{"title":"MISP: Model for IaaS Security and Privacy","authors":"IndraKumar Sahua, Manisha J Nenea","doi":"10.3233/apc210222","DOIUrl":"https://doi.org/10.3233/apc210222","url":null,"abstract":"Paradigm shift towards cloud computing offers plethora of advantages both for cloud users and Cloud Service Provider (CSP). For cloud users, it offers saving of cost, scaling of resources, pay per use, elastic and on-demand services. On the other hand, it offers centralized resource management and provisioning of operations, safety and security for CSP. By holding multiple virtual IT resources (CPUs, storage servers, network components and software) over the internet, Infrastructure-as-a-Service (IaaS) serves as fundamental layer for all other delivery models. Along with benefits of IaaS, there exists several security and privacy issues and threats to confidentiality, integrity, authentication, access control and availability. In this paper, detailed study of IaaS components, associated security and privacy issues are explored and counter measures for the same are determined. Furthermore, as a result of the study, Model for IaaS Security and Privacy (MISP) is proposed. The model presents a cubical structure and adds more features than the existing models to enhance the security and privacy of data and operations and guide security assessment for safer adoption by enterprises","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134267142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real Time Human Gesture Recognition: Methods, Datasets and Strategies","authors":"Rameez Shamalik, S. Koli","doi":"10.3233/apc210202","DOIUrl":"https://doi.org/10.3233/apc210202","url":null,"abstract":"Gestures are universal means of communication without any language barrier. Detecting gestures and recognition of its meaning are key steps for researchers in computer vision. Majority of the work is done in sign language already. Sign language datasets are compared with respect to their usability and diversity in terms of various signs. This paper highlights the available datasets from three dimensional body scans to hand action gestures. Their usability and strategies used to achieve the desired results are also discussed. Major neural networks are evaluated in terms of varied parameters and feutures. A Methodology for effective gesture recognition in real is proposed. Lastly Results achieved through an Open CV in combination with Sci-kit learn library based technique for gesture recognition are presented and analyzed in terms of efficacy and efficiency.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Kharade, S. Kharade, S. R. Ghatage, V. Kumbhar, T. Nandana Ravishankar, K. Vengatesan
{"title":"EyePhone Technology: A Smart Wearable Device","authors":"K. Kharade, S. Kharade, S. R. Ghatage, V. Kumbhar, T. Nandana Ravishankar, K. Vengatesan","doi":"10.3233/apc210231","DOIUrl":"https://doi.org/10.3233/apc210231","url":null,"abstract":"In the past few decades, wearable sensors and devices have evolved into central technologies that have significantly impacted next-generation healthcare solutions in the previous decade. It is an age of incredibly cut-throat competition, even the youth. This technology is Hand-free, eyephone-operated telephone technology. It measures where the user’s eyes are located on the phone’s display employing a camera attached to the device. The typical work the eye bones assigned to eye tracking, eye blinking, detecting, etc., by way of eye-tracking, users can take care of their email, calendar, phone, etc. The leading technologies in use are a Human-Computer Interface (HCI) and a Human Phone Interface (HPI). It helps those with disabilities greatly. The IT Index is an expanded form of HCI. The use of mobile devices like smartphones and tablets is on the rise, and, to some extent, it could displace the use of desktops and laptops. Human-computer interaction is interested in the interaction between people and the computer system and between software and applications. Our focus is on this revolutionary new type of technology called the eye-phone.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123416185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tejaswini Pawar, S. Shirsat, Yaminee Patil, Vijay R. Sonawane, Dhiraj A. Birari
{"title":"A Survey on Mining Cryptocurrencies","authors":"Tejaswini Pawar, S. Shirsat, Yaminee Patil, Vijay R. Sonawane, Dhiraj A. Birari","doi":"10.3233/apc210212","DOIUrl":"https://doi.org/10.3233/apc210212","url":null,"abstract":"Advanced monetary standards have acquired huge ubiquity nowadays. Bitcoin is the decentralized, disseminated, distributed virtual cash known cryptographic money. Bitcoin mining chips away at standard of the blockchain, which is believed to be one of this present century’s sharp advancement. The blockchain is the arrangement of blocks that are associated so that in the current block there is the hash of the past block. Any adjustment of information in any block in a blockchain brings about a blunder in the entire blockchain. A strategy called mining, where excavators settle a complex numerical riddle, produces Bitcoins. The excavators contend as quickly as time permits to mine the Bitcoin and guarantee the award. Mining should be possible by a solitary individual or by a pool, where a lot of excavators join to mine a solitary block in an organization.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124492689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Privacy Preservation and Security Approaches for Sensitive Data in Big Data","authors":"Rohit Ravindra Nikam, Rekha Shahapurkar","doi":"10.3233/apc210221","DOIUrl":"https://doi.org/10.3233/apc210221","url":null,"abstract":"Data mining is a technique that explores the necessary data is extracted from large data sets. Privacy protection of data mining is about hiding the sensitive information or identity of breach security or without losing data usability. Sensitive data contains confidential information about individuals, businesses, and governments who must not agree upon before sharing or publishing his privacy data. Conserving data mining privacy has become a critical research area. Various evaluation metrics such as performance in terms of time efficiency, data utility, and degree of complexity or resistance to data mining techniques are used to estimate the privacy preservation of data mining techniques. Social media and smart phones produce tons of data every minute. To decision making, the voluminous data produced from the different sources can be processed and analyzed. But data analytics are vulnerable to breaches of privacy. One of the data analytics frameworks is recommendation systems commonly used by e-commerce sites such as Amazon, Flip Kart to recommend items to customers based on their purchasing habits that lead to characterized. This paper presents various techniques of privacy conservation, such as data anonymization, data randomization, generalization, data permutation, etc. such techniques which existing researchers use. We also analyze the gap between various processes and privacy preservation methods and illustrate how to overcome such issues with new innovative methods. Finally, our research describes the outcome summary of the entire literature.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lavanya Dhanesh, Monica S, Revathi R, Suganya S, Swetha Lakshmi K N
{"title":"A GSM Based Assistive Device for Blind, Deaf and Dumb","authors":"Lavanya Dhanesh, Monica S, Revathi R, Suganya S, Swetha Lakshmi K N","doi":"10.3233/apc210267","DOIUrl":"https://doi.org/10.3233/apc210267","url":null,"abstract":"This paper tries to overcome the shortcomings of the recent technology that fails to enhance the communication between physically disabled people by designing an assistive device. This device uses a GSM modem with a SIM card and no smartphones are needed which makes the device affordable. Here, the sender sends the message to the phone number of the disabled person and he/she receives the SMS that gets converted to text and voice message and vibrations to Braille pad using a microcontroller which is easily readable by the disabled person.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Pon Bharathi, A. J. Wilson, S. Arun, V. Ramanathan
{"title":"A Compact Disc Shaped Microstrip Patch Antenna Using Inset Fed at 5GHz for Satellite Communications","authors":"A. Pon Bharathi, A. J. Wilson, S. Arun, V. Ramanathan","doi":"10.3233/apc210181","DOIUrl":"https://doi.org/10.3233/apc210181","url":null,"abstract":"This examination work is focused around planning and simulating another kind of inset feed Disc Shaped Microstrip Patch Antenna (DSMPA) with Inset feed and Defected ground plane (DGP). By presenting a round space at the focal point of the ground plane, improved attributes of Microstrip patch antenna can be accomplished. The proposed Disc Shaped Microstrip patch antenna is reverberating at 5 GHz. Simulation has been finished by utilizing reenactment programming HFSS version15. From recreation results, it discovers that our examined Disc Shaped Microstrip patch antenna yields better return loss of - 25.1 dB & VSWR estimation of 0.96 dB. The examined DSMPA is yielding a higher radiation efficiency of 77.20 %. The minimized size and higher radiation efficiency contrasted with rectangular Microstrip patch antenna makes it all the more generally helpful for satellite communications.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129118123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anitha R, Veerasundaram M, Rajarajan S, Jaya Prakash E, NandhaKishore J, Ajay Krishnan S R
{"title":"Cascading of Air Quality Detector and Digital Data Transmission with Zero Error in Minimum Duration","authors":"Anitha R, Veerasundaram M, Rajarajan S, Jaya Prakash E, NandhaKishore J, Ajay Krishnan S R","doi":"10.3233/apc210269","DOIUrl":"https://doi.org/10.3233/apc210269","url":null,"abstract":"The paper proposes a system to monitor the environment air quality using an Arduino microcontroller, to enhance the quality IOT Technology is used. The utilization of IoT technology improves the method of monitoring various factors of the environment issues. The MQ-02 gas sensor is used to detect the various gases which are harmful to humans. A Wi-Fi module connects the whole system to the internet and an LCD is employed for the visual Output. This Automated Air management system may be a breakthrough to contribute an answer to the most important threat. The air quality detector overcomes the problems of the highly polluted areas which may be a major issue. This technique has features for the user to monitor the quantity of pollution on their smart devices using the appliance.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129165858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chennai Water Resource Management Using GIS","authors":"Saral Purohit, Gadhiya Jay Dipakbhai, G. Abirami","doi":"10.3233/apc210220","DOIUrl":"https://doi.org/10.3233/apc210220","url":null,"abstract":"Water scarcity is one of the biggest problems in the country of India, this problem is often caused by poor water resource management. Notably in India, the city of Chennai has had a water crisis going on for the past few years. On June 19th, 2019, the city officials declared that the city had run out of water. This was termed as ‘Day Zero’ where there was no water left. Most of the lakes of Chennai dried out. Poor water management and very less rainfall were the major reasons for this scarcity. Water resource management thus is of critical importance to ensure that water is utilized in the right way. So the aim of the proposed system is to evaluate the nature, significance, and rate of change in the water bodies of Chennai over a period of time using GIS/Remote sensing and assess the past and present conditions of water bodies in Chennai and to understand the dynamics and trends of change through various forms of spatial analysis. This is achieved by using different functionalities of ArcGIS and ArcMap and then analysing the obtained data and maps.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"12 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123268959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Siva Subramanian, D. Prabha, B. Maheswari, J. Aswini
{"title":"Customer Analysis Using Machine Learning Algorithms: A Case Study Using Banking Consumer Dataset","authors":"R. Siva Subramanian, D. Prabha, B. Maheswari, J. Aswini","doi":"10.3233/apc210263","DOIUrl":"https://doi.org/10.3233/apc210263","url":null,"abstract":"The aim of each enterprise is to achieve high revenue from the business and to stay in a high position from their competitors. To archive high revenue and high position from competitors the need of understanding the business consumers is a crucial one. However the firm business is completely dependent on the consumers the efficient analysis of consumers within the enterprises makes to achieve the business to high position. To perform effective consumer analysis, in this study different machine learning is studied and experimented. ML classifiers make to understand in-depth analysis about the consumer data and further enables to plan wise decision strategies to enhance the business revenue and consumer satisfaction intelligently. The use of different ML classifiers is to sort out how the customer prediction outcome changes accordingly to the ML classifier is applied. This makes to find the best ML classifier for the consumer dataset applied in this study. The experimental procedure is performed using different ML classifiers and the outcome achieved is captured and projected using various validity scores. This work applies different ML classifiers like K-NN, C4.5, Random Forest, Random Tree, LR, MLP and NB for customer analysis. The empirical results illustrate the C4.5 model achieves better accuracy prediction compare to other ML classifiers and also compared with the time complexity NB model works efficiently with running time.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121634962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}