Pub Date : 2023-04-05DOI: 10.1109/ICNWC57852.2023.10127450
Arshdeep Janjua, S. Dhalla, Savita Gupta, Sukhwinder Singh
Federated learning (FL) has undergone substantial research and has been used in numerous real-world solutions over the past few years. It shows promising results in addressing the data security and privacy issues present in the traditional centralized machine learning approach. Even though federated learning makes certain of data privacy for each contributing user, the global model and the data are still vulnerable to attacks by compromised clients and servers. Additionally, in the settings for non-independent identical data (Non-IID), federated learning performs significantly less compared to the standard centralized learning mode. To address both the security and performance issues, this paper proposes a blockchain-enabled gossip federated learning framework (BGFL). BGFL replaces the central server with a blockchain-enabled system for global model storage and exchange. Also, to achieve faster training convergence, clients communicate with each other based on a gossip training approach. Then, to evaluate the performance we perform experiments using MNIST and CIFAR datasets in Non-IID settings. The performance and effectiveness of the BGFL framework is demonstrated by the experimental results.
{"title":"A Blockchain-Enabled Decentralized Gossip Federated Learning Framework","authors":"Arshdeep Janjua, S. Dhalla, Savita Gupta, Sukhwinder Singh","doi":"10.1109/ICNWC57852.2023.10127450","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127450","url":null,"abstract":"Federated learning (FL) has undergone substantial research and has been used in numerous real-world solutions over the past few years. It shows promising results in addressing the data security and privacy issues present in the traditional centralized machine learning approach. Even though federated learning makes certain of data privacy for each contributing user, the global model and the data are still vulnerable to attacks by compromised clients and servers. Additionally, in the settings for non-independent identical data (Non-IID), federated learning performs significantly less compared to the standard centralized learning mode. To address both the security and performance issues, this paper proposes a blockchain-enabled gossip federated learning framework (BGFL). BGFL replaces the central server with a blockchain-enabled system for global model storage and exchange. Also, to achieve faster training convergence, clients communicate with each other based on a gossip training approach. Then, to evaluate the performance we perform experiments using MNIST and CIFAR datasets in Non-IID settings. The performance and effectiveness of the BGFL framework is demonstrated by the experimental results.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130563111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.1109/ICNWC57852.2023.10127244
Ambika S Rao, R. Anilkumar, K. Padmapriya, K. Sudeendra Kumar
Commercial-grade electronic components are finding their way into spacecrafts intended for low-orbit applications due to their low cost and ease of availability. However, being susceptible to a variety of disturbances like radiation upsets, they are not as reliable as radiation-hardened space-grade components. Reliability of these components can be improved using design techniques for fault detection that allows for subsequent correction through hardware or software. In this paper, a fault monitoring mechanism is introduced to improve the reliability of an Embedded RISC-V System-on-Chip (SoC) intended for low-cost space applications. This mechanism alerts the system of potential faults induced by upsets in space environment and allows for recovery. Implementation of the mechanism is done in an ASIC with 180nm commercial foundry libraries, but the design can also be ported to SRAM-based FPGAs.
{"title":"Improving Reliability of Embedded RISC-V SoC for Low-cost Space Applications","authors":"Ambika S Rao, R. Anilkumar, K. Padmapriya, K. Sudeendra Kumar","doi":"10.1109/ICNWC57852.2023.10127244","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127244","url":null,"abstract":"Commercial-grade electronic components are finding their way into spacecrafts intended for low-orbit applications due to their low cost and ease of availability. However, being susceptible to a variety of disturbances like radiation upsets, they are not as reliable as radiation-hardened space-grade components. Reliability of these components can be improved using design techniques for fault detection that allows for subsequent correction through hardware or software. In this paper, a fault monitoring mechanism is introduced to improve the reliability of an Embedded RISC-V System-on-Chip (SoC) intended for low-cost space applications. This mechanism alerts the system of potential faults induced by upsets in space environment and allows for recovery. Implementation of the mechanism is done in an ASIC with 180nm commercial foundry libraries, but the design can also be ported to SRAM-based FPGAs.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129824024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.1109/ICNWC57852.2023.10127409
Arbind Lochan Mishra, Harsh Srivastava, Hemamalini V
The domain is the primary focus of this project (Web Application Development). In India, it is difficult for women to report the issues they are having because it either takes a long time to document them and convey them to the appropriate authority or because of cultural pressure. In order to solve their issue by presenting complaints to the appropriate authority immediately, a web application is suggested. It has a complaint module that enables women to report emergencies so that authorities can be dispatched to those who need assistance. It is an interface for registering complaints and following them up. The main problem statement tried to be worked upon is the fact that when women want to register any grievance they are not able to do so because of various reasons out of which two stand out as the most common. The way to reach the authorities responsible to take action is way too long and time-consuming and this discourages them to go ahead with it as they’re unsure of even being heard or what the outcome of the situation might be even after spending a long time and effort for the same. The other factor is the fear of being judged by the society which is one of the leading factors as to why women do not go ahead with reporting their grievances. This has been overcome by our solution by having only end-to-end access to the data/complaints between the user and the admin and ensuring secrecy.
{"title":"Panchi: A women’s security app","authors":"Arbind Lochan Mishra, Harsh Srivastava, Hemamalini V","doi":"10.1109/ICNWC57852.2023.10127409","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127409","url":null,"abstract":"The domain is the primary focus of this project (Web Application Development). In India, it is difficult for women to report the issues they are having because it either takes a long time to document them and convey them to the appropriate authority or because of cultural pressure. In order to solve their issue by presenting complaints to the appropriate authority immediately, a web application is suggested. It has a complaint module that enables women to report emergencies so that authorities can be dispatched to those who need assistance. It is an interface for registering complaints and following them up. The main problem statement tried to be worked upon is the fact that when women want to register any grievance they are not able to do so because of various reasons out of which two stand out as the most common. The way to reach the authorities responsible to take action is way too long and time-consuming and this discourages them to go ahead with it as they’re unsure of even being heard or what the outcome of the situation might be even after spending a long time and effort for the same. The other factor is the fear of being judged by the society which is one of the leading factors as to why women do not go ahead with reporting their grievances. This has been overcome by our solution by having only end-to-end access to the data/complaints between the user and the admin and ensuring secrecy.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130932306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.1109/ICNWC57852.2023.10127408
Jeyakanth Krishnan, Venkatakrishnan Perumalsamy, C. Chinnasamy, Dhivya Udhayasuriyan
In this research work, an evolutionary development approach is introduced for channel assignment in CRNs. These approaches are divine by some kind of adoptive development approach. In this proposed methodology, we utilized PSO with DE technique. It effectively maximize the throughput of CN while gratifying interference constraints of both primary and secondary users in network. It also solves the joint spectrum and power allocation problem in CRNs. In addition, a repair process is involved to ignore conflicts with secondary users to enhance spectrum in CRNs. The resulting algorithm is known as Hybridization of Differential Evolution based Particle Swarm optimization with repair process (HoDEPSO-RP). The performance analysis of this proposed HoDEPSO-RP is estimated by simulation techniques. This proposed work provides better performance result when compared with other existing algorithms.
{"title":"Spectrum and Power Allocation Scheme Using HoDEPSO-RP Approach for Cognitive Radio Network","authors":"Jeyakanth Krishnan, Venkatakrishnan Perumalsamy, C. Chinnasamy, Dhivya Udhayasuriyan","doi":"10.1109/ICNWC57852.2023.10127408","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127408","url":null,"abstract":"In this research work, an evolutionary development approach is introduced for channel assignment in CRNs. These approaches are divine by some kind of adoptive development approach. In this proposed methodology, we utilized PSO with DE technique. It effectively maximize the throughput of CN while gratifying interference constraints of both primary and secondary users in network. It also solves the joint spectrum and power allocation problem in CRNs. In addition, a repair process is involved to ignore conflicts with secondary users to enhance spectrum in CRNs. The resulting algorithm is known as Hybridization of Differential Evolution based Particle Swarm optimization with repair process (HoDEPSO-RP). The performance analysis of this proposed HoDEPSO-RP is estimated by simulation techniques. This proposed work provides better performance result when compared with other existing algorithms.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122472666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.1109/ICNWC57852.2023.10127520
N. Neeraj, Aditya Nellikeri, P. Varun, Santosh Reddy, Mangesh Shanbhag, Dg Narayan, Altaf Husain
With the advancement of cloud computing technologies, it is necessary to maintain quality of service, for which service level agreements (SLAs) are one of the ways to improve this. A significant part of revenue will be contributed by the use of on demand resources (compute, network or storage) provided by this cloud service providers (CSP). Service level agreement (SLA) plays a key role in maintaining quality of services (QoS) of these on demand resources. The CSP enforces the SLA, by utilizing machine-generated logs to monitor machine performance. Additionally, some consumers may monitor resource performance themselves to ensure it meets their standards. This approach not only leads to traction between both CSP and cloud service consumers (CSC), but also leads to a duplication of the effort. The aim of this work is to create a system that is distributed in nature and could be trusted by both CSP and the consumer. The paper provides solution using a public blockchain and log based algorithm that evaluates resource performance based on several SLA criteria accepted by the CSP and consumers. If the system’s performance falls below a certain level, the CSC will be intimated through logs. This motivates the consumer to spend more money on the resources and compels the CSP to keep the number of SLA violations to a minimal. A web application with a blockchain as the back-end is used to monitor SLA violations and the compensation procedure. Finally, a multi-node ethereum blockchain network is used to conduct a performance analysis of the suggested solution.
{"title":"Service Level Agreement Violation Detection in Multi-cloud Environment using Ethereum Blockchain","authors":"N. Neeraj, Aditya Nellikeri, P. Varun, Santosh Reddy, Mangesh Shanbhag, Dg Narayan, Altaf Husain","doi":"10.1109/ICNWC57852.2023.10127520","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127520","url":null,"abstract":"With the advancement of cloud computing technologies, it is necessary to maintain quality of service, for which service level agreements (SLAs) are one of the ways to improve this. A significant part of revenue will be contributed by the use of on demand resources (compute, network or storage) provided by this cloud service providers (CSP). Service level agreement (SLA) plays a key role in maintaining quality of services (QoS) of these on demand resources. The CSP enforces the SLA, by utilizing machine-generated logs to monitor machine performance. Additionally, some consumers may monitor resource performance themselves to ensure it meets their standards. This approach not only leads to traction between both CSP and cloud service consumers (CSC), but also leads to a duplication of the effort. The aim of this work is to create a system that is distributed in nature and could be trusted by both CSP and the consumer. The paper provides solution using a public blockchain and log based algorithm that evaluates resource performance based on several SLA criteria accepted by the CSP and consumers. If the system’s performance falls below a certain level, the CSC will be intimated through logs. This motivates the consumer to spend more money on the resources and compels the CSP to keep the number of SLA violations to a minimal. A web application with a blockchain as the back-end is used to monitor SLA violations and the compensation procedure. Finally, a multi-node ethereum blockchain network is used to conduct a performance analysis of the suggested solution.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122906766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.1109/ICNWC57852.2023.10127259
Ms.S.Anitha Jebamani, M. Ragavi, K. Nivetha.
The direct link between computer systems and the human brain is known as a “brain computer interface,” or BCI. The BCI reads the waves composed of the brain at exclusive places inside the human head, translates those indicators into movements and instructions,which can control the computer systems. We endorse combining this generation with home automation. This interface device is especially helpful for people who are severely disabled or confined and lack reliable muscular control over the parts of their bodies that are engaged with surrounding peripherals. The machine entails two components: an EEG sensor circuit and Arduino microcontroller board. The mind waves are captured using electrodes. These indicators are filtered and amplified to take away noise. These analog signs are converted to digital. The digital alerts are decoded and are used to exchange on a device
{"title":"Biometric Recognition Using EEG Signals And Controlling The Electrical Devices","authors":"Ms.S.Anitha Jebamani, M. Ragavi, K. Nivetha.","doi":"10.1109/ICNWC57852.2023.10127259","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127259","url":null,"abstract":"The direct link between computer systems and the human brain is known as a “brain computer interface,” or BCI. The BCI reads the waves composed of the brain at exclusive places inside the human head, translates those indicators into movements and instructions,which can control the computer systems. We endorse combining this generation with home automation. This interface device is especially helpful for people who are severely disabled or confined and lack reliable muscular control over the parts of their bodies that are engaged with surrounding peripherals. The machine entails two components: an EEG sensor circuit and Arduino microcontroller board. The mind waves are captured using electrodes. These indicators are filtered and amplified to take away noise. These analog signs are converted to digital. The digital alerts are decoded and are used to exchange on a device","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123452587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.1109/ICNWC57852.2023.10127514
Mayank Singh, Vrushal Nedungadi, R. Radhika
Many positive outcomes may be attributed to the development of technology. Because of technological advancements, it is now possible to greatly simplify most human activities. The same holds for cybercriminals who, among other things, aim to get into user accounts to steal private data for their ends. Even though technological advancements are unquestionably beneficial, it is our responsibility as consumers to take all necessary precautions to safeguard our data. Various safeguards are at our disposal. The security of any given system, however, is always at risk. All of our efforts are focused on reducing the likelihood of a security breach. A textual and graphical password paradigm[1] is used for authentication here. We have settled on this framework because humans are naturally visual beings, and we think that by using a cued-recall and recognition-based strategy, we may improve a system’s defences. A password having an entropy[5] of 60 and above is said to be a strong password. This scheme of passwords once put through rigorous testing can prove to be a very good alternative to the multi-factor authentication that would require the user to wait for an OTP or some other hassle. Our approach looks to mitigate all the hassles encountered throughout the process and looks to propose a hassle-free gateway for the authentication of users. This approach helps in creating passwords having a password entropy close to 89, which is considered to be a strong password.
{"title":"A Hybrid Textual-Graphical Password Authentication System With Enhanced Security","authors":"Mayank Singh, Vrushal Nedungadi, R. Radhika","doi":"10.1109/ICNWC57852.2023.10127514","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127514","url":null,"abstract":"Many positive outcomes may be attributed to the development of technology. Because of technological advancements, it is now possible to greatly simplify most human activities. The same holds for cybercriminals who, among other things, aim to get into user accounts to steal private data for their ends. Even though technological advancements are unquestionably beneficial, it is our responsibility as consumers to take all necessary precautions to safeguard our data. Various safeguards are at our disposal. The security of any given system, however, is always at risk. All of our efforts are focused on reducing the likelihood of a security breach. A textual and graphical password paradigm[1] is used for authentication here. We have settled on this framework because humans are naturally visual beings, and we think that by using a cued-recall and recognition-based strategy, we may improve a system’s defences. A password having an entropy[5] of 60 and above is said to be a strong password. This scheme of passwords once put through rigorous testing can prove to be a very good alternative to the multi-factor authentication that would require the user to wait for an OTP or some other hassle. Our approach looks to mitigate all the hassles encountered throughout the process and looks to propose a hassle-free gateway for the authentication of users. This approach helps in creating passwords having a password entropy close to 89, which is considered to be a strong password.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123883143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.1109/ICNWC57852.2023.10127460
M. Meenakshi, P. Shyam Babu, V. Hemamalini
Social media allows people to exchange their views on different topics. However, some users post offensive comments on social media, which is known as cyberbullying, and some scam users by posting fake links in the comment section which adversely affects the user experience on those platforms. Thus regulation of contents in social media has become a growing need. The metrics for the regulations can be achieved by detecting these comments using deep learning techniques and machine learning algorithms Gaussian Naive Bayes, Logistic regression, Decision tree classifier, Adaboost classifier, Random forest classifier, MBERT and BERT, Gaussian Naive Bayes, Logistic Regression for cyberbullying and spamming respectively.This paper aims at detecting cyberbullying and spamming with the help of the techniques mentioned above for spamming and cyberbullying detection in English and Tanglish. Furthermore, it compares a number of supervised techniques, including standard and ensemble methods. Ensemble supervised methods have the capability to outperform conventional supervised methods, according to the evaluation of the results. The fine tuned classification BERT model (Bidirectional Encoder Representations from Transformers) and MBERT(Multilingual BERT) are based on Transformers, are used for cyberbullying detection and machine learning algorithms which include Gaussian Naive Bayes and Logistic regression have been used for spam detection. We do a comparative study between deep learning and machine learning algorithms. Compared to machine learning algorithms, deep learning algorithm BERT performed better at detecting spamming comments.
{"title":"Deep Learning Techniques For Spamming And Cyberbullying Detection","authors":"M. Meenakshi, P. Shyam Babu, V. Hemamalini","doi":"10.1109/ICNWC57852.2023.10127460","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127460","url":null,"abstract":"Social media allows people to exchange their views on different topics. However, some users post offensive comments on social media, which is known as cyberbullying, and some scam users by posting fake links in the comment section which adversely affects the user experience on those platforms. Thus regulation of contents in social media has become a growing need. The metrics for the regulations can be achieved by detecting these comments using deep learning techniques and machine learning algorithms Gaussian Naive Bayes, Logistic regression, Decision tree classifier, Adaboost classifier, Random forest classifier, MBERT and BERT, Gaussian Naive Bayes, Logistic Regression for cyberbullying and spamming respectively.This paper aims at detecting cyberbullying and spamming with the help of the techniques mentioned above for spamming and cyberbullying detection in English and Tanglish. Furthermore, it compares a number of supervised techniques, including standard and ensemble methods. Ensemble supervised methods have the capability to outperform conventional supervised methods, according to the evaluation of the results. The fine tuned classification BERT model (Bidirectional Encoder Representations from Transformers) and MBERT(Multilingual BERT) are based on Transformers, are used for cyberbullying detection and machine learning algorithms which include Gaussian Naive Bayes and Logistic regression have been used for spam detection. We do a comparative study between deep learning and machine learning algorithms. Compared to machine learning algorithms, deep learning algorithm BERT performed better at detecting spamming comments.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128573698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.1109/ICNWC57852.2023.10127425
Shanthi D Sorna, B. Bhuvaneswaran, Adhithya R Manoj, S. Pooja
The Art and Heritage has been an integral part of our Indian Culture. These art forms and heritage are left unnoticed just because they are very much away. Therefore these sites can be brought back to life in any environment. The heritage properties of art and craft of India can be brought to life from anywhere by using an AR application on the phone. There are times when people visit the monuments and they are in need of a third party to show them the main attractions of the monument. Instead of relying on a third party, this can be done using this app where an AR marker appears on important tourist spots. The software that are used are Unity, Blender, Python and Visual Studio for C#. The software development kit used are Vuforia AR SDK and Mapbox SDK.The software that are used are Unity, Blender, Python and Visual Studio for C#. The software development kit used are Vuforia AR SDK and Mapbox SDK
艺术和遗产一直是我们印度文化不可分割的一部分。这些艺术形式和遗产之所以被忽视,只是因为它们离我们很远。因此,这些场所可以在任何环境中恢复生机。通过使用手机上的AR应用程序,印度的艺术和工艺遗产可以在任何地方被赋予生命。有时,当人们参观纪念碑时,他们需要第三方向他们展示纪念碑的主要景点。而不是依赖于第三方,这可以使用这个应用程序,在重要的旅游景点出现一个AR标记。使用的软件是Unity、Blender、Python和Visual Studio c#。使用的软件开发工具包为Vuforia AR SDK和Mapbox SDK。使用的软件是Unity、Blender、Python和Visual Studio c#。使用的软件开发工具包为Vuforia AR SDK和Mapbox SDK
{"title":"MonuAR:M.A.R Application for Visualising 3D Monuments","authors":"Shanthi D Sorna, B. Bhuvaneswaran, Adhithya R Manoj, S. Pooja","doi":"10.1109/ICNWC57852.2023.10127425","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127425","url":null,"abstract":"The Art and Heritage has been an integral part of our Indian Culture. These art forms and heritage are left unnoticed just because they are very much away. Therefore these sites can be brought back to life in any environment. The heritage properties of art and craft of India can be brought to life from anywhere by using an AR application on the phone. There are times when people visit the monuments and they are in need of a third party to show them the main attractions of the monument. Instead of relying on a third party, this can be done using this app where an AR marker appears on important tourist spots. The software that are used are Unity, Blender, Python and Visual Studio for C#. The software development kit used are Vuforia AR SDK and Mapbox SDK.The software that are used are Unity, Blender, Python and Visual Studio for C#. The software development kit used are Vuforia AR SDK and Mapbox SDK","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.1109/ICNWC57852.2023.10127489
J. N. Niranjan Prasad, R. N. Nirmal Kumar, A. Nirmal Kishore, Madhumitha Jayaram
This paper presents the design and analysis of wideband 5G antenna intended for autonomous vehicle applications. The antenna design with Tesla geometry has been proposed, which is known for its gain and wide-angle radiation pattern. The design process includes the optimization of the antenna parameters, such as the dimensions of the radiator, the ground plane, and the feed location. The antenna has been simulated using CST software, and the results show that it has a gain of 4.5 dB, wider bandwidth of 2. 442GHz, and an operational frequency of 29.2 GHz.
{"title":"Tesla-geometry based wideband 5G antenna for V2V applications","authors":"J. N. Niranjan Prasad, R. N. Nirmal Kumar, A. Nirmal Kishore, Madhumitha Jayaram","doi":"10.1109/ICNWC57852.2023.10127489","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127489","url":null,"abstract":"This paper presents the design and analysis of wideband 5G antenna intended for autonomous vehicle applications. The antenna design with Tesla geometry has been proposed, which is known for its gain and wide-angle radiation pattern. The design process includes the optimization of the antenna parameters, such as the dimensions of the radiator, the ground plane, and the feed location. The antenna has been simulated using CST software, and the results show that it has a gain of 4.5 dB, wider bandwidth of 2. 442GHz, and an operational frequency of 29.2 GHz.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115365036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}