Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)最新文献

筛选
英文 中文
State-of-Art Deep Learning Based Tomato Leaf Disease Detection 基于深度学习的番茄叶片病害检测技术
A. Karegowda, R. Jain, G. Devika
{"title":"State-of-Art Deep Learning Based Tomato Leaf Disease Detection","authors":"A. Karegowda, R. Jain, G. Devika","doi":"10.2991/ahis.k.210913.038","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.038","url":null,"abstract":"In India, the tomato plant is a popular staple food with high commercial value and considerable production capacity; however, the quality and quantity of the tomato harvest decreases due to a variety of diseases and henceforth leads to great financial loss for farmers. With lack of agricultural professions to assist the farmers, a deep learning (DL) based user friendly, just-in-time mobile is proposed for the detection of crop diseases for assisting farmers to know about the type of tomato disease and the remedy for the same. Two DL based methods: YOLO and Faster RNN have been used for detection; followed by classification using SVM and Random forest tree. YOLO and Random forest tree resulted in accuracy in the range of 90% to 95%. The developed app provides option to the farmer to operate in English as well as in local language Kannada of Karnataka state of India.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117152767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of SQL Injection Hacking Techniques SQL注入攻击技术研究
Foong Yew Joe, Vinesha Selvarajah
{"title":"A Study of SQL Injection Hacking Techniques","authors":"Foong Yew Joe, Vinesha Selvarajah","doi":"10.2991/ahis.k.210913.067","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.067","url":null,"abstract":"Data is the most valuable asset of a person in the current cyber world. More and more data are being collected by applications for multi-purposes. These valuable data are stored inside a database. Standard Query Language (SQL) is a database query language for managing databases. SQL injection attack is the most common attack being used by attackers to gain unauthorized access to the database although it has been used for more than a decade. Many security professionals have proposed countermeasures against SQL injection attacks, but it is still listed as one of the Top 10 Web Application Security Risks today. The concept of SQL injection attack is to inject SQL codes into the database server and execute the injected codes to retrieve the desired result. SQL injection attacks can be classified into different categories depending on the characteristics of the attack. The severity of a SQL injection attack may vary, depending on the vulnerability and the permission assigned. It may only be causing leakage of some insensitive data or it might be causing the destruction and major modification of the database. This paper includes an overview of SQL injection attacks and a demonstration of attacking the database. Moreover, the characteristics and examples of exploiting different types of SQL injection vulnerabilities were discussed.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121032063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cybersecurity Awareness Among the Youngs in Malaysia by Gamification 游戏化影响马来西亚年轻人的网络安全意识
Ng Jia Jian, I. F. Kamsin
{"title":"Cybersecurity Awareness Among the Youngs in Malaysia by Gamification","authors":"Ng Jia Jian, I. F. Kamsin","doi":"10.2991/ahis.k.210913.061","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.061","url":null,"abstract":"Cybersecurity is getting more critical and important to the digital world nowadays. Government, military, company, and medical industry use technologies to collect and store sensitive data and information for many purposes. There are more cybercrime cases raise at the same time. The reason is that people are still lack of cybersecurity awareness especially the Youngs age between 13 years old to 15 years old. The aim of this research is to study on how to increase cybersecurity awareness among teenagers by using gamification, and how a computer game would attract teenagers to learn about cybersecurity. At the end of this research, a computer game named “BEWARE” is developed to achieve the aim. For this research, quota sampling method is applied to 50 secondary students range age from 13-15 years old in Malaysia by using Online survey. 3 students were randomly selected to participate in the interview session to ensure the online survey result is reliable. An area of future research to raise the awareness of cybersecurity that would be recommended that is focusing more on actions must take by schools and find out more interesting way to help the Youngs to notice about cybersecurity.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128359303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Change Detection of LULC using Machine Learning 基于机器学习的LULC变化检测
M. Geetha, Karegowda Asha Gowda, R. Nandeesha, B. V. Nagaraj
{"title":"Change Detection of LULC using Machine Learning","authors":"M. Geetha, Karegowda Asha Gowda, R. Nandeesha, B. V. Nagaraj","doi":"10.2991/ahis.k.210913.042","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.042","url":null,"abstract":"This paper discusses detection of change in land usage in Davangere (Karnataka State, India) between the years 2016 and 2021. After the place has been declared as one of the smart cities identified by the Govt. of India in 2014 and subsequent to the international price crash for sugar, there were noticeable changes in land utilization in terms of urbanization and shift in traditional cropping pattern. The objective of this research work is to capture this change using remote sensing, the images from MSI Sentinel-2 were collected at two points of time and processed for LULC with the help of supervised machine learning classifiers such as Minimum Distance, Mahalanobis Distance and Maximum Likelihood to ascertain the accurate one. It was found that Maximum Likelihood classifier ensures highest accuracy of 95.2%. It was also found that during the study period, there was a significant change in the land use with respect to Built-up area and Area under cultivation of Paddy.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121958280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ML Based Smart Energy Meter Observing & Bill Supervision Using Raspberry Pi 使用树莓派的基于机器学习的智能电表观察和账单监督
V. Rani, T. M. Delsy, D. Marshiana, N. Praveen, P. Kartheek
{"title":"ML Based Smart Energy Meter Observing & Bill Supervision Using Raspberry Pi","authors":"V. Rani, T. M. Delsy, D. Marshiana, N. Praveen, P. Kartheek","doi":"10.2991/ahis.k.210913.001","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.001","url":null,"abstract":"","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133829817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Different Methods of Reconnaissance 不同侦察方法的分析
Pavan Kashyap, Vinesha Selvarajah
{"title":"Analysis of Different Methods of Reconnaissance","authors":"Pavan Kashyap, Vinesha Selvarajah","doi":"10.2991/ahis.k.210913.064","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.064","url":null,"abstract":"In the current digital world, we are exposed to a host of information. There's an immense wealth of knowledge base which can be tapped. While this could be used in good ways, there are possibilities of misuse of this information, for example, these days hacking websites is a common occurrence and this can compromise the security of the website, leading sometimes to consequences that can be even serious. In this article, the focus is on one of the important phases known as “reconnaissance”, which is step one in the methods of website hacking. This article uses the “Passive” method of gathering information. Different “OSINT” tools involved in the information gathering are used and the comparison of their performances is made against certain pre-determined outcomes. These various tools are used on two different websites one secure and another one vulnerable to ascertain variable outcomes depending on the level of security of each type of website. Various information is gathered by using the different tools which would be essential to perform the other steps followed after reconnaissance in the website hacking. An extensive analysis is also conducted to understand the consequences of website hacking on a company in the current scenario.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131476041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrative Information Retrieval with a Consumer Strategy Approach 基于消费者策略的综合信息检索
K. Sridevi, S. Prakasha
{"title":"Integrative Information Retrieval with a Consumer Strategy Approach","authors":"K. Sridevi, S. Prakasha","doi":"10.2991/ahis.k.210913.013","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.013","url":null,"abstract":"In this study, Information Retrieval has become an integral part of our life. We require these technologies to make our digital life comfortable in this fast running technology era. We have tried to describe a consumer methodology to coordinating information retrieval, wherein the emphasis is placed on the consumer’s behaviours rather than the subsystem. This process explains the novel methodologies in the field of Information Retrieval, this methodology has been more efficient over the old ways which seems to lack in few aspects. This strategy entails using transcription and effective interactions to facilitate information exchange between consumers mostly during information retrieval process. We built an ecosystem for consumers to reciprocate their understanding both sequentially and interdependently during in the description and validation of information asymmetry, the selection of an information technology being used for research, the composition and reinterpretation of quests to communicate their responses suggest related to information system selected; and the formulation and reinterpretation of quests to convey their signs indicate based on the data which is chosen. and during the evaluation of information relevancy to the resolution of their information problem. Here have presented a novel approach in detail in multiple sections ahead in this paper.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133320010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Security Improvement with Transmission of Aggregated Data Through Hamilton Clustering Protocol 利用Hamilton聚类协议提高聚合数据传输安全性的研究
M. Bobby, D. Usha
{"title":"Study on Security Improvement with Transmission of Aggregated Data Through Hamilton Clustering Protocol","authors":"M. Bobby, D. Usha","doi":"10.2991/ahis.k.210913.031","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.031","url":null,"abstract":"WSN (Wireless Sensor Network) is a network of devices that can perform data transmission from an analyzed field via wireless links. Thus, secure data transfer is needed to ensure correct data transmission from source nodes to the destination node as data passes via numerous intermediate nodes. It is significant to confirm that the network is free from malicious nodes to securely transfer the data in WSN, thereby achieving a reliable transmission. This study aims to form a cluster-based topology and then perform energy-based clustering by the proposed Hamilton Theory-based Clustering (HTC). As security is in WSN, Multicast Asymmetric Encryption (MAE) and decryption are employed. The high density of nodes makes it sense the same data repeatedly, leading to energy loss and minimized network lifetime. To solve this issue, the study introduced Algebraic Model-based Data Aggregation (AM-DA). Performance analysis is also assumed to assess the efficiency of the proposed methods.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132673475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recent Trends in Answer Script Evaluation – A Literature Survey 答卷评价的最新趋势——文献综述
A. Maya, Javed Nazura, B. L. Muralidhara
{"title":"Recent Trends in Answer Script Evaluation – A Literature Survey","authors":"A. Maya, Javed Nazura, B. L. Muralidhara","doi":"10.2991/ahis.k.210913.014","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.014","url":null,"abstract":"Assessment of answer scripts is an integral part of an examination and education system. A fair, consistent, unbiased, and correct valuation ensures the integrity of an examination system and is important for all education institutions. Since manual valuation is cumbersome and can be biased or influenced by the perception/mood of the evaluator, automatic grading of scripts has become very relevant. Automatic short answer grading (ASAG) techniques have been widely researched in the last decade and have assumed increased relevance because of online teaching and examinations during the Covid-19 pandemic. This review paper focuses on the recent works in the area of automatic answer grading and compares the techniques, methodologies employed, and the consequent results to evaluate their effectiveness. It discusses the advantages and limitations of the techniques by systematically categorizing the questions into both long/short as well as open-ended/close-ended questions and suggests a new model for improving the grading outcomes.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130947766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Critical Success Factor Estimation for Software Security in Small and Medium Scale Industry Using AHP and TOPSIS Approach 基于AHP和TOPSIS方法的中小企业软件安全关键成功因子估算
N. Kavyashree, M. Supriya, M. Lokesh
{"title":"Critical Success Factor Estimation for Software Security in Small and Medium Scale Industry Using AHP and TOPSIS Approach","authors":"N. Kavyashree, M. Supriya, M. Lokesh","doi":"10.2991/ahis.k.210913.018","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.018","url":null,"abstract":"In small and medium scale software industry, software security success factor is trivial process. Six-sigma and fuzzy logic methodology address software security problems effectively in the state of work. The research work chosen Fuzzy Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and Analytical Hierarchical Process (AHP) method to identify critical success factor estimation. The experimental case study, shows the Euclidean distance amongst the nine components of IOS mobile application. The results discuss on the goal alternate and the best/worst alternate Ranking of the factors to verify mobile IOS application software security. For attaining supportable software security, it is authoritative to safeguard that best practices are conscripted in considering the security valuation at the actual commencement of the software development life cycle.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131054334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信