Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)最新文献

筛选
英文 中文
Design of a Fuzzy Inference Based Ultrasound Image Analysis System for Differential Diagnosis of Thyroid Nodules 基于模糊推理的甲状腺结节超声图像鉴别诊断系统设计
D. Poornima, Karegowda Asha Gowda, K. Pushpalatha
{"title":"Design of a Fuzzy Inference Based Ultrasound Image Analysis System for Differential Diagnosis of Thyroid Nodules","authors":"D. Poornima, Karegowda Asha Gowda, K. Pushpalatha","doi":"10.2991/ahis.k.210913.034","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.034","url":null,"abstract":"This paper presents a Fuzzy Inference based Ultrasound Image Analysis System for differential diagnosis of Thyroid Nodules (TNs). Thyroid Ultrasound (TUS) images containing TNs are preprocessed to remove speckle noise and are enhanced using histogram equalization method. Nodule boundaries are identified using the canny edge detection technique and required Region of Interest is obtained using Adaptive Regularized Kernel Fuzzy C-means (ARKFCM) segmentation algorithm. Nineteen texture features are extracted from the segmented images. Best First (BF), Genetic Search (GS) and Greedy Step Wise (GSW) search methods are applied to select best subset of features. Selected features are fuzzified. A novel, fuzzy system is built to discriminate benign from malignant TNs by employing Mamdani model to draw inferences and centroid scheme for defuzzification. Class Based Association (CBA) concept is used to generate fuzzy inference rules. The developed multiple input, single output FIUIAS resulted in an accuracy of 98%.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117295631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Penetration Testing Analysis with Standardized Report Generation 使用标准化报告生成的渗透测试分析
Kousik Barik, A. Abirami, Saptarshi Das, Karabi Konar, Adrish Banerjee
{"title":"Penetration Testing Analysis with Standardized Report Generation","authors":"Kousik Barik, A. Abirami, Saptarshi Das, Karabi Konar, Adrish Banerjee","doi":"10.2991/ahis.k.210913.045","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.045","url":null,"abstract":"Penetration testing is a mirrored cyber-attack defined for identifying vulnerabilities and flaws in a computer system/Network/Web application— the organization appoints experts to conduct the test and present the details for deeper interpretation. One of the critical components of securing the network is to perform penetration tests of the network and web applications. In this paper, the industry-known OWASP (Open Web Application Security Project) vulnerability tool and three vulnerable web applications in a lab setup are explored and presented with a detailed analysis. Further, three penetration test reports are selected, and comprehensive analysis and reports are generated from the proposed setup. After the observation, it's understood that there is a lack of standardization format of the penetration testing reports. Therefore, this paper presents a format that will cater to the understanding of domain knowledge experts, decision-making bodies, and board members of the top executives of an organization for making further decisions on improving the robustness of their network and web applications.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134166104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Forecasting and Decision-Making System for Military Resource Allotment 军事资源配置预测与决策系统
S. Vinodhini, J. Monica Pallavi, J. Sandeep, C. Smera
{"title":"Forecasting and Decision-Making System for Military Resource Allotment","authors":"S. Vinodhini, J. Monica Pallavi, J. Sandeep, C. Smera","doi":"10.2991/ahis.k.210913.009","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.009","url":null,"abstract":"Every country is in some sort of rivalry with its neighboring countries. Military forces safeguarded people’s lives day in and out. The forces are being placed in many zones near the hotspots of the border areas to fight off enemies. These zones are critical and challenging in many ways, which put the militia’s life at risk. The main goal of this research is to save the militia’s life. This paper proposes an Environment Condition-based Resource Allocation in Military (ECRAM), which helps in decision-making and in providing a report to aid the militia in a war zone. This ECRAM Model analyzes many factors like climatic condition, resource availability, and health status of the militants at the base station. It was implemented by comparing different machine learning approaches to analyze the appropriate one for the proposed model. Results show that the accuracy of prediction and decision-making with the random forest algorithm has outperformed with an accuracy of 94.4 percent.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123909422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ESP32 Based Implementation of Water Quality and Quantity Regulating System 基于ESP32的水质水量调节系统的实现
T. S. Rao, Pawan Pranay, S. Narayana, Y. Reddy, Sunil, Pawandeep Kaur
{"title":"ESP32 Based Implementation of Water Quality and Quantity Regulating System","authors":"T. S. Rao, Pawan Pranay, S. Narayana, Y. Reddy, Sunil, Pawandeep Kaur","doi":"10.2991/ahis.k.210913.016","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.016","url":null,"abstract":"The primary purpose of this paper is to reduce the wastage of water. The former way of water testing is manual, costly, time consuming, whereas proposed work is easy to install and cost effective. The proposed work is focused on water quality and quantity measurements by using ESP32 microcontroller and Blynk for communication between hardware and phone. Water quality is monitored by the various chemical parameters of water like pH and electrical conductivity and physical parameters of water like turbidity and temperature. In addition, the quantity of water is measured by flow sensor and water level present in the tank is control by admin through the pump. Global Positioning System (GPS) is used to update the location of the water tank to save time and speedy maintenance. The result shows a good agreement with the standard values of parameters as per World Health Organization (WHO).","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125137536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of Electric Wheelchair for Smart Navigation and Health Monitoring System 电动轮椅智能导航与健康监测系统的研制
P. Rashmi, K. M. Rajesh, P. Rachana, M. Supriya, A. Hanifa
{"title":"Development of Electric Wheelchair for Smart Navigation and Health Monitoring System","authors":"P. Rashmi, K. M. Rajesh, P. Rachana, M. Supriya, A. Hanifa","doi":"10.2991/ahis.k.210913.078","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.078","url":null,"abstract":"This paper presents framework of smart wheelchair for differently abled people by incorporating many facilities in a single wheelchair at low cost. A prototype of smart electronic wheelchair is developed to help the individual move freely without any external assistance. The wheelchair can also be converted into a stretcher. The system will monitor the vital health parameters such as pulse rate, heart rate, temperature and ECG of the disabled person and the information is stored in cloud (Thing Speak). An alert SMS will be sent to the care taker in the abnormal health conditions. The proposed system is developed using raspberry pi single chip-computer, it is implemented using Python serial data communication, PWM and android application","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127221348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Breast Cancer Prediction Using Machine Learning Techniques 使用机器学习技术预测乳腺癌
V. Apoorva, H. Yogish, M. L. Chayadevi
{"title":"Breast Cancer Prediction Using Machine Learning Techniques","authors":"V. Apoorva, H. Yogish, M. L. Chayadevi","doi":"10.2991/ahis.k.210913.043","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.043","url":null,"abstract":"Breast cancer affects the majority of women worldwide, and it is the second most common cause of death among women. However, if cancer is detected early and treated properly, it is possible to be cured of the condition. Early detection of breast cancer can dramatically improve the prognosis and chances of survival by allowing patients to receive timely clinical therapy. Furthermore, precise benign tumour classification can help patients avoid unneeded treatment. This paper study uses Convolution Neural Networks for Image dataset and K-Nearest Neighbour (KNN), Decision Tree (CART), Support Vector Machine (SVM), and Naïve Bayes for numerical dataset, whose features are obtained from digitised image of breast mass, as to forecast and analyse cancer databases in order to improve accuracy. The dataset will be analysed, evaluated, and model is trained as part of the process. Finally, both image and numerical test data will be used for prediction.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125855584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysing Mental Health Evaluation Techniques from a Statistical Perspective 从统计学角度分析心理健康评估技术
N. Sushma Koushik, R. Deepu
{"title":"Analysing Mental Health Evaluation Techniques from a Statistical Perspective","authors":"N. Sushma Koushik, R. Deepu","doi":"10.2991/ahis.k.210913.046","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.046","url":null,"abstract":"","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131312070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self- Checkout Service with RFID Technology in Supermarket 基于RFID技术的超市自助结账服务
Ng Xin Jie, I. F. Kamsin
{"title":"Self- Checkout Service with RFID Technology in Supermarket","authors":"Ng Xin Jie, I. F. Kamsin","doi":"10.2991/ahis.k.210913.062","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.062","url":null,"abstract":"The self-checkout service system has appeared and has gradually become popular all over the world nowadays. The main purpose of the self-checkout service system is to save staff costs and speed up the customer's shopping process. However, according to a number of studies, the self-checkout service system is causing an increase in thefts, and this causes huge losses for businesses. Therefore, this research aims to implement radio frequency identification (RFID) technology to selfcheckout service systems to solve the problem of increased thefts caused by the implementation of self-checkout services in supermarket. For this study, it was decided to use systematic sampling and submit a survey to every fifth customer who left the supermarket until the survey results of 100 customers were collected. Using this latest RFID technology in the selfcheckout system can make the supermarket without suffering additional losses. This RFID technology is implemented with the help of RFID tags and RFID readers, which are similar to the functions of general bar codes and bar code scanners on the market, but they are safer to avoid theft. In addition, this article also studies how to use RFID to help reduce the waiting time for checkout, which can scan the entire area of goods in a few seconds, which is suitable for inventory, checkout and simplifying the process.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125153068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Framework for the Promotion of Tourism Industry Using Blockchain Technology 利用区块链技术促进旅游业的框架
D. M. Vistro, M. Farooq, A. Rehman, Muhammad Bilal
{"title":"A Framework for the Promotion of Tourism Industry Using Blockchain Technology","authors":"D. M. Vistro, M. Farooq, A. Rehman, Muhammad Bilal","doi":"10.2991/ahis.k.210913.072","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.072","url":null,"abstract":"The best interconnected profitable projects, tourism has come a long way since the technology allows tourists to watch & make their journeys without the necessity to go a tourism company because Blockchain has potential to transform this Industry. With the advancement of Internet marketing, visitors are able to access and view the information in the real time on their gadgets such as Laptops, Computers, Tablets, & Smartphones and as a result they can select their own contents. One of the strong growing technologies and the most cutting edge technologies is tourism blockchain. The Blockchain offers many advantages to the tourism business as it can help to the increase profitability, improvement of the customer satisfaction & to improve the performance. In this paper, I present the current situation in Pakistan regarding the utilization the technology of blockchain in tourism business. The agenda of this paper includes discovery of why blockchain technology couldn’t be used in tourism business, and what tasks should be managed.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133860448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart Application Based Blockchain Consensus Protocols: A Systematic Mapping Study 基于智能应用的区块链共识协议:系统映射研究
D. M. Vistro, M. Farooq, A. Rehman, Saroosh Malik
{"title":"Smart Application Based Blockchain Consensus Protocols: A Systematic Mapping Study","authors":"D. M. Vistro, M. Farooq, A. Rehman, Saroosh Malik","doi":"10.2991/ahis.k.210913.073","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.073","url":null,"abstract":"Blockchain emerges as a potential platform aim of providing efficient and robust infrastructure and the centre of the blockchain is the consensus protocol feature that shows the working of distributed ledger technology named the blockchain. However, existing blockchain systems do not satisfy the requirement of the transaction in pragmatic use due to their limited capacity. While several new ideas were suggested by experts as they faced either decentralization or security concerns. Although several scientists are working on the improvement of the new quantum-resistant, faulttolerant protocol, resource-efficient, and others focus on the development of multiple protocol versions, better adapted for particular use cases. Many researcher-made their own protocol to secure their work, instead of using traditional protocols. The paper represents a systematic literature review by accompanying a survey of blockchain technologies and their current utilization in different application domains in the IT industry. In this article, we first describe some previous and current consensus protocols of blockchain with the help of taxonomy which includes types and variants of protocols. Secondly, we have selected the most used protocols used up till now and write a comparative analysis with systematic review to find out which approach is the best suitable to use Lastly, we have analysed the strength and weaknesses of existing and previous protocols.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133572211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信