{"title":"State-of-Art Deep Learning Based Tomato Leaf Disease Detection","authors":"A. Karegowda, R. Jain, G. Devika","doi":"10.2991/ahis.k.210913.038","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.038","url":null,"abstract":"In India, the tomato plant is a popular staple food with high commercial value and considerable production capacity; however, the quality and quantity of the tomato harvest decreases due to a variety of diseases and henceforth leads to great financial loss for farmers. With lack of agricultural professions to assist the farmers, a deep learning (DL) based user friendly, just-in-time mobile is proposed for the detection of crop diseases for assisting farmers to know about the type of tomato disease and the remedy for the same. Two DL based methods: YOLO and Faster RNN have been used for detection; followed by classification using SVM and Random forest tree. YOLO and Random forest tree resulted in accuracy in the range of 90% to 95%. The developed app provides option to the farmer to operate in English as well as in local language Kannada of Karnataka state of India.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117152767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of SQL Injection Hacking Techniques","authors":"Foong Yew Joe, Vinesha Selvarajah","doi":"10.2991/ahis.k.210913.067","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.067","url":null,"abstract":"Data is the most valuable asset of a person in the current cyber world. More and more data are being collected by applications for multi-purposes. These valuable data are stored inside a database. Standard Query Language (SQL) is a database query language for managing databases. SQL injection attack is the most common attack being used by attackers to gain unauthorized access to the database although it has been used for more than a decade. Many security professionals have proposed countermeasures against SQL injection attacks, but it is still listed as one of the Top 10 Web Application Security Risks today. The concept of SQL injection attack is to inject SQL codes into the database server and execute the injected codes to retrieve the desired result. SQL injection attacks can be classified into different categories depending on the characteristics of the attack. The severity of a SQL injection attack may vary, depending on the vulnerability and the permission assigned. It may only be causing leakage of some insensitive data or it might be causing the destruction and major modification of the database. This paper includes an overview of SQL injection attacks and a demonstration of attacking the database. Moreover, the characteristics and examples of exploiting different types of SQL injection vulnerabilities were discussed.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121032063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Awareness Among the Youngs in Malaysia by Gamification","authors":"Ng Jia Jian, I. F. Kamsin","doi":"10.2991/ahis.k.210913.061","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.061","url":null,"abstract":"Cybersecurity is getting more critical and important to the digital world nowadays. Government, military, company, and medical industry use technologies to collect and store sensitive data and information for many purposes. There are more cybercrime cases raise at the same time. The reason is that people are still lack of cybersecurity awareness especially the Youngs age between 13 years old to 15 years old. The aim of this research is to study on how to increase cybersecurity awareness among teenagers by using gamification, and how a computer game would attract teenagers to learn about cybersecurity. At the end of this research, a computer game named “BEWARE” is developed to achieve the aim. For this research, quota sampling method is applied to 50 secondary students range age from 13-15 years old in Malaysia by using Online survey. 3 students were randomly selected to participate in the interview session to ensure the online survey result is reliable. An area of future research to raise the awareness of cybersecurity that would be recommended that is focusing more on actions must take by schools and find out more interesting way to help the Youngs to notice about cybersecurity.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128359303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Geetha, Karegowda Asha Gowda, R. Nandeesha, B. V. Nagaraj
{"title":"Change Detection of LULC using Machine Learning","authors":"M. Geetha, Karegowda Asha Gowda, R. Nandeesha, B. V. Nagaraj","doi":"10.2991/ahis.k.210913.042","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.042","url":null,"abstract":"This paper discusses detection of change in land usage in Davangere (Karnataka State, India) between the years 2016 and 2021. After the place has been declared as one of the smart cities identified by the Govt. of India in 2014 and subsequent to the international price crash for sugar, there were noticeable changes in land utilization in terms of urbanization and shift in traditional cropping pattern. The objective of this research work is to capture this change using remote sensing, the images from MSI Sentinel-2 were collected at two points of time and processed for LULC with the help of supervised machine learning classifiers such as Minimum Distance, Mahalanobis Distance and Maximum Likelihood to ascertain the accurate one. It was found that Maximum Likelihood classifier ensures highest accuracy of 95.2%. It was also found that during the study period, there was a significant change in the land use with respect to Built-up area and Area under cultivation of Paddy.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121958280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Rani, T. M. Delsy, D. Marshiana, N. Praveen, P. Kartheek
{"title":"ML Based Smart Energy Meter Observing & Bill Supervision Using Raspberry Pi","authors":"V. Rani, T. M. Delsy, D. Marshiana, N. Praveen, P. Kartheek","doi":"10.2991/ahis.k.210913.001","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.001","url":null,"abstract":"","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133829817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Different Methods of Reconnaissance","authors":"Pavan Kashyap, Vinesha Selvarajah","doi":"10.2991/ahis.k.210913.064","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.064","url":null,"abstract":"In the current digital world, we are exposed to a host of information. There's an immense wealth of knowledge base which can be tapped. While this could be used in good ways, there are possibilities of misuse of this information, for example, these days hacking websites is a common occurrence and this can compromise the security of the website, leading sometimes to consequences that can be even serious. In this article, the focus is on one of the important phases known as “reconnaissance”, which is step one in the methods of website hacking. This article uses the “Passive” method of gathering information. Different “OSINT” tools involved in the information gathering are used and the comparison of their performances is made against certain pre-determined outcomes. These various tools are used on two different websites one secure and another one vulnerable to ascertain variable outcomes depending on the level of security of each type of website. Various information is gathered by using the different tools which would be essential to perform the other steps followed after reconnaissance in the website hacking. An extensive analysis is also conducted to understand the consequences of website hacking on a company in the current scenario.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131476041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrative Information Retrieval with a Consumer Strategy Approach","authors":"K. Sridevi, S. Prakasha","doi":"10.2991/ahis.k.210913.013","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.013","url":null,"abstract":"In this study, Information Retrieval has become an integral part of our life. We require these technologies to make our digital life comfortable in this fast running technology era. We have tried to describe a consumer methodology to coordinating information retrieval, wherein the emphasis is placed on the consumer’s behaviours rather than the subsystem. This process explains the novel methodologies in the field of Information Retrieval, this methodology has been more efficient over the old ways which seems to lack in few aspects. This strategy entails using transcription and effective interactions to facilitate information exchange between consumers mostly during information retrieval process. We built an ecosystem for consumers to reciprocate their understanding both sequentially and interdependently during in the description and validation of information asymmetry, the selection of an information technology being used for research, the composition and reinterpretation of quests to communicate their responses suggest related to information system selected; and the formulation and reinterpretation of quests to convey their signs indicate based on the data which is chosen. and during the evaluation of information relevancy to the resolution of their information problem. Here have presented a novel approach in detail in multiple sections ahead in this paper.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133320010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Security Improvement with Transmission of Aggregated Data Through Hamilton Clustering Protocol","authors":"M. Bobby, D. Usha","doi":"10.2991/ahis.k.210913.031","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.031","url":null,"abstract":"WSN (Wireless Sensor Network) is a network of devices that can perform data transmission from an analyzed field via wireless links. Thus, secure data transfer is needed to ensure correct data transmission from source nodes to the destination node as data passes via numerous intermediate nodes. It is significant to confirm that the network is free from malicious nodes to securely transfer the data in WSN, thereby achieving a reliable transmission. This study aims to form a cluster-based topology and then perform energy-based clustering by the proposed Hamilton Theory-based Clustering (HTC). As security is in WSN, Multicast Asymmetric Encryption (MAE) and decryption are employed. The high density of nodes makes it sense the same data repeatedly, leading to energy loss and minimized network lifetime. To solve this issue, the study introduced Algebraic Model-based Data Aggregation (AM-DA). Performance analysis is also assumed to assess the efficiency of the proposed methods.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132673475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent Trends in Answer Script Evaluation – A Literature Survey","authors":"A. Maya, Javed Nazura, B. L. Muralidhara","doi":"10.2991/ahis.k.210913.014","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.014","url":null,"abstract":"Assessment of answer scripts is an integral part of an examination and education system. A fair, consistent, unbiased, and correct valuation ensures the integrity of an examination system and is important for all education institutions. Since manual valuation is cumbersome and can be biased or influenced by the perception/mood of the evaluator, automatic grading of scripts has become very relevant. Automatic short answer grading (ASAG) techniques have been widely researched in the last decade and have assumed increased relevance because of online teaching and examinations during the Covid-19 pandemic. This review paper focuses on the recent works in the area of automatic answer grading and compares the techniques, methodologies employed, and the consequent results to evaluate their effectiveness. It discusses the advantages and limitations of the techniques by systematically categorizing the questions into both long/short as well as open-ended/close-ended questions and suggests a new model for improving the grading outcomes.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130947766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Critical Success Factor Estimation for Software Security in Small and Medium Scale Industry Using AHP and TOPSIS Approach","authors":"N. Kavyashree, M. Supriya, M. Lokesh","doi":"10.2991/ahis.k.210913.018","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.018","url":null,"abstract":"In small and medium scale software industry, software security success factor is trivial process. Six-sigma and fuzzy logic methodology address software security problems effectively in the state of work. The research work chosen Fuzzy Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and Analytical Hierarchical Process (AHP) method to identify critical success factor estimation. The experimental case study, shows the Euclidean distance amongst the nine components of IOS mobile application. The results discuss on the goal alternate and the best/worst alternate Ranking of the factors to verify mobile IOS application software security. For attaining supportable software security, it is authoritative to safeguard that best practices are conscripted in considering the security valuation at the actual commencement of the software development life cycle.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131054334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}