AIIPCC2022The Third International Conference on Artificial Intelligence, Information Processing and Cloud Computing

  • 第三届人工智能、信息处理与云计算国际会议
  • AIIPCC2022

Keynote Speaker

Asso. Prof. Hoshang Kolivand

Asso. Prof. Hoshang Kolivand
Liverpool John Moores University, UK

Title: Augmented and Virtual Reality in AI
Abstract: There is no doubt that Augmented and Virtual Reality (AR/VR) has changed the world recently and has the potential to become a fascinating widespread requirement in daily life. In about two decades, AR/VR has turned into one of the most attractive topics involved in a variety of topics attempting to obtain satisfactory results. Artificial Intelligence (AI) and AR/VR are changing everything with the help of Data Science and Machine Learning. We are going to face a new world that AI will be the heart of, and AR/VR its eyes. In this speech, I am going to present what I have done so far with AR and VR. Current advances and future directions of AR/VR and wearable devices will be discussed with respect to AI. At the end revenue of this technology will be discussed.

Asso. Prof. T. Velmurugan

Asso. Prof. T. Velmurugan
University of Madras, India

Title: Enhancement of Cloud Security using Secure Hashing Algorithm 384 and Message Digest Authentication
Abstract: Cloud Computing provides a powerful depository platform that enables business and individual users to accomplish various stages of tasks such as the use of applications, adoption of cloud advertisements, expansion of customized computer package, and creation of a authenticate network. This research work carried out to improve the security of the end-users using a Secured Hashing Algorithm 384 (SHA 384) and Message Digest Authentication (MDA). This work suggests a new solution for the concern that is getting raised the data privacy. The usage of the Message Digest Authentication algorithm helps to develop a platform that ensures data security and reduce the data breach problem for the end user in the cloud environment. For that, the Message Digest Authentication is taken and implemented by a practical approach in the cloud environment. In this research work, it is proposed to use a new level of data security solution using Secure Hashing Algorithm 384 and Message Digest Authentication algorithm. Both the algorithms are encrypted by the full set of 256 ASCII characters. The major software tool called Software Defined Network (SDN) is used to identify the attacks faced by the end-user. From the experimental results, it is identified that the best algorithm to protect the data. The main aim of this research work is to clarify the security issues in both cloud providers and cloud consumers using cryptography encryption methods.

Dr. Tao Lin

Dr. Tao Lin
Google, USA

Title: Challenges of Deep Learning in Software Engineering
Abstract: There are increasingly deep learning approaches being used in software engineering domain. While, there are no agreement on how to adopt deep learning in this new domain. This speech presents methodological principles for deep learning in software engineering. Firstly, this work summarizes how to evaluate deep learning results in software engineering. Secondly, this speech suggests methodological principles that can be used in this new scenario. We construct these methodological principles as a guideline for deep learning research in software engineering.

Copyright© The 3rd International Conference on Artificial Intelligence, Information Processing and Cloud Computing (AIIPCC 2022)