首页 > 最新文献

2023 International Conference on Networking and Communications (ICNWC)最新文献

英文 中文
Panchi: A women’s security app Panchi:一款女性安全应用
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127409
Arbind Lochan Mishra, Harsh Srivastava, Hemamalini V
The domain is the primary focus of this project (Web Application Development). In India, it is difficult for women to report the issues they are having because it either takes a long time to document them and convey them to the appropriate authority or because of cultural pressure. In order to solve their issue by presenting complaints to the appropriate authority immediately, a web application is suggested. It has a complaint module that enables women to report emergencies so that authorities can be dispatched to those who need assistance. It is an interface for registering complaints and following them up. The main problem statement tried to be worked upon is the fact that when women want to register any grievance they are not able to do so because of various reasons out of which two stand out as the most common. The way to reach the authorities responsible to take action is way too long and time-consuming and this discourages them to go ahead with it as they’re unsure of even being heard or what the outcome of the situation might be even after spending a long time and effort for the same. The other factor is the fear of being judged by the society which is one of the leading factors as to why women do not go ahead with reporting their grievances. This has been overcome by our solution by having only end-to-end access to the data/complaints between the user and the admin and ensuring secrecy.
域是这个项目(Web Application Development)的主要焦点。在印度,女性很难报告她们遇到的问题,因为要么要花很长时间来记录这些问题并将其传达给有关当局,要么是因为文化压力。为了通过立即向有关当局提出投诉来解决他们的问题,建议使用web应用程序。它有一个投诉模块,使妇女能够报告紧急情况,以便当局可以派往需要援助的人。这是一个注册投诉和跟进投诉的界面。试图解决的主要问题陈述是这样一个事实,即当妇女想要表达任何不满时,由于各种原因,她们无法这样做,其中两个原因最为常见。联系负责采取行动的当局的方式太长太耗时,这使他们不愿意继续下去,因为他们甚至不确定是否会听到他们的声音,也不确定即使花费了很长时间和精力,情况的结果可能是什么。另一个因素是害怕被社会评判,这也是为什么女性不继续报告她们的不满的主要因素之一。我们的解决方案通过只对用户和管理员之间的数据/投诉进行端到端访问并确保保密性来克服了这一点。
{"title":"Panchi: A women’s security app","authors":"Arbind Lochan Mishra, Harsh Srivastava, Hemamalini V","doi":"10.1109/ICNWC57852.2023.10127409","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127409","url":null,"abstract":"The domain is the primary focus of this project (Web Application Development). In India, it is difficult for women to report the issues they are having because it either takes a long time to document them and convey them to the appropriate authority or because of cultural pressure. In order to solve their issue by presenting complaints to the appropriate authority immediately, a web application is suggested. It has a complaint module that enables women to report emergencies so that authorities can be dispatched to those who need assistance. It is an interface for registering complaints and following them up. The main problem statement tried to be worked upon is the fact that when women want to register any grievance they are not able to do so because of various reasons out of which two stand out as the most common. The way to reach the authorities responsible to take action is way too long and time-consuming and this discourages them to go ahead with it as they’re unsure of even being heard or what the outcome of the situation might be even after spending a long time and effort for the same. The other factor is the fear of being judged by the society which is one of the leading factors as to why women do not go ahead with reporting their grievances. This has been overcome by our solution by having only end-to-end access to the data/complaints between the user and the admin and ensuring secrecy.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130932306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectrum and Power Allocation Scheme Using HoDEPSO-RP Approach for Cognitive Radio Network 基于HoDEPSO-RP的认知无线网络频谱功率分配方案
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127408
Jeyakanth Krishnan, Venkatakrishnan Perumalsamy, C. Chinnasamy, Dhivya Udhayasuriyan
In this research work, an evolutionary development approach is introduced for channel assignment in CRNs. These approaches are divine by some kind of adoptive development approach. In this proposed methodology, we utilized PSO with DE technique. It effectively maximize the throughput of CN while gratifying interference constraints of both primary and secondary users in network. It also solves the joint spectrum and power allocation problem in CRNs. In addition, a repair process is involved to ignore conflicts with secondary users to enhance spectrum in CRNs. The resulting algorithm is known as Hybridization of Differential Evolution based Particle Swarm optimization with repair process (HoDEPSO-RP). The performance analysis of this proposed HoDEPSO-RP is estimated by simulation techniques. This proposed work provides better performance result when compared with other existing algorithms.
在本研究中,提出了一种基于进化发展的crn信道分配方法。这些方法对于某种采用的开发方法来说是神圣的。在这个提出的方法中,我们将PSO与DE技术结合使用。在满足网络主、从用户干扰约束的同时,有效地实现了网络吞吐量的最大化。解决了crn中频谱和功率的联合分配问题。此外,在crn中还涉及到一个修复过程,以忽略与辅助用户的冲突,从而增强频谱。由此产生的算法被称为基于差分进化的粒子群优化与修复过程的杂交(HoDEPSO-RP)。通过仿真技术对所提出的HoDEPSO-RP进行了性能分析。与其他现有算法相比,本文的工作具有更好的性能效果。
{"title":"Spectrum and Power Allocation Scheme Using HoDEPSO-RP Approach for Cognitive Radio Network","authors":"Jeyakanth Krishnan, Venkatakrishnan Perumalsamy, C. Chinnasamy, Dhivya Udhayasuriyan","doi":"10.1109/ICNWC57852.2023.10127408","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127408","url":null,"abstract":"In this research work, an evolutionary development approach is introduced for channel assignment in CRNs. These approaches are divine by some kind of adoptive development approach. In this proposed methodology, we utilized PSO with DE technique. It effectively maximize the throughput of CN while gratifying interference constraints of both primary and secondary users in network. It also solves the joint spectrum and power allocation problem in CRNs. In addition, a repair process is involved to ignore conflicts with secondary users to enhance spectrum in CRNs. The resulting algorithm is known as Hybridization of Differential Evolution based Particle Swarm optimization with repair process (HoDEPSO-RP). The performance analysis of this proposed HoDEPSO-RP is estimated by simulation techniques. This proposed work provides better performance result when compared with other existing algorithms.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122472666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving QoS in Wireless Sensor Network routing using Machine Learning Techniques 利用机器学习技术改进无线传感器网络路由中的QoS
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127349
V. Natarajan, M. S. Kumar
Wireless sensor network (WSN) research is now extremely stimulated due to its potential applications in a range of disciplines, including area monitoring, healthcare, environmental observation, and industrial monitoring. The Quality of Service has become one of the main problems in WSN applications due to the increasing demand for WSN. Due to several limitations imposed by the applications using this network, guaranteed QoS in WSN is challenging to establish. Traditional QoS metrics concentrate on network-level metrics including packet reception ratio (PRR), jitter, end-to-end delay, and throughput. A high QoS environment is characterized by low packet delivery latency, high packet reception ratios, and maximum network throughput. The QoS can be assessed at the network or application level. In order to improve QoS in the network, this study focuses on creating and implementing a better path selection approach for WSN routing based on PRR predictions. Regression algorithms are used to forecast the PRR of a specific path, and the path with the best PRR value is selected to improve network quality of service. The strength of the received signal denoted as RSS, link quality indicator, noise floor over the specific multi-hop path, transmission and reception rate in the MAC layer, and routing path length are used to make the forecast. The results of the predictions and the estimated PRR are compared with the actual packet reception ratio collected from various WSN at an industrial environment.
由于无线传感器网络(WSN)在区域监测、医疗保健、环境观察和工业监测等一系列学科中的潜在应用,其研究受到极大的刺激。随着对无线传感器网络需求的不断增长,服务质量问题已成为无线传感器网络应用中的主要问题之一。由于使用该网络的应用程序的一些限制,在WSN中建立有保证的QoS是一个挑战。传统的QoS度量集中于网络级度量,包括包接收比(PRR)、抖动、端到端延迟和吞吐量。高QoS环境的特点是报文发送延迟低、报文接收比高、网络吞吐量最大。QoS可以在网络或应用程序级别进行评估。为了提高网络的QoS,本研究的重点是创建和实现一种更好的基于PRR预测的WSN路由路径选择方法。利用回归算法预测特定路径的PRR,选择PRR值最优的路径,提高网络服务质量。使用接收信号的强度(RSS)、链路质量指标、特定多跳路径上的本底噪声、MAC层的发送和接收速率以及路由路径长度进行预测。将预测结果和估计的PRR与从工业环境中收集的各种WSN的实际包接收比进行比较。
{"title":"Improving QoS in Wireless Sensor Network routing using Machine Learning Techniques","authors":"V. Natarajan, M. S. Kumar","doi":"10.1109/ICNWC57852.2023.10127349","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127349","url":null,"abstract":"Wireless sensor network (WSN) research is now extremely stimulated due to its potential applications in a range of disciplines, including area monitoring, healthcare, environmental observation, and industrial monitoring. The Quality of Service has become one of the main problems in WSN applications due to the increasing demand for WSN. Due to several limitations imposed by the applications using this network, guaranteed QoS in WSN is challenging to establish. Traditional QoS metrics concentrate on network-level metrics including packet reception ratio (PRR), jitter, end-to-end delay, and throughput. A high QoS environment is characterized by low packet delivery latency, high packet reception ratios, and maximum network throughput. The QoS can be assessed at the network or application level. In order to improve QoS in the network, this study focuses on creating and implementing a better path selection approach for WSN routing based on PRR predictions. Regression algorithms are used to forecast the PRR of a specific path, and the path with the best PRR value is selected to improve network quality of service. The strength of the received signal denoted as RSS, link quality indicator, noise floor over the specific multi-hop path, transmission and reception rate in the MAC layer, and routing path length are used to make the forecast. The results of the predictions and the estimated PRR are compared with the actual packet reception ratio collected from various WSN at an industrial environment.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121131606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design Of Compact Y-Shape Antenna For 5g Smartphones 5g智能手机紧凑型y形天线设计
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127400
K. Jeyavarshini, H. Jeevapriya, B. Kaaviya, Sivamani Kanimozhi, S. Ramesh
Numerous antenna properties are improved by microwave components with frequency-selective architectures, which are becoming more and more common in many techniques. This paper presents a single-resonant antenna with a Y-shaped structure in the patch. The designed antenna illustrates the parameters such as reflection coefficient (S11), gain (dB), and directivity (dBi) for the corresponding frequency. Since the antenna has been verified for impedance matching and has a low return loss, it is ideal for integration with other microwave equipment. A Microstrip antenna’s characteristics of lightweight and low profile have led to its widespread use in applications such as WLAN and 5G mobile communication. This study describes the design of a Y-shaped antenna in the frequency range of 4.2 to 6. 2GHz for 5G applications. A 3-Dimensional Electromagnetic simulation tool utilizing a finite difference time domain is used. The FR-4 epoxy substrate of height 40mm is used, which has a dielectric permittivity of 4.3. A proximity-coupled feed with 50$Omega$ impedance power this antenna.
具有频率选择结构的微波元件改善了许多天线的性能,这在许多技术中变得越来越普遍。本文提出了一种具有y形结构的单谐振天线。设计的天线给出了相应频率的反射系数(S11)、增益(dB)和指向性(dBi)等参数。由于天线已被验证为阻抗匹配和具有低回波损耗,它是理想的集成与其他微波设备。微带天线的轻量化和低姿态的特点使其在WLAN和5G移动通信等应用中得到广泛应用。本研究描述了一种频率范围为4.2 ~ 6的y形天线的设计。2GHz用于5G应用。利用时域有限差分的三维电磁仿真工具。采用高度40mm的FR-4环氧基板,其介电常数为4.3。邻近耦合馈电与50$Omega$阻抗为该天线供电。
{"title":"Design Of Compact Y-Shape Antenna For 5g Smartphones","authors":"K. Jeyavarshini, H. Jeevapriya, B. Kaaviya, Sivamani Kanimozhi, S. Ramesh","doi":"10.1109/ICNWC57852.2023.10127400","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127400","url":null,"abstract":"Numerous antenna properties are improved by microwave components with frequency-selective architectures, which are becoming more and more common in many techniques. This paper presents a single-resonant antenna with a Y-shaped structure in the patch. The designed antenna illustrates the parameters such as reflection coefficient (S11), gain (dB), and directivity (dBi) for the corresponding frequency. Since the antenna has been verified for impedance matching and has a low return loss, it is ideal for integration with other microwave equipment. A Microstrip antenna’s characteristics of lightweight and low profile have led to its widespread use in applications such as WLAN and 5G mobile communication. This study describes the design of a Y-shaped antenna in the frequency range of 4.2 to 6. 2GHz for 5G applications. A 3-Dimensional Electromagnetic simulation tool utilizing a finite difference time domain is used. The FR-4 epoxy substrate of height 40mm is used, which has a dielectric permittivity of 4.3. A proximity-coupled feed with 50$Omega$ impedance power this antenna.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133681607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Life Saving Express-Discovery The Shortest Distance In Vehicle Routing 救生快递——车辆路线中最短距离的发现
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127371
M. Hema, Kanaga Suba Raja, K. Valarmathi, D. Hema Ruba, Sv Abishyna, Kiruthiga Manivel
One of the famous examples in the study of route optimization in the field of computers is Travelling Saleman Problem (TSP). Researches throughout the years various algorithms have been developed attempting to solve the TSP yet there is always doubt in producing the best solution. TSP applies in transportation pathways, delivery services, flight routes, travellers and many more which means there is a need for a pre-planned route schedule to ensure an optimized travelling has been performed. The aim of this paper is to solve the optimal path problem in vehicle routing. The goal is to choose the best route that maximises the likelihood of rapidly reaching the target.. In an attempt to include an optimal path, an optimal path set I’d generated. Using the path set the optimal path can be easily found. TSP is formulated using a modified optimization algorithm for handling complicated and vast environmental constraints. TSP generates routes in complicated and vast environmental constraints. The TSP is an effective technique for providing short and safe routes under dynamic restrictions and its efficiency has been experimented.
在计算机领域研究路线优化的一个著名的例子是旅行推销员问题(TSP)。多年来,研究人员开发了各种算法来尝试求解TSP,但在产生最佳解时总是存在疑问。TSP适用于运输途径、交付服务、航班路线、旅客等许多方面,这意味着需要预先规划路线时间表,以确保执行优化的旅行。本文的目的是解决车辆路径的最优路径问题。目标是选择最好的路线,使快速到达目标的可能性最大化。为了包含一个最优路径,一个我生成的最优路径集。利用路径集可以很容易地找到最优路径。TSP是使用一种改进的优化算法来处理复杂和巨大的环境约束。TSP在复杂和巨大的环境约束下生成路线。TSP是一种在动态约束下提供短而安全路线的有效方法,其有效性已得到验证。
{"title":"Life Saving Express-Discovery The Shortest Distance In Vehicle Routing","authors":"M. Hema, Kanaga Suba Raja, K. Valarmathi, D. Hema Ruba, Sv Abishyna, Kiruthiga Manivel","doi":"10.1109/ICNWC57852.2023.10127371","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127371","url":null,"abstract":"One of the famous examples in the study of route optimization in the field of computers is Travelling Saleman Problem (TSP). Researches throughout the years various algorithms have been developed attempting to solve the TSP yet there is always doubt in producing the best solution. TSP applies in transportation pathways, delivery services, flight routes, travellers and many more which means there is a need for a pre-planned route schedule to ensure an optimized travelling has been performed. The aim of this paper is to solve the optimal path problem in vehicle routing. The goal is to choose the best route that maximises the likelihood of rapidly reaching the target.. In an attempt to include an optimal path, an optimal path set I’d generated. Using the path set the optimal path can be easily found. TSP is formulated using a modified optimization algorithm for handling complicated and vast environmental constraints. TSP generates routes in complicated and vast environmental constraints. The TSP is an effective technique for providing short and safe routes under dynamic restrictions and its efficiency has been experimented.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117025015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On-Demand Job-Based Recruitment For Organisations Using Artificial Intelligence 使用人工智能的组织的按需工作招聘
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127551
Nithya Jayakumar, A. K. Maheshwaran, P. S. Arvind, G. Vijayaragavan
Employee attrition, also referred to as the loss of personnel over time in a business, occurs for a variety of inescapable reasons. The attrition percentage in 2022 will be 20.3%, according to the latest statistics from India. Employee attrition is a significant problem that can cause severe losses to organizations. In recent years, machine learning has emerged as a powerful tool to address this challenge by predicting employees who may leave the organization. However, the accurate prediction of employee attrition faces various challenges, including dealing with imbalanced datasets, identifying the most critical predictors, and selecting the most appropriate machine learning algorithms. In this study, the proposed solution employs a combination of data preprocessing techniques and machine learning algorithms to predict employee attrition. Our solution includes a visual representation of employee attrition, a parser to extract information from resumes, a test to assess the suitability of potential candidates and AI candidate recommendation. Evaluate the proposed solution using the Employee Attrition dataset and achieve promising results. Our solution can serve as a useful tool for HR managers to predict and visualize employee attrition trends and hire the right candidates for upcoming vacancies.
员工流失,也被称为员工随着时间的推移而流失,是由于各种不可避免的原因而发生的。根据印度的最新统计数据,2022年的流失率将达到20.3%。员工流失是一个严重的问题,可能会给组织造成严重的损失。近年来,机器学习已经成为一种强大的工具,通过预测可能离开组织的员工来应对这一挑战。然而,准确预测员工流失面临着各种挑战,包括处理不平衡的数据集,识别最关键的预测因素,以及选择最合适的机器学习算法。在本研究中,提出的解决方案结合了数据预处理技术和机器学习算法来预测员工流失。我们的解决方案包括员工流失的可视化表示、从简历中提取信息的解析器、评估潜在候选人适用性的测试以及人工智能候选人推荐。使用员工流失数据集评估建议的解决方案,并获得有希望的结果。我们的解决方案可以作为人力资源经理预测和可视化员工流失趋势的有用工具,并为即将到来的职位空缺雇用合适的候选人。
{"title":"On-Demand Job-Based Recruitment For Organisations Using Artificial Intelligence","authors":"Nithya Jayakumar, A. K. Maheshwaran, P. S. Arvind, G. Vijayaragavan","doi":"10.1109/ICNWC57852.2023.10127551","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127551","url":null,"abstract":"Employee attrition, also referred to as the loss of personnel over time in a business, occurs for a variety of inescapable reasons. The attrition percentage in 2022 will be 20.3%, according to the latest statistics from India. Employee attrition is a significant problem that can cause severe losses to organizations. In recent years, machine learning has emerged as a powerful tool to address this challenge by predicting employees who may leave the organization. However, the accurate prediction of employee attrition faces various challenges, including dealing with imbalanced datasets, identifying the most critical predictors, and selecting the most appropriate machine learning algorithms. In this study, the proposed solution employs a combination of data preprocessing techniques and machine learning algorithms to predict employee attrition. Our solution includes a visual representation of employee attrition, a parser to extract information from resumes, a test to assess the suitability of potential candidates and AI candidate recommendation. Evaluate the proposed solution using the Employee Attrition dataset and achieve promising results. Our solution can serve as a useful tool for HR managers to predict and visualize employee attrition trends and hire the right candidates for upcoming vacancies.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133384991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Textual-Graphical Password Authentication System With Enhanced Security 一种增强安全性的图文混合密码认证系统
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127514
Mayank Singh, Vrushal Nedungadi, R. Radhika
Many positive outcomes may be attributed to the development of technology. Because of technological advancements, it is now possible to greatly simplify most human activities. The same holds for cybercriminals who, among other things, aim to get into user accounts to steal private data for their ends. Even though technological advancements are unquestionably beneficial, it is our responsibility as consumers to take all necessary precautions to safeguard our data. Various safeguards are at our disposal. The security of any given system, however, is always at risk. All of our efforts are focused on reducing the likelihood of a security breach. A textual and graphical password paradigm[1] is used for authentication here. We have settled on this framework because humans are naturally visual beings, and we think that by using a cued-recall and recognition-based strategy, we may improve a system’s defences. A password having an entropy[5] of 60 and above is said to be a strong password. This scheme of passwords once put through rigorous testing can prove to be a very good alternative to the multi-factor authentication that would require the user to wait for an OTP or some other hassle. Our approach looks to mitigate all the hassles encountered throughout the process and looks to propose a hassle-free gateway for the authentication of users. This approach helps in creating passwords having a password entropy close to 89, which is considered to be a strong password.
许多积极的结果可归因于技术的发展。由于技术的进步,现在有可能大大简化大多数人类活动。同样的道理也适用于网络犯罪分子,他们的目标之一是进入用户账户,窃取私人数据以达到目的。尽管技术进步无疑是有益的,但作为消费者,我们有责任采取一切必要的预防措施来保护我们的数据。我们有各种保障措施。然而,任何给定系统的安全性总是处于危险之中。我们所有的努力都集中在减少安全漏洞的可能性上。这里使用文本和图形密码范式[1]进行身份验证。我们之所以选择这个框架,是因为人类天生就是视觉动物,我们认为通过使用线索-回忆和基于识别的策略,我们可以提高系统的防御能力。熵[5]大于等于60的密码称为强密码。这种密码方案一旦经过严格的测试,就可以证明是多因素身份验证的一个很好的替代方案,因为多因素身份验证需要用户等待OTP或其他一些麻烦。我们的方法似乎减轻了整个过程中遇到的所有麻烦,并似乎为用户身份验证提供了一个无麻烦的网关。这种方法有助于创建密码熵接近89的密码,这被认为是一个强密码。
{"title":"A Hybrid Textual-Graphical Password Authentication System With Enhanced Security","authors":"Mayank Singh, Vrushal Nedungadi, R. Radhika","doi":"10.1109/ICNWC57852.2023.10127514","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127514","url":null,"abstract":"Many positive outcomes may be attributed to the development of technology. Because of technological advancements, it is now possible to greatly simplify most human activities. The same holds for cybercriminals who, among other things, aim to get into user accounts to steal private data for their ends. Even though technological advancements are unquestionably beneficial, it is our responsibility as consumers to take all necessary precautions to safeguard our data. Various safeguards are at our disposal. The security of any given system, however, is always at risk. All of our efforts are focused on reducing the likelihood of a security breach. A textual and graphical password paradigm[1] is used for authentication here. We have settled on this framework because humans are naturally visual beings, and we think that by using a cued-recall and recognition-based strategy, we may improve a system’s defences. A password having an entropy[5] of 60 and above is said to be a strong password. This scheme of passwords once put through rigorous testing can prove to be a very good alternative to the multi-factor authentication that would require the user to wait for an OTP or some other hassle. Our approach looks to mitigate all the hassles encountered throughout the process and looks to propose a hassle-free gateway for the authentication of users. This approach helps in creating passwords having a password entropy close to 89, which is considered to be a strong password.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123883143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Techniques For Spamming And Cyberbullying Detection 垃圾邮件和网络欺凌检测的深度学习技术
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127460
M. Meenakshi, P. Shyam Babu, V. Hemamalini
Social media allows people to exchange their views on different topics. However, some users post offensive comments on social media, which is known as cyberbullying, and some scam users by posting fake links in the comment section which adversely affects the user experience on those platforms. Thus regulation of contents in social media has become a growing need. The metrics for the regulations can be achieved by detecting these comments using deep learning techniques and machine learning algorithms Gaussian Naive Bayes, Logistic regression, Decision tree classifier, Adaboost classifier, Random forest classifier, MBERT and BERT, Gaussian Naive Bayes, Logistic Regression for cyberbullying and spamming respectively.This paper aims at detecting cyberbullying and spamming with the help of the techniques mentioned above for spamming and cyberbullying detection in English and Tanglish. Furthermore, it compares a number of supervised techniques, including standard and ensemble methods. Ensemble supervised methods have the capability to outperform conventional supervised methods, according to the evaluation of the results. The fine tuned classification BERT model (Bidirectional Encoder Representations from Transformers) and MBERT(Multilingual BERT) are based on Transformers, are used for cyberbullying detection and machine learning algorithms which include Gaussian Naive Bayes and Logistic regression have been used for spam detection. We do a comparative study between deep learning and machine learning algorithms. Compared to machine learning algorithms, deep learning algorithm BERT performed better at detecting spamming comments.
社交媒体允许人们就不同的话题交换意见。然而,一些用户在社交媒体上发表攻击性评论,这被称为网络欺凌,还有一些用户通过在评论区发布虚假链接来欺骗用户,这对这些平台上的用户体验产生了不利影响。因此,对社交媒体内容的监管已经成为一种日益增长的需求。规则的度量可以通过使用深度学习技术和机器学习算法(分别用于网络欺凌和垃圾邮件的高斯朴素贝叶斯、逻辑回归、决策树分类器、Adaboost分类器、随机森林分类器、MBERT和BERT、高斯朴素贝叶斯、逻辑回归)检测这些评论来实现。本文旨在利用上述技术对英语和唐式英语中的垃圾邮件和网络欺凌进行检测。此外,它比较了一些监督技术,包括标准和集成方法。根据对结果的评价,集成监督方法具有优于传统监督方法的能力。微调分类BERT模型(来自变形金刚的双向编码器表示)和MBERT(多语言BERT)基于变形金刚,用于网络欺凌检测,机器学习算法(包括高斯朴素贝叶斯和逻辑回归)已用于垃圾邮件检测。我们对深度学习和机器学习算法进行了比较研究。与机器学习算法相比,深度学习算法BERT在检测垃圾评论方面表现更好。
{"title":"Deep Learning Techniques For Spamming And Cyberbullying Detection","authors":"M. Meenakshi, P. Shyam Babu, V. Hemamalini","doi":"10.1109/ICNWC57852.2023.10127460","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127460","url":null,"abstract":"Social media allows people to exchange their views on different topics. However, some users post offensive comments on social media, which is known as cyberbullying, and some scam users by posting fake links in the comment section which adversely affects the user experience on those platforms. Thus regulation of contents in social media has become a growing need. The metrics for the regulations can be achieved by detecting these comments using deep learning techniques and machine learning algorithms Gaussian Naive Bayes, Logistic regression, Decision tree classifier, Adaboost classifier, Random forest classifier, MBERT and BERT, Gaussian Naive Bayes, Logistic Regression for cyberbullying and spamming respectively.This paper aims at detecting cyberbullying and spamming with the help of the techniques mentioned above for spamming and cyberbullying detection in English and Tanglish. Furthermore, it compares a number of supervised techniques, including standard and ensemble methods. Ensemble supervised methods have the capability to outperform conventional supervised methods, according to the evaluation of the results. The fine tuned classification BERT model (Bidirectional Encoder Representations from Transformers) and MBERT(Multilingual BERT) are based on Transformers, are used for cyberbullying detection and machine learning algorithms which include Gaussian Naive Bayes and Logistic regression have been used for spam detection. We do a comparative study between deep learning and machine learning algorithms. Compared to machine learning algorithms, deep learning algorithm BERT performed better at detecting spamming comments.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128573698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MonuAR:M.A.R Application for Visualising 3D Monuments MonuAR:硕士R应用程序可视化3D纪念碑
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127425
Shanthi D Sorna, B. Bhuvaneswaran, Adhithya R Manoj, S. Pooja
The Art and Heritage has been an integral part of our Indian Culture. These art forms and heritage are left unnoticed just because they are very much away. Therefore these sites can be brought back to life in any environment. The heritage properties of art and craft of India can be brought to life from anywhere by using an AR application on the phone. There are times when people visit the monuments and they are in need of a third party to show them the main attractions of the monument. Instead of relying on a third party, this can be done using this app where an AR marker appears on important tourist spots. The software that are used are Unity, Blender, Python and Visual Studio for C#. The software development kit used are Vuforia AR SDK and Mapbox SDK.The software that are used are Unity, Blender, Python and Visual Studio for C#. The software development kit used are Vuforia AR SDK and Mapbox SDK
艺术和遗产一直是我们印度文化不可分割的一部分。这些艺术形式和遗产之所以被忽视,只是因为它们离我们很远。因此,这些场所可以在任何环境中恢复生机。通过使用手机上的AR应用程序,印度的艺术和工艺遗产可以在任何地方被赋予生命。有时,当人们参观纪念碑时,他们需要第三方向他们展示纪念碑的主要景点。而不是依赖于第三方,这可以使用这个应用程序,在重要的旅游景点出现一个AR标记。使用的软件是Unity、Blender、Python和Visual Studio c#。使用的软件开发工具包为Vuforia AR SDK和Mapbox SDK。使用的软件是Unity、Blender、Python和Visual Studio c#。使用的软件开发工具包为Vuforia AR SDK和Mapbox SDK
{"title":"MonuAR:M.A.R Application for Visualising 3D Monuments","authors":"Shanthi D Sorna, B. Bhuvaneswaran, Adhithya R Manoj, S. Pooja","doi":"10.1109/ICNWC57852.2023.10127425","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127425","url":null,"abstract":"The Art and Heritage has been an integral part of our Indian Culture. These art forms and heritage are left unnoticed just because they are very much away. Therefore these sites can be brought back to life in any environment. The heritage properties of art and craft of India can be brought to life from anywhere by using an AR application on the phone. There are times when people visit the monuments and they are in need of a third party to show them the main attractions of the monument. Instead of relying on a third party, this can be done using this app where an AR marker appears on important tourist spots. The software that are used are Unity, Blender, Python and Visual Studio for C#. The software development kit used are Vuforia AR SDK and Mapbox SDK.The software that are used are Unity, Blender, Python and Visual Studio for C#. The software development kit used are Vuforia AR SDK and Mapbox SDK","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tesla-geometry based wideband 5G antenna for V2V applications 基于特斯拉几何的V2V应用宽带5G天线
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127489
J. N. Niranjan Prasad, R. N. Nirmal Kumar, A. Nirmal Kishore, Madhumitha Jayaram
This paper presents the design and analysis of wideband 5G antenna intended for autonomous vehicle applications. The antenna design with Tesla geometry has been proposed, which is known for its gain and wide-angle radiation pattern. The design process includes the optimization of the antenna parameters, such as the dimensions of the radiator, the ground plane, and the feed location. The antenna has been simulated using CST software, and the results show that it has a gain of 4.5 dB, wider bandwidth of 2. 442GHz, and an operational frequency of 29.2 GHz.
本文介绍了用于自动驾驶汽车应用的宽带5G天线的设计和分析。提出了具有特斯拉几何形状的天线设计,该天线以其增益和广角辐射方向图而闻名。设计过程包括天线参数的优化,如散热器尺寸、接地面、馈电位置等。利用CST软件对该天线进行了仿真,结果表明该天线的增益为4.5 dB,带宽为2。442GHz,工作频率29.2 GHz。
{"title":"Tesla-geometry based wideband 5G antenna for V2V applications","authors":"J. N. Niranjan Prasad, R. N. Nirmal Kumar, A. Nirmal Kishore, Madhumitha Jayaram","doi":"10.1109/ICNWC57852.2023.10127489","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127489","url":null,"abstract":"This paper presents the design and analysis of wideband 5G antenna intended for autonomous vehicle applications. The antenna design with Tesla geometry has been proposed, which is known for its gain and wide-angle radiation pattern. The design process includes the optimization of the antenna parameters, such as the dimensions of the radiator, the ground plane, and the feed location. The antenna has been simulated using CST software, and the results show that it has a gain of 4.5 dB, wider bandwidth of 2. 442GHz, and an operational frequency of 29.2 GHz.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115365036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 International Conference on Networking and Communications (ICNWC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1