首页 > 最新文献

2023 International Conference on Networking and Communications (ICNWC)最新文献

英文 中文
A Blockchain-Enabled Decentralized Gossip Federated Learning Framework 一个区块链支持的分散八卦联邦学习框架
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127450
Arshdeep Janjua, S. Dhalla, Savita Gupta, Sukhwinder Singh
Federated learning (FL) has undergone substantial research and has been used in numerous real-world solutions over the past few years. It shows promising results in addressing the data security and privacy issues present in the traditional centralized machine learning approach. Even though federated learning makes certain of data privacy for each contributing user, the global model and the data are still vulnerable to attacks by compromised clients and servers. Additionally, in the settings for non-independent identical data (Non-IID), federated learning performs significantly less compared to the standard centralized learning mode. To address both the security and performance issues, this paper proposes a blockchain-enabled gossip federated learning framework (BGFL). BGFL replaces the central server with a blockchain-enabled system for global model storage and exchange. Also, to achieve faster training convergence, clients communicate with each other based on a gossip training approach. Then, to evaluate the performance we perform experiments using MNIST and CIFAR datasets in Non-IID settings. The performance and effectiveness of the BGFL framework is demonstrated by the experimental results.
在过去的几年里,联邦学习(FL)经历了大量的研究,并在许多现实世界的解决方案中得到了应用。它在解决传统集中式机器学习方法中存在的数据安全和隐私问题方面显示出有希望的结果。尽管联邦学习确保了每个贡献用户的数据隐私,但全局模型和数据仍然容易受到受损的客户机和服务器的攻击。此外,在非独立相同数据(Non-IID)的设置中,与标准的集中式学习模式相比,联邦学习的性能要低得多。为了解决安全和性能问题,本文提出了一个支持区块链的八卦联邦学习框架(BGFL)。BGFL用一个支持区块链的系统取代了中央服务器,用于全球模型存储和交换。此外,为了实现更快的训练收敛,客户端基于八卦训练方法相互通信。然后,为了评估性能,我们在Non-IID设置中使用MNIST和CIFAR数据集进行了实验。实验结果验证了BGFL框架的性能和有效性。
{"title":"A Blockchain-Enabled Decentralized Gossip Federated Learning Framework","authors":"Arshdeep Janjua, S. Dhalla, Savita Gupta, Sukhwinder Singh","doi":"10.1109/ICNWC57852.2023.10127450","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127450","url":null,"abstract":"Federated learning (FL) has undergone substantial research and has been used in numerous real-world solutions over the past few years. It shows promising results in addressing the data security and privacy issues present in the traditional centralized machine learning approach. Even though federated learning makes certain of data privacy for each contributing user, the global model and the data are still vulnerable to attacks by compromised clients and servers. Additionally, in the settings for non-independent identical data (Non-IID), federated learning performs significantly less compared to the standard centralized learning mode. To address both the security and performance issues, this paper proposes a blockchain-enabled gossip federated learning framework (BGFL). BGFL replaces the central server with a blockchain-enabled system for global model storage and exchange. Also, to achieve faster training convergence, clients communicate with each other based on a gossip training approach. Then, to evaluate the performance we perform experiments using MNIST and CIFAR datasets in Non-IID settings. The performance and effectiveness of the BGFL framework is demonstrated by the experimental results.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130563111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Reliability of Embedded RISC-V SoC for Low-cost Space Applications 提高低成本空间应用嵌入式 RISC-V SoC 的可靠性
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127244
Ambika S Rao, R. Anilkumar, K. Padmapriya, K. Sudeendra Kumar
Commercial-grade electronic components are finding their way into spacecrafts intended for low-orbit applications due to their low cost and ease of availability. However, being susceptible to a variety of disturbances like radiation upsets, they are not as reliable as radiation-hardened space-grade components. Reliability of these components can be improved using design techniques for fault detection that allows for subsequent correction through hardware or software. In this paper, a fault monitoring mechanism is introduced to improve the reliability of an Embedded RISC-V System-on-Chip (SoC) intended for low-cost space applications. This mechanism alerts the system of potential faults induced by upsets in space environment and allows for recovery. Implementation of the mechanism is done in an ASIC with 180nm commercial foundry libraries, but the design can also be ported to SRAM-based FPGAs.
商业级电子元件由于其低成本和易于获得性,正在进入用于低轨道应用的航天器。然而,由于容易受到各种干扰,如辐射干扰,它们不像辐射硬化的太空级组件那样可靠。使用故障检测的设计技术,可以通过硬件或软件进行后续纠正,从而提高这些组件的可靠性。本文介绍了一种故障监测机制,以提高用于低成本空间应用的嵌入式RISC-V片上系统(SoC)的可靠性。该机制提醒系统在空间环境扰动引起的潜在故障,并允许恢复。该机制的实现是在带有180nm商业代工库的ASIC中完成的,但该设计也可以移植到基于sram的fpga上。
{"title":"Improving Reliability of Embedded RISC-V SoC for Low-cost Space Applications","authors":"Ambika S Rao, R. Anilkumar, K. Padmapriya, K. Sudeendra Kumar","doi":"10.1109/ICNWC57852.2023.10127244","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127244","url":null,"abstract":"Commercial-grade electronic components are finding their way into spacecrafts intended for low-orbit applications due to their low cost and ease of availability. However, being susceptible to a variety of disturbances like radiation upsets, they are not as reliable as radiation-hardened space-grade components. Reliability of these components can be improved using design techniques for fault detection that allows for subsequent correction through hardware or software. In this paper, a fault monitoring mechanism is introduced to improve the reliability of an Embedded RISC-V System-on-Chip (SoC) intended for low-cost space applications. This mechanism alerts the system of potential faults induced by upsets in space environment and allows for recovery. Implementation of the mechanism is done in an ASIC with 180nm commercial foundry libraries, but the design can also be ported to SRAM-based FPGAs.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129824024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Panchi: A women’s security app Panchi:一款女性安全应用
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127409
Arbind Lochan Mishra, Harsh Srivastava, Hemamalini V
The domain is the primary focus of this project (Web Application Development). In India, it is difficult for women to report the issues they are having because it either takes a long time to document them and convey them to the appropriate authority or because of cultural pressure. In order to solve their issue by presenting complaints to the appropriate authority immediately, a web application is suggested. It has a complaint module that enables women to report emergencies so that authorities can be dispatched to those who need assistance. It is an interface for registering complaints and following them up. The main problem statement tried to be worked upon is the fact that when women want to register any grievance they are not able to do so because of various reasons out of which two stand out as the most common. The way to reach the authorities responsible to take action is way too long and time-consuming and this discourages them to go ahead with it as they’re unsure of even being heard or what the outcome of the situation might be even after spending a long time and effort for the same. The other factor is the fear of being judged by the society which is one of the leading factors as to why women do not go ahead with reporting their grievances. This has been overcome by our solution by having only end-to-end access to the data/complaints between the user and the admin and ensuring secrecy.
域是这个项目(Web Application Development)的主要焦点。在印度,女性很难报告她们遇到的问题,因为要么要花很长时间来记录这些问题并将其传达给有关当局,要么是因为文化压力。为了通过立即向有关当局提出投诉来解决他们的问题,建议使用web应用程序。它有一个投诉模块,使妇女能够报告紧急情况,以便当局可以派往需要援助的人。这是一个注册投诉和跟进投诉的界面。试图解决的主要问题陈述是这样一个事实,即当妇女想要表达任何不满时,由于各种原因,她们无法这样做,其中两个原因最为常见。联系负责采取行动的当局的方式太长太耗时,这使他们不愿意继续下去,因为他们甚至不确定是否会听到他们的声音,也不确定即使花费了很长时间和精力,情况的结果可能是什么。另一个因素是害怕被社会评判,这也是为什么女性不继续报告她们的不满的主要因素之一。我们的解决方案通过只对用户和管理员之间的数据/投诉进行端到端访问并确保保密性来克服了这一点。
{"title":"Panchi: A women’s security app","authors":"Arbind Lochan Mishra, Harsh Srivastava, Hemamalini V","doi":"10.1109/ICNWC57852.2023.10127409","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127409","url":null,"abstract":"The domain is the primary focus of this project (Web Application Development). In India, it is difficult for women to report the issues they are having because it either takes a long time to document them and convey them to the appropriate authority or because of cultural pressure. In order to solve their issue by presenting complaints to the appropriate authority immediately, a web application is suggested. It has a complaint module that enables women to report emergencies so that authorities can be dispatched to those who need assistance. It is an interface for registering complaints and following them up. The main problem statement tried to be worked upon is the fact that when women want to register any grievance they are not able to do so because of various reasons out of which two stand out as the most common. The way to reach the authorities responsible to take action is way too long and time-consuming and this discourages them to go ahead with it as they’re unsure of even being heard or what the outcome of the situation might be even after spending a long time and effort for the same. The other factor is the fear of being judged by the society which is one of the leading factors as to why women do not go ahead with reporting their grievances. This has been overcome by our solution by having only end-to-end access to the data/complaints between the user and the admin and ensuring secrecy.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130932306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectrum and Power Allocation Scheme Using HoDEPSO-RP Approach for Cognitive Radio Network 基于HoDEPSO-RP的认知无线网络频谱功率分配方案
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127408
Jeyakanth Krishnan, Venkatakrishnan Perumalsamy, C. Chinnasamy, Dhivya Udhayasuriyan
In this research work, an evolutionary development approach is introduced for channel assignment in CRNs. These approaches are divine by some kind of adoptive development approach. In this proposed methodology, we utilized PSO with DE technique. It effectively maximize the throughput of CN while gratifying interference constraints of both primary and secondary users in network. It also solves the joint spectrum and power allocation problem in CRNs. In addition, a repair process is involved to ignore conflicts with secondary users to enhance spectrum in CRNs. The resulting algorithm is known as Hybridization of Differential Evolution based Particle Swarm optimization with repair process (HoDEPSO-RP). The performance analysis of this proposed HoDEPSO-RP is estimated by simulation techniques. This proposed work provides better performance result when compared with other existing algorithms.
在本研究中,提出了一种基于进化发展的crn信道分配方法。这些方法对于某种采用的开发方法来说是神圣的。在这个提出的方法中,我们将PSO与DE技术结合使用。在满足网络主、从用户干扰约束的同时,有效地实现了网络吞吐量的最大化。解决了crn中频谱和功率的联合分配问题。此外,在crn中还涉及到一个修复过程,以忽略与辅助用户的冲突,从而增强频谱。由此产生的算法被称为基于差分进化的粒子群优化与修复过程的杂交(HoDEPSO-RP)。通过仿真技术对所提出的HoDEPSO-RP进行了性能分析。与其他现有算法相比,本文的工作具有更好的性能效果。
{"title":"Spectrum and Power Allocation Scheme Using HoDEPSO-RP Approach for Cognitive Radio Network","authors":"Jeyakanth Krishnan, Venkatakrishnan Perumalsamy, C. Chinnasamy, Dhivya Udhayasuriyan","doi":"10.1109/ICNWC57852.2023.10127408","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127408","url":null,"abstract":"In this research work, an evolutionary development approach is introduced for channel assignment in CRNs. These approaches are divine by some kind of adoptive development approach. In this proposed methodology, we utilized PSO with DE technique. It effectively maximize the throughput of CN while gratifying interference constraints of both primary and secondary users in network. It also solves the joint spectrum and power allocation problem in CRNs. In addition, a repair process is involved to ignore conflicts with secondary users to enhance spectrum in CRNs. The resulting algorithm is known as Hybridization of Differential Evolution based Particle Swarm optimization with repair process (HoDEPSO-RP). The performance analysis of this proposed HoDEPSO-RP is estimated by simulation techniques. This proposed work provides better performance result when compared with other existing algorithms.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122472666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service Level Agreement Violation Detection in Multi-cloud Environment using Ethereum Blockchain 基于以太坊区块链的多云环境下服务水平协议违规检测
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127520
N. Neeraj, Aditya Nellikeri, P. Varun, Santosh Reddy, Mangesh Shanbhag, Dg Narayan, Altaf Husain
With the advancement of cloud computing technologies, it is necessary to maintain quality of service, for which service level agreements (SLAs) are one of the ways to improve this. A significant part of revenue will be contributed by the use of on demand resources (compute, network or storage) provided by this cloud service providers (CSP). Service level agreement (SLA) plays a key role in maintaining quality of services (QoS) of these on demand resources. The CSP enforces the SLA, by utilizing machine-generated logs to monitor machine performance. Additionally, some consumers may monitor resource performance themselves to ensure it meets their standards. This approach not only leads to traction between both CSP and cloud service consumers (CSC), but also leads to a duplication of the effort. The aim of this work is to create a system that is distributed in nature and could be trusted by both CSP and the consumer. The paper provides solution using a public blockchain and log based algorithm that evaluates resource performance based on several SLA criteria accepted by the CSP and consumers. If the system’s performance falls below a certain level, the CSC will be intimated through logs. This motivates the consumer to spend more money on the resources and compels the CSP to keep the number of SLA violations to a minimal. A web application with a blockchain as the back-end is used to monitor SLA violations and the compensation procedure. Finally, a multi-node ethereum blockchain network is used to conduct a performance analysis of the suggested solution.
随着云计算技术的发展,有必要保持服务质量,而服务水平协议(sla)就是改进服务质量的方法之一。很大一部分收入将来自使用由云服务提供商(CSP)提供的随需应变资源(计算、网络或存储)。服务水平协议(SLA)在维护这些随需应变资源的服务质量(QoS)方面起着关键作用。CSP通过利用机器生成的日志监视机器性能来实施SLA。此外,一些消费者可能自己监视资源性能,以确保它符合他们的标准。这种方法不仅会导致CSP和云服务消费者(CSC)之间的牵引力,还会导致工作的重复。这项工作的目的是创建一个分布式的系统,可以被CSP和消费者信任。本文提供了使用公共区块链和基于日志的算法的解决方案,该算法基于CSP和消费者接受的几个SLA标准评估资源性能。如果系统的性能低于一定的水平,CSC将通过日志提示。这促使用户在资源上花费更多的钱,并迫使CSP将违反SLA的次数保持在最低限度。以区块链为后端的web应用程序用于监控SLA违规和补偿过程。最后,使用多节点以太坊区块链网络对建议的解决方案进行性能分析。
{"title":"Service Level Agreement Violation Detection in Multi-cloud Environment using Ethereum Blockchain","authors":"N. Neeraj, Aditya Nellikeri, P. Varun, Santosh Reddy, Mangesh Shanbhag, Dg Narayan, Altaf Husain","doi":"10.1109/ICNWC57852.2023.10127520","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127520","url":null,"abstract":"With the advancement of cloud computing technologies, it is necessary to maintain quality of service, for which service level agreements (SLAs) are one of the ways to improve this. A significant part of revenue will be contributed by the use of on demand resources (compute, network or storage) provided by this cloud service providers (CSP). Service level agreement (SLA) plays a key role in maintaining quality of services (QoS) of these on demand resources. The CSP enforces the SLA, by utilizing machine-generated logs to monitor machine performance. Additionally, some consumers may monitor resource performance themselves to ensure it meets their standards. This approach not only leads to traction between both CSP and cloud service consumers (CSC), but also leads to a duplication of the effort. The aim of this work is to create a system that is distributed in nature and could be trusted by both CSP and the consumer. The paper provides solution using a public blockchain and log based algorithm that evaluates resource performance based on several SLA criteria accepted by the CSP and consumers. If the system’s performance falls below a certain level, the CSC will be intimated through logs. This motivates the consumer to spend more money on the resources and compels the CSP to keep the number of SLA violations to a minimal. A web application with a blockchain as the back-end is used to monitor SLA violations and the compensation procedure. Finally, a multi-node ethereum blockchain network is used to conduct a performance analysis of the suggested solution.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122906766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric Recognition Using EEG Signals And Controlling The Electrical Devices 利用脑电图信号进行生物特征识别及控制电子设备
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127259
Ms.S.Anitha Jebamani, M. Ragavi, K. Nivetha.
The direct link between computer systems and the human brain is known as a “brain computer interface,” or BCI. The BCI reads the waves composed of the brain at exclusive places inside the human head, translates those indicators into movements and instructions,which can control the computer systems. We endorse combining this generation with home automation. This interface device is especially helpful for people who are severely disabled or confined and lack reliable muscular control over the parts of their bodies that are engaged with surrounding peripherals. The machine entails two components: an EEG sensor circuit and Arduino microcontroller board. The mind waves are captured using electrodes. These indicators are filtered and amplified to take away noise. These analog signs are converted to digital. The digital alerts are decoded and are used to exchange on a device
计算机系统和人脑之间的直接联系被称为“脑机接口”,简称BCI。脑机接口(BCI)读取人脑内部特定位置的脑电波,将这些信号转化为动作和指令,从而控制计算机系统。我们支持将这一代与家庭自动化相结合。这种接口设备对严重残疾或受限的人特别有帮助,他们对与周围周边设备接触的身体部位缺乏可靠的肌肉控制。该机器由两个部分组成:脑电图传感器电路和Arduino微控制器板。脑电波是用电极捕捉到的。这些指标经过过滤和放大,以消除噪音。这些模拟信号被转换成数字信号。数字警报被解码并用于在设备上交换
{"title":"Biometric Recognition Using EEG Signals And Controlling The Electrical Devices","authors":"Ms.S.Anitha Jebamani, M. Ragavi, K. Nivetha.","doi":"10.1109/ICNWC57852.2023.10127259","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127259","url":null,"abstract":"The direct link between computer systems and the human brain is known as a “brain computer interface,” or BCI. The BCI reads the waves composed of the brain at exclusive places inside the human head, translates those indicators into movements and instructions,which can control the computer systems. We endorse combining this generation with home automation. This interface device is especially helpful for people who are severely disabled or confined and lack reliable muscular control over the parts of their bodies that are engaged with surrounding peripherals. The machine entails two components: an EEG sensor circuit and Arduino microcontroller board. The mind waves are captured using electrodes. These indicators are filtered and amplified to take away noise. These analog signs are converted to digital. The digital alerts are decoded and are used to exchange on a device","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123452587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Textual-Graphical Password Authentication System With Enhanced Security 一种增强安全性的图文混合密码认证系统
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127514
Mayank Singh, Vrushal Nedungadi, R. Radhika
Many positive outcomes may be attributed to the development of technology. Because of technological advancements, it is now possible to greatly simplify most human activities. The same holds for cybercriminals who, among other things, aim to get into user accounts to steal private data for their ends. Even though technological advancements are unquestionably beneficial, it is our responsibility as consumers to take all necessary precautions to safeguard our data. Various safeguards are at our disposal. The security of any given system, however, is always at risk. All of our efforts are focused on reducing the likelihood of a security breach. A textual and graphical password paradigm[1] is used for authentication here. We have settled on this framework because humans are naturally visual beings, and we think that by using a cued-recall and recognition-based strategy, we may improve a system’s defences. A password having an entropy[5] of 60 and above is said to be a strong password. This scheme of passwords once put through rigorous testing can prove to be a very good alternative to the multi-factor authentication that would require the user to wait for an OTP or some other hassle. Our approach looks to mitigate all the hassles encountered throughout the process and looks to propose a hassle-free gateway for the authentication of users. This approach helps in creating passwords having a password entropy close to 89, which is considered to be a strong password.
许多积极的结果可归因于技术的发展。由于技术的进步,现在有可能大大简化大多数人类活动。同样的道理也适用于网络犯罪分子,他们的目标之一是进入用户账户,窃取私人数据以达到目的。尽管技术进步无疑是有益的,但作为消费者,我们有责任采取一切必要的预防措施来保护我们的数据。我们有各种保障措施。然而,任何给定系统的安全性总是处于危险之中。我们所有的努力都集中在减少安全漏洞的可能性上。这里使用文本和图形密码范式[1]进行身份验证。我们之所以选择这个框架,是因为人类天生就是视觉动物,我们认为通过使用线索-回忆和基于识别的策略,我们可以提高系统的防御能力。熵[5]大于等于60的密码称为强密码。这种密码方案一旦经过严格的测试,就可以证明是多因素身份验证的一个很好的替代方案,因为多因素身份验证需要用户等待OTP或其他一些麻烦。我们的方法似乎减轻了整个过程中遇到的所有麻烦,并似乎为用户身份验证提供了一个无麻烦的网关。这种方法有助于创建密码熵接近89的密码,这被认为是一个强密码。
{"title":"A Hybrid Textual-Graphical Password Authentication System With Enhanced Security","authors":"Mayank Singh, Vrushal Nedungadi, R. Radhika","doi":"10.1109/ICNWC57852.2023.10127514","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127514","url":null,"abstract":"Many positive outcomes may be attributed to the development of technology. Because of technological advancements, it is now possible to greatly simplify most human activities. The same holds for cybercriminals who, among other things, aim to get into user accounts to steal private data for their ends. Even though technological advancements are unquestionably beneficial, it is our responsibility as consumers to take all necessary precautions to safeguard our data. Various safeguards are at our disposal. The security of any given system, however, is always at risk. All of our efforts are focused on reducing the likelihood of a security breach. A textual and graphical password paradigm[1] is used for authentication here. We have settled on this framework because humans are naturally visual beings, and we think that by using a cued-recall and recognition-based strategy, we may improve a system’s defences. A password having an entropy[5] of 60 and above is said to be a strong password. This scheme of passwords once put through rigorous testing can prove to be a very good alternative to the multi-factor authentication that would require the user to wait for an OTP or some other hassle. Our approach looks to mitigate all the hassles encountered throughout the process and looks to propose a hassle-free gateway for the authentication of users. This approach helps in creating passwords having a password entropy close to 89, which is considered to be a strong password.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123883143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Techniques For Spamming And Cyberbullying Detection 垃圾邮件和网络欺凌检测的深度学习技术
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127460
M. Meenakshi, P. Shyam Babu, V. Hemamalini
Social media allows people to exchange their views on different topics. However, some users post offensive comments on social media, which is known as cyberbullying, and some scam users by posting fake links in the comment section which adversely affects the user experience on those platforms. Thus regulation of contents in social media has become a growing need. The metrics for the regulations can be achieved by detecting these comments using deep learning techniques and machine learning algorithms Gaussian Naive Bayes, Logistic regression, Decision tree classifier, Adaboost classifier, Random forest classifier, MBERT and BERT, Gaussian Naive Bayes, Logistic Regression for cyberbullying and spamming respectively.This paper aims at detecting cyberbullying and spamming with the help of the techniques mentioned above for spamming and cyberbullying detection in English and Tanglish. Furthermore, it compares a number of supervised techniques, including standard and ensemble methods. Ensemble supervised methods have the capability to outperform conventional supervised methods, according to the evaluation of the results. The fine tuned classification BERT model (Bidirectional Encoder Representations from Transformers) and MBERT(Multilingual BERT) are based on Transformers, are used for cyberbullying detection and machine learning algorithms which include Gaussian Naive Bayes and Logistic regression have been used for spam detection. We do a comparative study between deep learning and machine learning algorithms. Compared to machine learning algorithms, deep learning algorithm BERT performed better at detecting spamming comments.
社交媒体允许人们就不同的话题交换意见。然而,一些用户在社交媒体上发表攻击性评论,这被称为网络欺凌,还有一些用户通过在评论区发布虚假链接来欺骗用户,这对这些平台上的用户体验产生了不利影响。因此,对社交媒体内容的监管已经成为一种日益增长的需求。规则的度量可以通过使用深度学习技术和机器学习算法(分别用于网络欺凌和垃圾邮件的高斯朴素贝叶斯、逻辑回归、决策树分类器、Adaboost分类器、随机森林分类器、MBERT和BERT、高斯朴素贝叶斯、逻辑回归)检测这些评论来实现。本文旨在利用上述技术对英语和唐式英语中的垃圾邮件和网络欺凌进行检测。此外,它比较了一些监督技术,包括标准和集成方法。根据对结果的评价,集成监督方法具有优于传统监督方法的能力。微调分类BERT模型(来自变形金刚的双向编码器表示)和MBERT(多语言BERT)基于变形金刚,用于网络欺凌检测,机器学习算法(包括高斯朴素贝叶斯和逻辑回归)已用于垃圾邮件检测。我们对深度学习和机器学习算法进行了比较研究。与机器学习算法相比,深度学习算法BERT在检测垃圾评论方面表现更好。
{"title":"Deep Learning Techniques For Spamming And Cyberbullying Detection","authors":"M. Meenakshi, P. Shyam Babu, V. Hemamalini","doi":"10.1109/ICNWC57852.2023.10127460","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127460","url":null,"abstract":"Social media allows people to exchange their views on different topics. However, some users post offensive comments on social media, which is known as cyberbullying, and some scam users by posting fake links in the comment section which adversely affects the user experience on those platforms. Thus regulation of contents in social media has become a growing need. The metrics for the regulations can be achieved by detecting these comments using deep learning techniques and machine learning algorithms Gaussian Naive Bayes, Logistic regression, Decision tree classifier, Adaboost classifier, Random forest classifier, MBERT and BERT, Gaussian Naive Bayes, Logistic Regression for cyberbullying and spamming respectively.This paper aims at detecting cyberbullying and spamming with the help of the techniques mentioned above for spamming and cyberbullying detection in English and Tanglish. Furthermore, it compares a number of supervised techniques, including standard and ensemble methods. Ensemble supervised methods have the capability to outperform conventional supervised methods, according to the evaluation of the results. The fine tuned classification BERT model (Bidirectional Encoder Representations from Transformers) and MBERT(Multilingual BERT) are based on Transformers, are used for cyberbullying detection and machine learning algorithms which include Gaussian Naive Bayes and Logistic regression have been used for spam detection. We do a comparative study between deep learning and machine learning algorithms. Compared to machine learning algorithms, deep learning algorithm BERT performed better at detecting spamming comments.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128573698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MonuAR:M.A.R Application for Visualising 3D Monuments MonuAR:硕士R应用程序可视化3D纪念碑
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127425
Shanthi D Sorna, B. Bhuvaneswaran, Adhithya R Manoj, S. Pooja
The Art and Heritage has been an integral part of our Indian Culture. These art forms and heritage are left unnoticed just because they are very much away. Therefore these sites can be brought back to life in any environment. The heritage properties of art and craft of India can be brought to life from anywhere by using an AR application on the phone. There are times when people visit the monuments and they are in need of a third party to show them the main attractions of the monument. Instead of relying on a third party, this can be done using this app where an AR marker appears on important tourist spots. The software that are used are Unity, Blender, Python and Visual Studio for C#. The software development kit used are Vuforia AR SDK and Mapbox SDK.The software that are used are Unity, Blender, Python and Visual Studio for C#. The software development kit used are Vuforia AR SDK and Mapbox SDK
艺术和遗产一直是我们印度文化不可分割的一部分。这些艺术形式和遗产之所以被忽视,只是因为它们离我们很远。因此,这些场所可以在任何环境中恢复生机。通过使用手机上的AR应用程序,印度的艺术和工艺遗产可以在任何地方被赋予生命。有时,当人们参观纪念碑时,他们需要第三方向他们展示纪念碑的主要景点。而不是依赖于第三方,这可以使用这个应用程序,在重要的旅游景点出现一个AR标记。使用的软件是Unity、Blender、Python和Visual Studio c#。使用的软件开发工具包为Vuforia AR SDK和Mapbox SDK。使用的软件是Unity、Blender、Python和Visual Studio c#。使用的软件开发工具包为Vuforia AR SDK和Mapbox SDK
{"title":"MonuAR:M.A.R Application for Visualising 3D Monuments","authors":"Shanthi D Sorna, B. Bhuvaneswaran, Adhithya R Manoj, S. Pooja","doi":"10.1109/ICNWC57852.2023.10127425","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127425","url":null,"abstract":"The Art and Heritage has been an integral part of our Indian Culture. These art forms and heritage are left unnoticed just because they are very much away. Therefore these sites can be brought back to life in any environment. The heritage properties of art and craft of India can be brought to life from anywhere by using an AR application on the phone. There are times when people visit the monuments and they are in need of a third party to show them the main attractions of the monument. Instead of relying on a third party, this can be done using this app where an AR marker appears on important tourist spots. The software that are used are Unity, Blender, Python and Visual Studio for C#. The software development kit used are Vuforia AR SDK and Mapbox SDK.The software that are used are Unity, Blender, Python and Visual Studio for C#. The software development kit used are Vuforia AR SDK and Mapbox SDK","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tesla-geometry based wideband 5G antenna for V2V applications 基于特斯拉几何的V2V应用宽带5G天线
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127489
J. N. Niranjan Prasad, R. N. Nirmal Kumar, A. Nirmal Kishore, Madhumitha Jayaram
This paper presents the design and analysis of wideband 5G antenna intended for autonomous vehicle applications. The antenna design with Tesla geometry has been proposed, which is known for its gain and wide-angle radiation pattern. The design process includes the optimization of the antenna parameters, such as the dimensions of the radiator, the ground plane, and the feed location. The antenna has been simulated using CST software, and the results show that it has a gain of 4.5 dB, wider bandwidth of 2. 442GHz, and an operational frequency of 29.2 GHz.
本文介绍了用于自动驾驶汽车应用的宽带5G天线的设计和分析。提出了具有特斯拉几何形状的天线设计,该天线以其增益和广角辐射方向图而闻名。设计过程包括天线参数的优化,如散热器尺寸、接地面、馈电位置等。利用CST软件对该天线进行了仿真,结果表明该天线的增益为4.5 dB,带宽为2。442GHz,工作频率29.2 GHz。
{"title":"Tesla-geometry based wideband 5G antenna for V2V applications","authors":"J. N. Niranjan Prasad, R. N. Nirmal Kumar, A. Nirmal Kishore, Madhumitha Jayaram","doi":"10.1109/ICNWC57852.2023.10127489","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127489","url":null,"abstract":"This paper presents the design and analysis of wideband 5G antenna intended for autonomous vehicle applications. The antenna design with Tesla geometry has been proposed, which is known for its gain and wide-angle radiation pattern. The design process includes the optimization of the antenna parameters, such as the dimensions of the radiator, the ground plane, and the feed location. The antenna has been simulated using CST software, and the results show that it has a gain of 4.5 dB, wider bandwidth of 2. 442GHz, and an operational frequency of 29.2 GHz.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115365036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 International Conference on Networking and Communications (ICNWC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1