Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)最新文献

筛选
英文 中文
The Nonsplit Resolving Domination Polynomial of a Graph 图的非分裂解析支配多项式
N. Pushpa, B. V. Dhananjayamurthy
{"title":"The Nonsplit Resolving Domination Polynomial of a Graph","authors":"N. Pushpa, B. V. Dhananjayamurthy","doi":"10.2991/ahis.k.210913.006","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.006","url":null,"abstract":"Metric representation of a vertex v in a graph G with an ordered subset R = {a1, a2, ... , ak} of vertices of G is the kvector r(v|R) = (d(v, a1), d(v, a2), ... , d(v, ak)), where d(v, a) is the distance between v and a in G. The set R is called a Resolving set of G , if any two distinct vertices of G have distinct representation with respect to R . The cardinality of a minimum resolving in G is called a dimension of G, and is denoted by dim(G). In a graph G = (V, E), A subset D ⊆ V is a nonsplit resolving dominating set of G if it is a resolving, and nonsplit dominating set of G. The minimum cardinality of a nonsplit resolving dominating set of Gis known as a nonsplit resolving domination number of G, and is represented by γnsr(G) . In network reliability domination polynomial has found its application [20], a resolving set has diverse applications which includes verification of network and its discovery, mastermind game, robot navigation, problems of pattern recognition, image processing, optimization and combinatorial search [19]. Here, we are introducing nonsplit resolving domination polynomial of G. Some properties of the nonsplit Resolving domination polynomial of Gare studied and nonsplit resolving domination polynomials of some well-known families of graphs are calculated.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124715792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of Communication Protocols for Internet of Things (IoT) Devices: Review 物联网(IoT)设备通信协议研究综述
M. Jamuna, A. Prakash
{"title":"A Study of Communication Protocols for Internet of Things (IoT) Devices: Review","authors":"M. Jamuna, A. Prakash","doi":"10.2991/ahis.k.210913.033","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.033","url":null,"abstract":"Wired and Wireless communication technology for IoT devices play an important role in various applications like transportation, healthcare systems, logistics, personal, social gaming robot, smart environment and city information. The design of low power architecture and development of the protocols is a challenging task for wireless and wired communication in IoT devices. Many communication technologies were used to improve the data rate for IoT communication but the error rate was increased, which reduces the reliability of the system. This paper focuses on various communication protocols for IoT devices. In addition, a comparison is done between different IoT communication protocols with respect to different metrics such as frequency bands, networks, topology, power consumption, data rate etc. The goal of this comparison is to present the guidelines for the researchers which help them to select the right protocol for various IoT applications.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133189209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Deep Learning Approach to Detect COVID-19 一种检测COVID-19的深度学习方法
C. Shrada, Balakrishna Gudla, K. Chaithra, T. S. Hassini
{"title":"A Deep Learning Approach to Detect COVID-19","authors":"C. Shrada, Balakrishna Gudla, K. Chaithra, T. S. Hassini","doi":"10.2991/ahis.k.210913.032","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.032","url":null,"abstract":"Covid-19 is a viral disease that has been spreading rapidly infects both human beings and animals. The lifestyle of people, their physical and mental well-being and the economic condition of a country are distressingly disturbed due to the viral disease. Recently, vaccines have been prepared for COVID19 which have quite winning results. Yet we are unsure about the long-term effects of the vaccine. In a clinical study of COVID-19 infected patients shows that the covid patients are more likely to be infected from a lung infection after coming in contact with the virus. Chest x-ray (i.e., radiography) and chest computed tomography (CT) are a more effective imaging technique for diagnosing lung related problems. Yet, a significant chest x-ray is a lower cost process in comparison to chest CT. Adding to the previous statement, a chest X-ray helps to identify unusual and abnormal formations of a large variety of chest diseases such as pneumonia, cystic fibrosis, emphysema, cancer, etc. Deep learning is the most successful technique of machine learning, which provides useful analysis that can detect the COVID-19 virus and differentiate between a healthy lung and a virus infected lung successfully. Medical imaging, such as X-rays and CT scans, can aid in the early diagnosis of COVID-19 patients, allowing for more prompt therapy. For prediction, a Convolutional Neural Network (CNN) extracts information from chest x-ray pictures has been done. In order to classify an image as COVID or normal we need to have a segmented target so as to obtain this we use filters so that we can get the edge of the image. Keras Image Data Generator class is used to generate augmented images. Classification is performed with two classes: COVID-19 and","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130943993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity Vulnerabilities and Defence Techniques in Aviation Industry 航空工业的网络安全漏洞与防御技术
Shazah Ishtiaq, Nor Azlina Abd Rahman
{"title":"Cybersecurity Vulnerabilities and Defence Techniques in Aviation Industry","authors":"Shazah Ishtiaq, Nor Azlina Abd Rahman","doi":"10.2991/ahis.k.210913.071","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.071","url":null,"abstract":"‘Aviation’ is referring to transportation of goods via air. The global community is increasing, and people are moving from one place to another in a faster way due to the presence of aviation. As the technology is growing there have been an increase in the cybercrimes as well. The most famous case in the aviation industry is the flight MH370, which was a Malaysian airline travelling normally without any turbulence, disappeared without a trace. The aircraft had 227 passengers boarded including the crew, it is still a mystery which no one could solve. There have been conspiracies that stated that the plane’s auto pilot was hacked. Considering the importance of this case, this research will be focusing on the cybersecurity threats which exists in the aviation industry, it will also present threats which may have caused the disappearance and highlight a plan to overcome vulnerabilities in the critical infrastructure of aviation industry.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129821380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quality Attributes for an LMS Cognitive Model for User Experience Design and Evaluation of Learning Management Systems 面向学习管理系统用户体验设计与评价的LMS认知模型的质量属性
Emmanuel O. C. Mkpojiogu, O. E. Okeke-Uzodike, E. I. Emmanuel
{"title":"Quality Attributes for an LMS Cognitive Model for User Experience Design and Evaluation of Learning Management Systems","authors":"Emmanuel O. C. Mkpojiogu, O. E. Okeke-Uzodike, E. I. Emmanuel","doi":"10.2991/ahis.k.210913.029","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.029","url":null,"abstract":"This paper used literature mapping and review protocol to examine associated literature sources with possible relationships that offers hints for the conceptualization of a UX cognitive model for the design and evaluation of learning management system (LMS) products. The mapping review revealed that the cognitive aspects of Bloom’s learning taxonomy can be mapped into the user experience cognitive model for LMS. This model comprises of usability, learnability, understandability, ubiquity, rememberability, safety, trust and epistemic design and evaluation quality criteria. The proposed model is both appropriate for the design and evaluation of the cognitive components of LMS platforms and is therefore recommended for adoption.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128669936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementation of IoT in Patient Health Monitoring and Healthcare for Hospitals 物联网在医院患者健康监测和医疗保健中的实施
Liew Yi Kent, I. F. Kamsin
{"title":"Implementation of IoT in Patient Health Monitoring and Healthcare for Hospitals","authors":"Liew Yi Kent, I. F. Kamsin","doi":"10.2991/ahis.k.210913.059","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.059","url":null,"abstract":"Hospitals around the world are facing overcrowding issue especially during the Covid-19 pandemic. IoT devices can be implemented to improve the efficiency at hospitals and reduce risks of doctors getting infected. By implementing IoT, health monitoring can be done remotely, and healthcare provided to patients will be better and timelier. The method used to get the sample for the research is the Stratified sampling method and survey questionnaires will be distributed to collect data from them. A proposed system will then be made to check the feasibility and effectiveness of the system. In the future, the system should improve along with advancements in IoT so everyone will have ease of mind using the system. The aim of this research and proposal is to implement a solution for hospitals to improve health monitoring and provide better and timelier healthcare for patients.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122047307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comprehensive Review on Smart IoT Applications 智能物联网应用综述
Shimon Nathaniel Koshy, I. F. Kamsin, N. Zainal
{"title":"A Comprehensive Review on Smart IoT Applications","authors":"Shimon Nathaniel Koshy, I. F. Kamsin, N. Zainal","doi":"10.2991/ahis.k.210913.069","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.069","url":null,"abstract":"","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126097354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting Growth and Trends of COVID-19 by Implementing Machine Learning Algorithms 通过实施机器学习算法预测COVID-19的增长和趋势
D. M. Vistro, M. Farooq, A. Rehman, M. O. Aftab
{"title":"Predicting Growth and Trends of COVID-19 by Implementing Machine Learning Algorithms","authors":"D. M. Vistro, M. Farooq, A. Rehman, M. O. Aftab","doi":"10.2991/ahis.k.210913.075","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.075","url":null,"abstract":"Artificial Intelligence has absolutely revolutionized the world in which we live, and with the passing of time it advances exponentially. The applications of AI are tremendous like healthcare and medical solutions, disease diagnostics, agriculture, developing security infrastructures, Autonomous vehicles, intelligent systems, industrial manufacturing, robotics and so much more. COVID19 is a deadly virus that started from china in 2019 and started to spread rapidly and within time spread throughout various countries of world and in 2020 the world went to a huge pandemic and many lives were lost due to this deadly virus causing to a major health hazard. Moreover, in 2021 many countries experience other new forms of the Covid19 that are faster to spread and more deadly. The spread and growth need to me monitored and evaluated to control the spread. The paper states the proposed methodology to evaluate insights of the growth rate or number of cases along with the death rate of COVID19 to getter better visualization to impose lockdown and area evacuation for population safety. We have applying popular Machine Learning algorithms for the forecast of COVID19 including Naive Bayes, Bayes Net, Decision Tree, Random Forest, Logistic Regression. Moreover, the technique will help to evaluate the trend to get better insights for behaviour analysis of COVID19. This study would aid policymakers in taking the required steps in advance, such as preparing isolation wards, ensuring the supply of drugs and paramedical staff, deciding partial or complete lockdown strategies, recruiting volunteers, and developing economic strategies. Out of all techniques, Random Forest algorithm outstands others with the highest accuracy of 87.28% with precision and recall of 89% and 85% respectively.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130097873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ASD Classification in Adolescent and Adult Utilizing Deep Neural Network 基于深度神经网络的青少年和成人ASD分类
A. Mohanty, Priyadarsan Parida, K. C. Patra
{"title":"ASD Classification in Adolescent and Adult Utilizing Deep Neural Network","authors":"A. Mohanty, Priyadarsan Parida, K. C. Patra","doi":"10.2991/ahis.k.210913.025","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.025","url":null,"abstract":"Autism Spectrum Disorder (ASD) is one of the neurological illnesses affecting the behaviour and communicative skills of an individual. It hampers the recognition capability of an individual. Hence it is the primary responsibility towards the affected individuals with ASD for early detection to minimize its effect. ASD clinical diagnosis procedure is lengthy and expensive. So, against the procedure, ASD datasets are stored in authenticated sites like Kaggle and UCI Machine Learning (ML) repository to carry out clinical research. The data from all the category of individuals including adult, adolescent, child and toddler got collected by a mobile based ASDTest app with certain screening questions. The proposed method covered the category of adolescent and adult datasets with implementation of Landmark Isomap for dimension reduction and then improved Deep Neural Network prediction with classification (iDNNPC) architecture for detecting ASD class. The evaluation of performance parameters confirmed the accomplishment of i-DNNPC classifier model.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127796561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-based Child Security Monitoring System 基于物联网的儿童安全监控系统
Lai Yi Heng, I. F. Kamsin
{"title":"IoT-based Child Security Monitoring System","authors":"Lai Yi Heng, I. F. Kamsin","doi":"10.2991/ahis.k.210913.058","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.058","url":null,"abstract":"Nowadays, crime rate associated with children keeps increasing due to which draws peoples’ attention regarding child safety. This research is conducted to propose a child security smart band utilizing IoT technology. Online questionnaire and semi-structured interview are methodologies used to collect data. The online questionnaire gains feedbacks by sending questions electronically, where answers need to be submitted online. In the semi structured interview, researcher meets and asks respondents some predetermined questions while other being asked are not planned in advanced. Through information obtained, a smart band have been proposed to monitor the safety of children. By this, parents know what is happening remotely and can take actions if something goes wrong. The future improvements of this device will be adding functions and software to make it works like a phone such as messaging, gallery, Google, YouTube, meanwhile, adding more child security features so that child safety is guaranteed.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127560236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信