorithm for Flood Alerts","authors":"Ch Vijaya Bhaskar Seelam, S. Anitha","doi":"10.2991/ahis.k.210913.054","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.054","url":null,"abstract":"India is totally beaten by diverse range of artificial and natural disasters. It couldn't be controversial which contempt their natural and splendid beauty. By these devastations the country suffers through the government sets an interference and mitigation idea set in mitigation and interference plans, very little place into thought when the diversity occurs. This paper emphasis on the data engineering (ICT) associate degree appliance exceedingly in a very kind of a mechanical man based application that are mostly transportable that provides losses the aptitude for hunting facilitate once an incident or disaster strikes, additionally, individuals will advise other individuals of the danger ahead through the mobile application. Such that they will evade the world wherever the hazard is thru crowd sourcing. It uses user’s movable intrinsical GPS and it shows the user various route to his destination such that he can avoid the disaster affected area and choose the different route.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133748824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Prototyping in Information Retrieval Process Utilizing Context Requirements and Feature Sample Sizes","authors":"K. Sridevi, S. Prakasha","doi":"10.2991/ahis.k.210913.012","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.012","url":null,"abstract":"Information retrieval can provide organizations with immediate value, Information retrieval has become a core of the current information managing systems, this has given profound importance on how we gather effective information in a huge pile of data. Information retrieval is a highly debated issue in a variety of fields. Today right from digital library to media searching information retrieval has taken up the place in the industry. Effective simulation is the foundation of effective information retrieval. These frameworks were divided into two groups based on their statistical estimation methods: models where the terminology dependency is being checked and also the models where the weighting features of the terms are being taken into consideration. Most models found an understanding term freedom, whereas others take this relationship into account. Term weighting, but in the other end, is a technique for effectively indexing a text. The intention of this research article is to compare and contrast various information retrieval structures that use term dependence/independence and term weighting.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134412641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications and Challenges of Blockchain with IoT in Food Supply Chain Management System: A Review","authors":"D. M. Vistro, M. Farooq, A. Rehman, Hadiya Sultan","doi":"10.2991/ahis.k.210913.076","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.076","url":null,"abstract":"Food security has become the most important thing now a days. People are getting infected by food coming from unprotected sources. Many technologies have been developed for this problem but a very successful technology is blockchain due to its nature of decentralization and transparency which helps in protecting food. Blockchain protects the food and also trace the source of the food from where it came without involving third party. According to present studies blockchain still needs more advancement. This paper carries out the systematic literature review based on the applications and challenges of blockchain in food supply chain management combined with IoT to provide more transparency, traceability and transparency with pros and cons. Our study indicates few barriers and challenges in the safety of food which are still existing in food supply chain management and faced by people now a days all these challenges have been discussed in this paper. This comprehensive literature review provides a useful perspective on many issues of food supply chain without blockchain.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"123 15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121999202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ananya Choudhury, A. Srinivasan, Aditya R Kattimani, S. Siddamal, Shraddha B Hiremath
{"title":"Microblaze Implementation of GPS","authors":"Ananya Choudhury, A. Srinivasan, Aditya R Kattimani, S. Siddamal, Shraddha B Hiremath","doi":"10.2991/ahis.k.210913.037","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.037","url":null,"abstract":"The accuracy and efficiency of a Global Positioning System (GPS) is a critical parameter especially for surveillance and automation purposes. The design of such a system which can not only provide high accuracy and efficiency but also is easily configurable enhances its applications largely for embedded systems. In this paper, the authors have proposed a design of a GPS implementation using a Microblaze which is a Xilinx based Field Programmable Gate Array (FPGA) soft core microprocessor that has over seventy user configurable options, optional Memory Management Unit (MMU) and a five-stage pipeline for maximum performance. The proposed design is used to track and route the path travelled by the user on a map and compute the distance. The Microblaze is used to connect and interface various configurable peripherals like USB UART and LEDs to implement a GPS using the AXI interface of an Arty A7-100T FPGA Evaluation Board. A comparison of the proposed design with respect to the performance parameters has been drawn to analyse the merits and specifications of the system.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131563576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview on Deep Learning in Image Super-Resolution for Advanced Machine Vision System","authors":"M. Kumari","doi":"10.2991/ahis.k.210913.027","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.027","url":null,"abstract":"Image spatial resolution means the ability of the sensor to measure the smallest pixel size object. It focuses on recovering a less resolution (LR) image to high resolution (HR) image observations. Due to the exceptional research and application realizations of machine learning at home and abroad, the implementation effect of machine learning algorithms in image super resolution will be enormous. For this, deep learning has become a powerful learning tool for computer vision works. Furthermore, the performance of image super-resolution methods is showing significantly improved by using deep learning. In this paper, the basic image super-resolution methods based on deep learning have been discussed in detail along with the latest applications using super-resolution techniques. In addition, the current open issues and challenges for future research work are discussed. Finally, the main application areas of image superresolution based on deep learning domain are presented.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131831695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}