Pub Date : 2022-06-01DOI: 10.1016/j.gltp.2022.04.016
A.K. Sharadhi , Vybhavi Gururaj , Sahana P. Shankar , M.S. Supriya , Neha Sanjay Chogule
The world saw a health crisis with the onset of the COVID-19 virus outbreak. The mask has been identified as the most efficient way to prevent the spread of virus [1]. This has driven the necessity for a face mask recogniser that not only detects the presence of a mask but also gives the accuracy to which a person is wearing the face mask. Also, the face mask should be recognised in all angles as well. The goal of this study is to create a new and improved real time face mask recogniser using image processing and computer vision approach. A Kaggle dataset which consisted of images with and without masks was used. For the purpose of this study a pre-trained convolutional neural network Mobile Net V2 was used. The performance of the given model was assessed. The model presented in this paper can detect the face mask with 98% precision. This Face mask recogniser can efficiently detect the face mask in side wise direction which makes it more useful. A comparison of the performance metrics of the existing algorithms is also presented. Now with the spread of the infectious variant OMICRON, it is necessary to implement such a robust face mask recogniser which can help control the spread.
随着新冠肺炎疫情的爆发,世界经历了一场卫生危机。口罩被认为是防止病毒传播最有效的方式[1]。这促使人们需要一种口罩识别器,它不仅能检测口罩的存在,还能准确地判断一个人是否戴着口罩。此外,口罩也应该从各个角度识别。本研究的目的是利用图像处理和计算机视觉方法创建一种新的改进的实时人脸识别系统。使用了一个Kaggle数据集,该数据集由带面具和不带面具的图像组成。本研究的目的是使用预训练的卷积神经网络Mobile Net V2。对给定模型的性能进行了评估。本文提出的模型能够以98%的准确率检测出口罩。该人脸识别器能够有效地检测出侧向的人脸,使其更加实用。并对现有算法的性能指标进行了比较。现在,随着传染性变异OMICRON的传播,有必要实现这样一个强大的口罩识别,以帮助控制传播。
{"title":"Face mask recogniser using image processing and computer vision approach","authors":"A.K. Sharadhi , Vybhavi Gururaj , Sahana P. Shankar , M.S. Supriya , Neha Sanjay Chogule","doi":"10.1016/j.gltp.2022.04.016","DOIUrl":"10.1016/j.gltp.2022.04.016","url":null,"abstract":"<div><p>The world saw a health crisis with the onset of the COVID-19 virus outbreak. The mask has been identified as the most efficient way to prevent the spread of virus [1]. This has driven the necessity for a face mask recogniser that not only detects the presence of a mask but also gives the accuracy to which a person is wearing the face mask. Also, the face mask should be recognised in all angles as well. The goal of this study is to create a new and improved real time face mask recogniser using image processing and computer vision approach. A Kaggle dataset which consisted of images with and without masks was used. For the purpose of this study a pre-trained convolutional neural network Mobile Net V2 was used. The performance of the given model was assessed. The model presented in this paper can detect the face mask with 98% precision. This Face mask recogniser can efficiently detect the face mask in side wise direction which makes it more useful. A comparison of the performance metrics of the existing algorithms is also presented. Now with the spread of the infectious variant OMICRON, it is necessary to implement such a robust face mask recogniser which can help control the spread.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 67-73"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000528/pdfft?md5=e7bd6ddcdbaa4b2522cc1206ed68c426&pid=1-s2.0-S2666285X22000528-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79592882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the most life-threatening disease is cardiovascular disease. Its high mortality rate contributes to nearly 17 million deaths all over the world. Early diagnosis helps to treat the disease in timely manner to prevent mortality. There are several machine and deep learning techniques available to classify the presence and absence of the disease. In this research, Logistic Regression (LR) techniques is applied to UCI dataset to classify the cardiac disease. To improve the performance of the model, pre-processing of data by Cleaning the dataset, finding the missing values are done and features selection were performed by correlation with the target value for all the feature. The highly positive correlated features were selected. Then classification is performed by dividing the dataset into training. testing in the ratio of 90:10, 80:20, 70:30, 40:60 and 50:50. The splitting ratio of 90:10 gives best accuracy as listed below. The LR model obtained 87.10% accuracy.
{"title":"Logistic regression technique for prediction of cardiovascular disease","authors":"Ambrish G, Bharathi Ganesh, Anitha Ganesh, Chetana Srinivas, Dhanraj, Kiran Mensinkal","doi":"10.1016/j.gltp.2022.04.008","DOIUrl":"10.1016/j.gltp.2022.04.008","url":null,"abstract":"<div><p>One of the most life-threatening disease is cardiovascular disease. Its high mortality rate contributes to nearly 17 million deaths all over the world. Early diagnosis helps to treat the disease in timely manner to prevent mortality. There are several machine and deep learning techniques available to classify the presence and absence of the disease. In this research, Logistic Regression (LR) techniques is applied to UCI dataset to classify the cardiac disease. To improve the performance of the model, pre-processing of data by Cleaning the dataset, finding the missing values are done and features selection were performed by correlation with the target value for all the feature. The highly positive correlated features were selected. Then classification is performed by dividing the dataset into training. testing in the ratio of 90:10, 80:20, 70:30, 40:60 and 50:50. The splitting ratio of 90:10 gives best accuracy as listed below. The LR model obtained 87.10% accuracy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 127-130"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000449/pdfft?md5=7bc419bd4a0157463d4da7371d5bfdb4&pid=1-s2.0-S2666285X22000449-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80589189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1016/j.gltp.2022.04.017
Vurimi Veera Venkata Naga Sai Vamsi , Sukanya S. Shet , Sodum Sai Mohan Reddy , Sharon S. Rose , Sona R. Shetty , S. Sathvika , Supriya M. S. , Sahana P. Shankar
With the development of technology and ease of creation of fake content, the manipulation of media is carried out on a large scale in recent times. The rise of AI altered videos or Deepfake media has posed a great threat to media integrity and is being produced and spread widely across social media platforms, the detection of which is seen to be a major challenge. In this paper, an approach for Deepfake detection has been provided. ResNext, a Convolutional Neural Network (CNN) algorithm and Long Short-Term Memory (LSTM) is used as an approach to detect the Deepfake videos. The approach and its steps are discussed in this paper. The accuracy obtained for the developed Deep-Learning (DL) model over the Celeb-Df dataset is 91%.
{"title":"Deepfake detection in digital media forensics","authors":"Vurimi Veera Venkata Naga Sai Vamsi , Sukanya S. Shet , Sodum Sai Mohan Reddy , Sharon S. Rose , Sona R. Shetty , S. Sathvika , Supriya M. S. , Sahana P. Shankar","doi":"10.1016/j.gltp.2022.04.017","DOIUrl":"10.1016/j.gltp.2022.04.017","url":null,"abstract":"<div><p>With the development of technology and ease of creation of fake content, the manipulation of media is carried out on a large scale in recent times. The rise of AI altered videos or Deepfake media has posed a great threat to media integrity and is being produced and spread widely across social media platforms, the detection of which is seen to be a major challenge. In this paper, an approach for Deepfake detection has been provided. ResNext, a Convolutional Neural Network (CNN) algorithm and Long Short-Term Memory (LSTM) is used as an approach to detect the Deepfake videos. The approach and its steps are discussed in this paper. The accuracy obtained for the developed Deep-Learning (DL) model over the Celeb-Df dataset is 91%.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 74-79"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X2200053X/pdfft?md5=2df3d71db7169b57a9eaa3250dfa26e8&pid=1-s2.0-S2666285X2200053X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78471616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The broad spectrum of optical wireless communication meets the needs of high-speed wireless communication, which is optical wireless communication's primary advantage over traditional wireless communication technologies. Optical fiber communications, as significant use of laser technology, are vital facilitators for the contemporary information era. With the rise of new technologies such as the Internet of Things, big data, cloud computing, virtual reality, and artificial intelligence, there is an increasing need in society for high-capacity data transmission, raising the bar for optical fiber communication technology. Many new technologies are coming our way, which has made our lives a lot simpler. But now that this new technology has arrived, we've run out of patience. To do whatever in the shortest possible period. Furthermore, in today's fast-paced society, sluggish walkers are quickly left behind while the rest of the world keeps moving forward. Many innovative methods for speeding up and simplifying our work have been identified. With optical fiber technology, our scientists have achieved a breakthrough, allowing us to go from one place to another in a matter of seconds. Wireless optical fiber communication networks are discussed in this research. This study also illustrates the many difficulties that optical fiber installation and processing face.
{"title":"Recent trends in wireless and optical fiber communication","authors":"Supreet Kaur , Prabhdeep Singh , Vikas Tripathi , Rajbir Kaur","doi":"10.1016/j.gltp.2022.03.022","DOIUrl":"10.1016/j.gltp.2022.03.022","url":null,"abstract":"<div><p>The broad spectrum of optical wireless communication meets the needs of high-speed wireless communication, which is optical wireless communication's primary advantage over traditional wireless communication technologies. Optical fiber communications, as significant use of laser technology, are vital facilitators for the contemporary information era. With the rise of new technologies such as the Internet of Things, big data, cloud computing, virtual reality, and artificial intelligence, there is an increasing need in society for high-capacity data transmission, raising the bar for optical fiber communication technology. Many new technologies are coming our way, which has made our lives a lot simpler. But now that this new technology has arrived, we've run out of patience. To do whatever in the shortest possible period. Furthermore, in today's fast-paced society, sluggish walkers are quickly left behind while the rest of the world keeps moving forward. Many innovative methods for speeding up and simplifying our work have been identified. With optical fiber technology, our scientists have achieved a breakthrough, allowing us to go from one place to another in a matter of seconds. Wireless optical fiber communication networks are discussed in this research. This study also illustrates the many difficulties that optical fiber installation and processing face.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 343-348"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000280/pdfft?md5=04120f843f9830d18812033c570d1f7a&pid=1-s2.0-S2666285X22000280-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87877020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1016/j.gltp.2022.04.013
Sankar Padmanabhan , R. Maruthi , R. Anitha
The Wireless Sensor Network (WSN)is applied in several networking situations. It suffers from dissimilar types of attack because of its meagre security mechanisms. The Sinkhole attack is the most destructive attack of WSN. A Reliable Self Reconfiguration (RSR) mechanism has been suggested in this work to eliminate the malicious sinkhole attack from the network. The proposed reliable reconfiguration (RSR)) system consists of two steps. The malicious node is detected and after detection it is corrected without resource loss by using the reconfiguration mechanism. In this paper, the reconfiguration mechanism for correcting sinkhole attack is applied using the C++ built simulator and factors such as Packet Delivery ratio and energy consumption are obtained for estimation The differences in the energy level have been calculated for the three scenarios i.e., Network without attack, Network with sinkhole attack and Network after Reconfiguration. The proposed Reliable Self-Reconfiguration (RSR) method outperforms the various detection mechanisms in finding and eliminating the sinkhole attack.
{"title":"An experimental study to recognize and mitigate the malevolent attack in wireless sensors networks","authors":"Sankar Padmanabhan , R. Maruthi , R. Anitha","doi":"10.1016/j.gltp.2022.04.013","DOIUrl":"10.1016/j.gltp.2022.04.013","url":null,"abstract":"<div><p>The Wireless Sensor Network (WSN)is applied in several networking situations. It suffers from dissimilar types of attack because of its meagre security mechanisms. The Sinkhole attack is the most destructive attack of WSN. A Reliable Self Reconfiguration (RSR) mechanism has been suggested in this work to eliminate the malicious sinkhole attack from the network. The proposed reliable reconfiguration (RSR)) system consists of two steps. The malicious node is detected and after detection it is corrected without resource loss by using the reconfiguration mechanism. In this paper, the reconfiguration mechanism for correcting sinkhole attack is applied using the C++ built simulator and factors such as Packet Delivery ratio and energy consumption are obtained for estimation The differences in the energy level have been calculated for the three scenarios i.e., Network without attack, Network with sinkhole attack and Network after Reconfiguration. The proposed Reliable Self-Reconfiguration (RSR) method outperforms the various detection mechanisms in finding and eliminating the sinkhole attack.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 55-59"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000498/pdfft?md5=a0d2a40d460de08068032d900421d321&pid=1-s2.0-S2666285X22000498-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81981515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1016/j.gltp.2022.03.006
Channabasava Chola, J V Biabl Benifa
Sunspots are known to be the most prominent feature of the solar photosphere. Solar activities play a vital role in Space weather which greatly affects the Earth's environment. The appearance of sunspots determines the solar activities and being observed from early eighteenth century. In this work, we have implemented a deep learning model which automatically detects sunspots from MDI and HMI image datasets. Proposed model uses Alexnet based deep convolutional networks to generate promising deep hierarchical features and proposed deep learning approach achieved excellent classification accuracies. Also, model has shown the improved result with MDI data set which is equal to 99.71%, 100%, 100%, and 100 for accuracy, precision, recall, and F-score respectively. This is to construct and build robust and reliable event recognition system to monitor solar activities which are crucial to understanding space weather and for physicists it is an aid for their research.
{"title":"Detection and classification of sunspots via deep convolutional neural network","authors":"Channabasava Chola, J V Biabl Benifa","doi":"10.1016/j.gltp.2022.03.006","DOIUrl":"10.1016/j.gltp.2022.03.006","url":null,"abstract":"<div><p>Sunspots are known to be the most prominent feature of the solar photosphere. Solar activities play a vital role in Space weather which greatly affects the Earth's environment. The appearance of sunspots determines the solar activities and being observed from early eighteenth century. In this work, we have implemented a deep learning model which automatically detects sunspots from MDI and HMI image datasets. Proposed model uses Alexnet based deep convolutional networks to generate promising deep hierarchical features and proposed deep learning approach achieved excellent classification accuracies. Also, model has shown the improved result with MDI data set which is equal to 99.71%, 100%, 100%, and 100 for accuracy, precision, recall, and F-score respectively. This is to construct and build robust and reliable event recognition system to monitor solar activities which are crucial to understanding space weather and for physicists it is an aid for their research.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 177-182"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000103/pdfft?md5=d7996f27757c5666a033ae37f1b5b22b&pid=1-s2.0-S2666285X22000103-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88609559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-01DOI: 10.1016/j.gltp.2021.08.071
B Varshini, HR Yogesh, Syed Danish Pasha, Maaz Suhail, V Madhumitha, Archana Sasi
COVID 19 pandemic is causing a global health epidemic. The most powerful safety tool is wearing a face mask in public places and everywhere else. The COVID 19 outbreak forced governments around the world to implement lockdowns to deter virus transmission. According to survey reports, wearing a face mask at public places reduces the risk of transmission significantly. In this paper, an IoT-enabled smart door that uses a machine learning model for monitoring body temperature and face mask detection. The proposed model can be used for any shopping mall, hotel, apartment entrance, etc. As an outcome a cost-effective and reliable method of using AI and sensors to build a healthy environment. Evaluation of the proposed framework is done by the Face Mask Detection algorithm using the TensorFlow software library. Besides, the body temperature of the individual is monitored using a non-contact temperature sensor. This proposed system can detect the users from COVID 19 by enabling the Internet of Things (IoT) technology.
{"title":"IoT-Enabled smart doors for monitoring body temperature and face mask detection","authors":"B Varshini, HR Yogesh, Syed Danish Pasha, Maaz Suhail, V Madhumitha, Archana Sasi","doi":"10.1016/j.gltp.2021.08.071","DOIUrl":"10.1016/j.gltp.2021.08.071","url":null,"abstract":"<div><p>COVID 19 pandemic is causing a global health epidemic. The most powerful safety tool is wearing a face mask in public places and everywhere else. The COVID 19 outbreak forced governments around the world to implement lockdowns to deter virus transmission. According to survey reports, wearing a face mask at public places reduces the risk of transmission significantly. In this paper, an IoT-enabled smart door that uses a machine learning model for monitoring body temperature and face mask detection. The proposed model can be used for any shopping mall, hotel, apartment entrance, etc. As an outcome a cost-effective and reliable method of using AI and sensors to build a healthy environment. Evaluation of the proposed framework is done by the Face Mask Detection algorithm using the TensorFlow software library. Besides, the body temperature of the individual is monitored using a non-contact temperature sensor. This proposed system can detect the users from COVID 19 by enabling the Internet of Things (IoT) technology.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 246-254"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.071","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84480101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper develops an efficient and accurate method for detecting fresh aromatic coconuts. Coconuts have a nearly cosmopolitan distribution due to human action in using them for agriculture. At present, the only way to determine whether a coconut is aromatic or not is by tasting it. By implementing the IAC (Identification of Aromatic Coconuts) method as proposed in this research, it is possible to identify the aromacy through non-invasive mechanisms with the help of image-processing techniques. The brightness of the image has to be adjusted accordingly for actual implementation. The underlying principle is that the color of the region of interest at the bottom part of the coconut shell is correlated to its age. Segmentation is done on the image via K-Means. The region of interest in RGB color is converted in to HSV and the Threshold is applied to it. After that the amount of white pixels in each layer on the image are measured using Polynomial Regression to obtain the predicted value of aromacy.
本文建立了一种高效、准确的鲜香椰子检测方法。由于人类将椰子用于农业,椰子几乎分布在世界各地。目前,判断椰子是否芳香的唯一方法是品尝它。通过本研究提出的IAC (Identification of Aromatic Coconuts)方法,可以在图像处理技术的帮助下,通过非侵入性机制来识别椰子的芳香性。为了实际实现,图像的亮度必须进行相应的调整。其基本原理是,椰子壳底部感兴趣区域的颜色与其年龄相关。通过K-Means对图像进行分割。将RGB颜色中感兴趣的区域转换为HSV,并对其应用阈值。然后利用多项式回归对图像上每一层的白像素量进行测量,得到芳香度的预测值。
{"title":"Identification of aromatic coconuts using image processing and machine learning techniques","authors":"Shrihari Kallapur, Mahith Hegde, Adithya D. Sanil, Raghavendra Pai, Sneha NS","doi":"10.1016/j.gltp.2021.08.037","DOIUrl":"10.1016/j.gltp.2021.08.037","url":null,"abstract":"<div><p>The paper develops an efficient and accurate method for detecting fresh aromatic coconuts. Coconuts have a nearly cosmopolitan distribution due to human action in using them for agriculture. At present, the only way to determine whether a coconut is aromatic or not is by tasting it. By implementing the IAC (Identification of Aromatic Coconuts) method as proposed in this research, it is possible to identify the aromacy through non-invasive mechanisms with the help of image-processing techniques. The brightness of the image has to be adjusted accordingly for actual implementation. The underlying principle is that the color of the region of interest at the bottom part of the coconut shell is correlated to its age. Segmentation is done on the image via K-Means. The region of interest in RGB color is converted in to HSV and the Threshold is applied to it. After that the amount of white pixels in each layer on the image are measured using Polynomial Regression to obtain the predicted value of aromacy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 441-447"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.037","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81373759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network forensic tools enable security professionals to monitor network performance and compromises. These tools are used to monitor internal and external network attacks. Technological improvements have enabled criminals to wipe out tracks of cybercrime to elude alterations. Network forensics procedures use processes to expedite investigation by tracking each original packet and event that is generated in the network. There are many network forensic tools, both open source and commercial versions available in the market. In this work, the result of a survey participated by different experts in open source network forensic tools have been presented. The advantages, challenges, and necessities have been identified for network forensic investigation of such tools. A few open source network forensic tools have been studied and performed a comparative analysis based on six key parameters. Further, two malware datasets are analyzed using open source tools to perform investigation and present a comprehensive network forensic analysis comprising IO graphs, Flow graphs, TCP stream, UDP multicast stream, mac-based analysis, and operating system analysis.
{"title":"Exploring user requirements of network forensic tools","authors":"Kousik Barik, Saptarshi Das, Karabi Konar, Bipasha Chakrabarti Banik, Archita Banerjee","doi":"10.1016/j.gltp.2021.08.043","DOIUrl":"10.1016/j.gltp.2021.08.043","url":null,"abstract":"<div><p>Network forensic tools enable security professionals to monitor network performance and compromises. These tools are used to monitor internal and external network attacks. Technological improvements have enabled criminals to wipe out tracks of cybercrime to elude alterations. Network forensics procedures use processes to expedite investigation by tracking each original packet and event that is generated in the network. There are many network forensic tools, both open source and commercial versions available in the market. In this work, the result of a survey participated by different experts in open source network forensic tools have been presented. The advantages, challenges, and necessities have been identified for network forensic investigation of such tools. A few open source network forensic tools have been studied and performed a comparative analysis based on six key parameters. Further, two malware datasets are analyzed using open source tools to perform investigation and present a comprehensive network forensic analysis comprising IO graphs, Flow graphs, TCP stream, UDP multicast stream, mac-based analysis, and operating system analysis.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 350-354"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.043","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82322685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-01DOI: 10.1016/j.gltp.2021.08.069
Janani RP , Renuka K , Aruna A , Lakshmi Narayanan K
Smart cities are an important domain that is reaching great heights nowadays. IoT plays an important role in the implementation of smart cities. The people of the country which contains smart cities will be well developed socially, economically and the quality of their knowledge and living will also be developed a lot. The human efforts and time that are spent on doing the works manually will be reduced by bringing up smart cities. The people can be protected from any disaster, natural calamities, and any difficult situations by smart city ecosystem. The construction of smart cities will avoid time wastage in our day-to-day lives by all means. This paper mainly describes on what a smart city is, how it is created, uses, challenges, real-time applications, future scope for smart cities, etc. The IoT technologies used in implementing smart cities, the devices used to implement them are also discussed.
{"title":"IoT in smart cities: A contemporary survey","authors":"Janani RP , Renuka K , Aruna A , Lakshmi Narayanan K","doi":"10.1016/j.gltp.2021.08.069","DOIUrl":"10.1016/j.gltp.2021.08.069","url":null,"abstract":"<div><p>Smart cities are an important domain that is reaching great heights nowadays. IoT plays an important role in the implementation of smart cities. The people of the country which contains smart cities will be well developed socially, economically and the quality of their knowledge and living will also be developed a lot. The human efforts and time that are spent on doing the works manually will be reduced by bringing up smart cities. The people can be protected from any disaster, natural calamities, and any difficult situations by smart city ecosystem. The construction of smart cities will avoid time wastage in our day-to-day lives by all means. This paper mainly describes on what a smart city is, how it is created, uses, challenges, real-time applications, future scope for smart cities, etc. The IoT technologies used in implementing smart cities, the devices used to implement them are also discussed.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 187-193"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.069","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87468360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}