首页 > 最新文献

2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)最新文献

英文 中文
IoT-based Automated Pond Water Quality Monitoring System for Aquaculture Farms 基于物联网的水产养殖场池塘水质自动监测系统
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00050
A. Menon, M. Prabhakar
Owing to the modern-day development in agricultural and aquacultural fields of a country, there has been a great need for the automation of various tasks associated with these fields for obtaining maximum progress. The proposed Internet of Things (IoT) based System in this paper works on Arduino development board and its sensors for obtaining a real-time cost-effective monitoring system. The data is gathered from each section of the pond at a timed interval for accurate results and sent as a Short Message Service (SMS) using a Global System for Mobile Communications (GSM) module to the culturist's mobile. The SMS will include details of all the parameters analysed at each section of the pond at that particular interval of time as well as the warning specifying values of parameters exceeding the permissible levels. The System is provided power using Solar Panel of suitable voltage to ensure that device does not require manual charging. Information exchange between the system and user is based on GSM technology due to the unavailability of efficient and fast Wireless Network access in remote regions. Hence automation of the system's data collection and maintenance is made possible. This system provides real-time notifications to the culturist and helps in preventing the pond parameters from fluctuating to a dangerous level that affects the mortality rate of the organism. The parameter levels may now be controlled as quickly as possible thereby reducing stress on the organism's environment and its effects on the organism's growth rate.
由于一个国家农业和水产养殖领域的现代发展,为了取得最大的进步,非常需要与这些领域相关的各种任务的自动化。本文提出的基于物联网(IoT)的系统工作在Arduino开发板及其传感器上,以获得一个具有成本效益的实时监控系统。为了获得准确的结果,数据在一定的时间间隔内从池塘的每个部分收集,并使用全球移动通信系统(GSM)模块作为短消息服务(SMS)发送到培养师的手机上。SMS将包括在该特定时间间隔内在池塘的每个部分分析的所有参数的详细信息,以及指定参数超过允许水平的警告值。系统使用合适电压的太阳能电池板供电,以确保设备不需要手动充电。由于偏远地区无法获得高效、快速的无线网络接入,系统与用户之间的信息交换基于GSM技术。因此,系统数据收集和维护的自动化成为可能。该系统向培养人员提供实时通知,并有助于防止池塘参数波动到影响生物体死亡率的危险水平。现在可以尽可能快地控制参数水平,从而减少对生物体环境的压力及其对生物体生长速度的影响。
{"title":"IoT-based Automated Pond Water Quality Monitoring System for Aquaculture Farms","authors":"A. Menon, M. Prabhakar","doi":"10.1109/INDIACom51348.2021.00050","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00050","url":null,"abstract":"Owing to the modern-day development in agricultural and aquacultural fields of a country, there has been a great need for the automation of various tasks associated with these fields for obtaining maximum progress. The proposed Internet of Things (IoT) based System in this paper works on Arduino development board and its sensors for obtaining a real-time cost-effective monitoring system. The data is gathered from each section of the pond at a timed interval for accurate results and sent as a Short Message Service (SMS) using a Global System for Mobile Communications (GSM) module to the culturist's mobile. The SMS will include details of all the parameters analysed at each section of the pond at that particular interval of time as well as the warning specifying values of parameters exceeding the permissible levels. The System is provided power using Solar Panel of suitable voltage to ensure that device does not require manual charging. Information exchange between the system and user is based on GSM technology due to the unavailability of efficient and fast Wireless Network access in remote regions. Hence automation of the system's data collection and maintenance is made possible. This system provides real-time notifications to the culturist and helps in preventing the pond parameters from fluctuating to a dangerous level that affects the mortality rate of the organism. The parameter levels may now be controlled as quickly as possible thereby reducing stress on the organism's environment and its effects on the organism's growth rate.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122093014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Underwater Acoustic Pressure Sensing using Optical Fiber Bragg Grating 基于光纤布拉格光栅的水声压力传感
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00103
Hareesh Kumar, A. Sharan, M. SreeRangaRaju
A large amount of untapped resources lies underwater, which covers almost 70% of the surface of the earth. Therefore, there is a need to monitor the underwater behavior and operations occurring inside seawater by developing a robust and mature technology. Acoustic signals are capable of long-range detection with significantly less latency (due to underwater speed of sound). This paper presents the designing and simulation of an Optical Fiber Bragg Grating (OFBG) sensor. OFBG has properties such as immunity to electromagnetic interference, remote sensing, stability in harsh environments. OFBG sensors are in use in an environment where conventional sensors are unsuitable because of the capabilities such as multiplexing, high sensitivity, and wide dynamic range. Mostly the OFBG sensor is in use to measure pressure, stress, and strain change by observing a shift in Bragg's wavelength caused by natural calamity, presence of a variety of aquatic creatures, and anti-submarine movements. GratingMOD design tool is in use for analyzing and synthesizing complicated grating profiles. During the simulation, the highest-pressure variation considered is 39.81 MPa (undersea earthquake) to lowest 0.56KPa (Right Whale) to observe strain and stress on the sensor. The underwater activity created stress/strain resulting in Bragg's wavelength shift towards the Direction of Arrival (DOA) of the acoustic signal. The recorded wavelength change for Undersea Earthquake is 1560.86241(nm), Right Whale is 1550.000153(nm).
水下有大量未开发的资源,几乎覆盖了地球表面的70%。因此,需要开发一种强大而成熟的技术来监测海水中的水下行为和作业。声信号能够以明显更少的延迟进行远距离探测(由于水下声速)。本文介绍了一种光纤光栅传感器的设计与仿真。OFBG具有抗电磁干扰、遥感、恶劣环境稳定性等特性。OFBG传感器由于具有多路复用、高灵敏度和宽动态范围等特性,在传统传感器不适合的环境中使用。OFBG传感器主要用于测量压力、应力和应变变化,通过观察由自然灾害、各种水生生物的存在和反潜运动引起的布拉格波长的变化。GratingMOD设计工具用于分析和合成复杂的光栅轮廓。在模拟过程中,考虑的最高压力变化为39.81 MPa(海底地震)至最低0.56KPa(露脊鲸),以观察传感器上的应变和应力。水下活动产生应力/应变,导致布拉格波长向声信号的到达方向(DOA)移动。海底地震记录的波长变化为1560.86241(nm),露脊鲸记录的波长变化为1550.000153(nm)。
{"title":"Underwater Acoustic Pressure Sensing using Optical Fiber Bragg Grating","authors":"Hareesh Kumar, A. Sharan, M. SreeRangaRaju","doi":"10.1109/INDIACom51348.2021.00103","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00103","url":null,"abstract":"A large amount of untapped resources lies underwater, which covers almost 70% of the surface of the earth. Therefore, there is a need to monitor the underwater behavior and operations occurring inside seawater by developing a robust and mature technology. Acoustic signals are capable of long-range detection with significantly less latency (due to underwater speed of sound). This paper presents the designing and simulation of an Optical Fiber Bragg Grating (OFBG) sensor. OFBG has properties such as immunity to electromagnetic interference, remote sensing, stability in harsh environments. OFBG sensors are in use in an environment where conventional sensors are unsuitable because of the capabilities such as multiplexing, high sensitivity, and wide dynamic range. Mostly the OFBG sensor is in use to measure pressure, stress, and strain change by observing a shift in Bragg's wavelength caused by natural calamity, presence of a variety of aquatic creatures, and anti-submarine movements. GratingMOD design tool is in use for analyzing and synthesizing complicated grating profiles. During the simulation, the highest-pressure variation considered is 39.81 MPa (undersea earthquake) to lowest 0.56KPa (Right Whale) to observe strain and stress on the sensor. The underwater activity created stress/strain resulting in Bragg's wavelength shift towards the Direction of Arrival (DOA) of the acoustic signal. The recorded wavelength change for Undersea Earthquake is 1560.86241(nm), Right Whale is 1550.000153(nm).","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardware and Software Solution for Preserving Privacy of Mobile Devices and their Applications 保护移动设备及其应用程序隐私的硬件和软件解决方案
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00069
Abdullah M. Basahel, Adnan Ahmed Abi Sen, Mohammad Yamin, N. Bahbouh
Smartphones have become one of the basic necessities for everyday life. People spend a lot of their time on smartphones to browse the internet, chat, listen to music, play games, watch movies, and even do job related processing. One of the most important challenges and problems of smartphones is protecting the privacy of users. As we know, we now have billions of applications, many of which attract a large number of malicious applications that can monitor mobile phone users and discover a lot of their sensitive and confidential information. This research proposes a minor modification in the design of the software and hardware of smart phones, to ensure stronger protection for the user from any malicious application, even from the manufacturer of the device. The idea is based on building a physical lockout mechanism for some of the sensored devices, such as the camera and microphone, in addition to relaying alerts, and forcing user to accept requests before accessing any information. Acceptance of user requests is forced by overriding predefined permissions, which are usually difficult to track and manage. The research also provides an overview of a specialized platform which can easily assess the credibility of applications which exhibit strange behavior. We provide the details of the method, with simulation, for realising the suggested ideas into practice. We also discuss the benefits of the proposed improvements in the level of privacy and security, compared to the current situation.
智能手机已经成为日常生活的基本必需品之一。人们花很多时间在智能手机上浏览互联网、聊天、听音乐、玩游戏、看电影,甚至做与工作相关的处理工作。智能手机最重要的挑战和问题之一是保护用户的隐私。众所周知,我们现在拥有数十亿的应用程序,其中许多应用程序吸引了大量恶意应用程序,这些恶意应用程序可以监视手机用户并发现他们的大量敏感和机密信息。本研究提出对智能手机的软件和硬件设计进行微小的修改,以确保更强的保护用户免受任何恶意应用,甚至来自设备制造商的恶意应用。这个想法是基于为一些被检测设备(如摄像头和麦克风)建立一个物理锁定机制,除了中继警报,并迫使用户在访问任何信息之前接受请求。通过重写预定义的权限强制接受用户请求,这些权限通常难以跟踪和管理。该研究还概述了一个专门的平台,该平台可以轻松评估表现出奇怪行为的应用程序的可信度。我们提供了该方法的细节,并进行了仿真,以便将建议的想法付诸实践。我们还讨论了与当前情况相比,在隐私和安全级别上提出的改进的好处。
{"title":"Hardware and Software Solution for Preserving Privacy of Mobile Devices and their Applications","authors":"Abdullah M. Basahel, Adnan Ahmed Abi Sen, Mohammad Yamin, N. Bahbouh","doi":"10.1109/INDIACom51348.2021.00069","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00069","url":null,"abstract":"Smartphones have become one of the basic necessities for everyday life. People spend a lot of their time on smartphones to browse the internet, chat, listen to music, play games, watch movies, and even do job related processing. One of the most important challenges and problems of smartphones is protecting the privacy of users. As we know, we now have billions of applications, many of which attract a large number of malicious applications that can monitor mobile phone users and discover a lot of their sensitive and confidential information. This research proposes a minor modification in the design of the software and hardware of smart phones, to ensure stronger protection for the user from any malicious application, even from the manufacturer of the device. The idea is based on building a physical lockout mechanism for some of the sensored devices, such as the camera and microphone, in addition to relaying alerts, and forcing user to accept requests before accessing any information. Acceptance of user requests is forced by overriding predefined permissions, which are usually difficult to track and manage. The research also provides an overview of a specialized platform which can easily assess the credibility of applications which exhibit strange behavior. We provide the details of the method, with simulation, for realising the suggested ideas into practice. We also discuss the benefits of the proposed improvements in the level of privacy and security, compared to the current situation.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127213935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Creating Domain based Dictionary and its Evaluation using Classification Accuracy 基于领域的词典创建及其分类精度评价
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00059
Mansi Sood, Harmeet Kaur, Jaya Gera
This paper creates a domain-based dictionary for different categories in the news domain. It extracts terms - unigrams and collocations (specifically bigrams and trigrams) to construct the dictionary. The created dictionary is then used to classify unseen news data. The paper studies how variation in two parameters - (i) occurrence frequency of extracted terms and (ii) window size of extracted bigrams impact the dictionary size and the classification accuracy. Subsequently, dictionary size and classification accuracy are analyzed by creating dictionaries comprising of just unigrams, bigrams, trigrams, or their combinations. A reasonably sized and accurate dictionary can be created using just bigrams. The inclusion of trigrams to the dictionary accounts for a slight accuracy gain. Including both unigrams and bigrams in the dictionary can achieve a high accuracy score with a significantly smaller dictionary size than adding just unigrams or bigrams to the dictionary. Also, the trio combination adding unigrams, bigrams, and trigrams to the dictionary does not lead to a significant increase in accuracy. These observations will help in creating a meaningful and compact dictionary.
本文针对新闻领域的不同类别,建立了一个基于领域的词典。它提取单字组和搭配(特别是双字组和三元组)来构造字典。然后使用创建的字典对未见过的新闻数据进行分类。本文研究了两个参数的变化——(i)提取词的出现频率和(ii)提取双元图的窗口大小对字典大小和分类精度的影响。随后,通过创建仅由单字母、双字母、三字母或其组合组成的字典来分析字典的大小和分类准确性。只需使用双引号就可以创建一个大小合理且准确的字典。将三元组包含到字典中可以略微提高准确性。在字典中同时包含unigrams和bigrams可以获得更高的准确率,并且字典的大小比只添加unigrams或bigrams要小得多。此外,向字典中添加单字母、双字母和三字母的组合也不会显著提高准确性。这些观察将有助于创建一个有意义和紧凑的字典。
{"title":"Creating Domain based Dictionary and its Evaluation using Classification Accuracy","authors":"Mansi Sood, Harmeet Kaur, Jaya Gera","doi":"10.1109/INDIACom51348.2021.00059","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00059","url":null,"abstract":"This paper creates a domain-based dictionary for different categories in the news domain. It extracts terms - unigrams and collocations (specifically bigrams and trigrams) to construct the dictionary. The created dictionary is then used to classify unseen news data. The paper studies how variation in two parameters - (i) occurrence frequency of extracted terms and (ii) window size of extracted bigrams impact the dictionary size and the classification accuracy. Subsequently, dictionary size and classification accuracy are analyzed by creating dictionaries comprising of just unigrams, bigrams, trigrams, or their combinations. A reasonably sized and accurate dictionary can be created using just bigrams. The inclusion of trigrams to the dictionary accounts for a slight accuracy gain. Including both unigrams and bigrams in the dictionary can achieve a high accuracy score with a significantly smaller dictionary size than adding just unigrams or bigrams to the dictionary. Also, the trio combination adding unigrams, bigrams, and trigrams to the dictionary does not lead to a significant increase in accuracy. These observations will help in creating a meaningful and compact dictionary.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Emphasis on Evaluative Prerequisites for Decisive Software-in-the-Loop (SiL) Environments 强调决定性软件在环(SiL)环境的评估先决条件
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00080
Kushal Koppa Shivanandaswamy, Chandrima Sarkar, Sivakumar Rajagopal, Lakkappa Pisutre Ramachandra, Chiranjeevi Manchasandra Chayakumar
Recent trends in virtualization have shown significant desideratum, for the simulations to be performed using credible SiL environments. The SiL environment is a plausible approach, which is decisive in verifying the complex control algorithms, embedded into various automotive ECUs. Major challenges would be associated with the approaches, processes, and manipulation of risks, in the course of the development of credible SiL environments. The need for a competent mitigation plan is required, which might postulate a paradigm shift in the software development processes. This is quintessentially required for the development of an effective, reliable, and credible SiL environment. With different approaches and processes, currently, for different SiL environments, created using different tools, from different vendors, emphasis on the evaluation of the standard set of prerequisites is very much necessary. The evaluation provides technical clarity and aids in the process of vECU generation, with a significant impact on the implementation of a credible SiL environment. This decisive SiL environment thus enables verifying & validating the vECU behavior and performance. In this paper, we provide insights into the evaluative prerequisites, considered before the creation of the SiL environment. The evaluation of these prerequisites is imperative in identifying and selecting the software components and evaluating its available information, integrated as part of vECU. With the help of use-cases, we try to highlight and emphasize the imperative prerequisites, evaluated, and the need for its evaluation, in creating a credible SiL environment.
最近的虚拟化趋势显示出对使用可信的SiL环境执行模拟的强烈需求。SiL环境是一种可行的方法,对于验证嵌入到各种汽车ecu中的复杂控制算法具有决定性作用。在可信的SiL环境的开发过程中,主要的挑战将与方法、过程和风险操作相关。需要一个合格的缓解计划,这可能需要软件开发过程中的范式转变。这是开发有效、可靠和可信的SiL环境所必需的。目前,对于使用来自不同供应商的不同工具创建的不同SiL环境,使用不同的方法和过程,强调对先决条件标准集的评估是非常必要的。该评估为vECU生成过程提供了技术清晰度和辅助,对可靠的SiL环境的实现具有重要影响。因此,这种决定性的SiL环境能够验证和确认vECU的行为和性能。在本文中,我们将深入了解在创建SiL环境之前考虑的评估先决条件。在识别和选择软件组件以及评估其可用信息(作为vECU的一部分集成)时,对这些先决条件的评估是必不可少的。在用例的帮助下,我们在创建可靠的SiL环境时,尝试突出和强调必要的先决条件、评估和对其评估的需求。
{"title":"Emphasis on Evaluative Prerequisites for Decisive Software-in-the-Loop (SiL) Environments","authors":"Kushal Koppa Shivanandaswamy, Chandrima Sarkar, Sivakumar Rajagopal, Lakkappa Pisutre Ramachandra, Chiranjeevi Manchasandra Chayakumar","doi":"10.1109/INDIACom51348.2021.00080","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00080","url":null,"abstract":"Recent trends in virtualization have shown significant desideratum, for the simulations to be performed using credible SiL environments. The SiL environment is a plausible approach, which is decisive in verifying the complex control algorithms, embedded into various automotive ECUs. Major challenges would be associated with the approaches, processes, and manipulation of risks, in the course of the development of credible SiL environments. The need for a competent mitigation plan is required, which might postulate a paradigm shift in the software development processes. This is quintessentially required for the development of an effective, reliable, and credible SiL environment. With different approaches and processes, currently, for different SiL environments, created using different tools, from different vendors, emphasis on the evaluation of the standard set of prerequisites is very much necessary. The evaluation provides technical clarity and aids in the process of vECU generation, with a significant impact on the implementation of a credible SiL environment. This decisive SiL environment thus enables verifying & validating the vECU behavior and performance. In this paper, we provide insights into the evaluative prerequisites, considered before the creation of the SiL environment. The evaluation of these prerequisites is imperative in identifying and selecting the software components and evaluating its available information, integrated as part of vECU. With the help of use-cases, we try to highlight and emphasize the imperative prerequisites, evaluated, and the need for its evaluation, in creating a credible SiL environment.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127581553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Denial of Service Attack Detection using Deep Learning Approaches 使用深度学习方法的分布式拒绝服务攻击检测
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00087
Meenakshi, Krishan Kumar, Sunny Behal
In this paper, the Deep Learning based approaches (Convolutional Neural Network and variants of Recurrent Neural Networks, i.e. Long Short-Term Memory, Bidirectional Long Short-Term Memory, Stacked Long Short-Term Memory and Gated Recurrent Units) have been used to detect Distributed Denial of Service (DDoS) attacks. The Deep Learning approaches have been evaluated using the Portmap.csv file of recent DDoS dataset, i.e. CICDDoS2019. Before giving input to the Deep Learning approaches, the data is pre-processed. The Deep Learning approaches are trained and tested using the pre-processed dataset. The reporting results show that RNN based Stacked-LSTM Deep Learning approach produces the best results in detecting Portmap DDoS attack in comparison to other Deep Learning based algorithms.
在本文中,基于深度学习的方法(卷积神经网络和递归神经网络的变体,即长短期记忆,双向长短期记忆,堆叠长短期记忆和门控递归单元)已被用于检测分布式拒绝服务(DDoS)攻击。使用最近的DDoS数据集(即CICDDoS2019)的Portmap.csv文件对深度学习方法进行了评估。在输入深度学习方法之前,数据要进行预处理。深度学习方法使用预处理数据集进行训练和测试。报告结果表明,与其他基于深度学习的算法相比,基于RNN的stack - lstm深度学习方法在检测Portmap DDoS攻击方面产生了最好的结果。
{"title":"Distributed Denial of Service Attack Detection using Deep Learning Approaches","authors":"Meenakshi, Krishan Kumar, Sunny Behal","doi":"10.1109/INDIACom51348.2021.00087","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00087","url":null,"abstract":"In this paper, the Deep Learning based approaches (Convolutional Neural Network and variants of Recurrent Neural Networks, i.e. Long Short-Term Memory, Bidirectional Long Short-Term Memory, Stacked Long Short-Term Memory and Gated Recurrent Units) have been used to detect Distributed Denial of Service (DDoS) attacks. The Deep Learning approaches have been evaluated using the Portmap.csv file of recent DDoS dataset, i.e. CICDDoS2019. Before giving input to the Deep Learning approaches, the data is pre-processed. The Deep Learning approaches are trained and tested using the pre-processed dataset. The reporting results show that RNN based Stacked-LSTM Deep Learning approach produces the best results in detecting Portmap DDoS attack in comparison to other Deep Learning based algorithms.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131422083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Smart Street Design for Managing Crowds in Hajj 管理朝觐人群的智慧街道设计
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00067
Adnan Ahmed Abi Sen, Yazed Alsaawy, A. Alkhodre, N. Bahbouh, Mohamed Alhaboob
Hajj is an annual pilgrimage to Makkah in Saudi Arabia where over two and a half million pilgrims attend. It is one of the most intense crowded events in the world. Unfortunately, Hajj has witnessed several stampedes, fires and other disasters, which have led to the death of thousands of people. In recent years, the hajj management has made several improvements in the infrastructure, which has helped ease congestion in crowded rituals. However, despite the great development and huge contributions in improving the infrastructure of the facilities, the problem of crowd control and congestion still remains a real challenge to the management. Although crowd management during hajj is exemplary, it still remains largely manual. This research proposes an innovative solution by designing digital smart streets based on cheap LED-light screens, and control algorithm in addition to distributed fog nodes, wireless network sensors, and servers for the main computing and management. The proposed system will facilitate the process of controlling crowds, and the way it will function with the help of special signals and colors. These signs and instructions can be quickly and easily followed and adopted by people within the crowd. In this way, crowd management would be able to provide a prompt response to the requests and alerts from the central command. We use many techniques to detect the issues of crowds and locate places of interest based on the fog nodes and digital street processing. A prototype of the proposed system has been simulated to demonstrate its feasibility and ease of application to determine the benefits and features that it is capable to achieve, if implemented in crowded areas during the course of the Hajj.
朝觐是每年前往沙特阿拉伯麦加的朝圣活动,有250多万朝圣者参加。这是世界上最激烈的拥挤事件之一。不幸的是,朝觐期间发生了几起踩踏事件、火灾和其他灾难,导致数千人死亡。近年来,朝觐管理部门对基础设施进行了几项改进,这有助于缓解拥挤的仪式中出现的拥堵。然而,尽管在改善设施的基础设施方面取得了巨大的发展和贡献,但人群控制和拥堵问题仍然是管理层面临的真正挑战。虽然朝觐期间的人群管理堪称典范,但在很大程度上仍是人工管理。本研究提出了一种创新的解决方案,除了分布式雾节点、无线网络传感器和主要计算和管理的服务器外,还设计了基于廉价led光屏和控制算法的数字智能街道。该系统将有助于控制人群,并在特殊信号和颜色的帮助下发挥作用。这些标志和指示可以被人群中的人们快速而容易地遵循和采用。通过这种方式,人群管理将能够对来自中央指挥部的请求和警报做出快速响应。基于雾节点和数字街道处理,我们使用了许多技术来检测人群问题和定位感兴趣的地方。已对拟议系统的原型进行了模拟,以证明其可行性和应用的便利性,以确定在朝觐期间在拥挤地区实施该系统所能实现的好处和特点。
{"title":"Smart Street Design for Managing Crowds in Hajj","authors":"Adnan Ahmed Abi Sen, Yazed Alsaawy, A. Alkhodre, N. Bahbouh, Mohamed Alhaboob","doi":"10.1109/INDIACom51348.2021.00067","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00067","url":null,"abstract":"Hajj is an annual pilgrimage to Makkah in Saudi Arabia where over two and a half million pilgrims attend. It is one of the most intense crowded events in the world. Unfortunately, Hajj has witnessed several stampedes, fires and other disasters, which have led to the death of thousands of people. In recent years, the hajj management has made several improvements in the infrastructure, which has helped ease congestion in crowded rituals. However, despite the great development and huge contributions in improving the infrastructure of the facilities, the problem of crowd control and congestion still remains a real challenge to the management. Although crowd management during hajj is exemplary, it still remains largely manual. This research proposes an innovative solution by designing digital smart streets based on cheap LED-light screens, and control algorithm in addition to distributed fog nodes, wireless network sensors, and servers for the main computing and management. The proposed system will facilitate the process of controlling crowds, and the way it will function with the help of special signals and colors. These signs and instructions can be quickly and easily followed and adopted by people within the crowd. In this way, crowd management would be able to provide a prompt response to the requests and alerts from the central command. We use many techniques to detect the issues of crowds and locate places of interest based on the fog nodes and digital street processing. A prototype of the proposed system has been simulated to demonstrate its feasibility and ease of application to determine the benefits and features that it is capable to achieve, if implemented in crowded areas during the course of the Hajj.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128358945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fog Mix-Zone Approach for Preserving Privacy in IoT 物联网中保护隐私的雾混合区方法
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00071
Adnan Ahmed Abi Sen, Ayman J. Alnsour, Sara Abdulaziz Aljwair, Sara Saad Aljwair, Hissah Ibrahim Alnafisah, B. Altamimi
Protecting privacy has become one of the most important challenges for the future of modern technologies, including the Internet of Things (IoT) and smart city applications. The process of tracking the users' location and analyzing their whereabouts at a certain time can pose a real danger to the users by revealing a lot of their sensitive and private data to the attacker. This research provides a new and improved design of the Mix-zone approach by employing fog nodes for smart management and exchange of pseudonyms between users, and avoiding the automatic generation of them, which can be easily traced and discovered by the service provider. The proposed approach will significantly improve the level of privacy and contribute to misleading malicious parties who always intend to violate the user's privacy. These scrupulous people may even include the service providers. The simulation which we conducted, have demonstrated the ability of the proposed model to protect privacy and its superiority over the traditional approach in terms of the level of privacy and level of performance.
保护隐私已成为包括物联网(IoT)和智慧城市应用在内的现代技术未来最重要的挑战之一。跟踪用户的位置并分析用户在特定时间的行踪的过程会向攻击者泄露用户的大量敏感和私人数据,从而对用户构成真正的危险。本研究提出了一种新的改进的Mix-zone方法设计,利用雾节点对用户之间的假名进行智能管理和交换,避免了假名的自动生成,服务提供商可以很容易地跟踪和发现假名。所提出的方法将显著提高隐私水平,并有助于误导恶意方,他们总是打算侵犯用户的隐私。这些谨慎的人甚至可能包括服务提供商。我们所进行的模拟,证明了所提出的模型在保护隐私方面的能力,以及在隐私水平和性能水平方面优于传统方法。
{"title":"Fog Mix-Zone Approach for Preserving Privacy in IoT","authors":"Adnan Ahmed Abi Sen, Ayman J. Alnsour, Sara Abdulaziz Aljwair, Sara Saad Aljwair, Hissah Ibrahim Alnafisah, B. Altamimi","doi":"10.1109/INDIACom51348.2021.00071","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00071","url":null,"abstract":"Protecting privacy has become one of the most important challenges for the future of modern technologies, including the Internet of Things (IoT) and smart city applications. The process of tracking the users' location and analyzing their whereabouts at a certain time can pose a real danger to the users by revealing a lot of their sensitive and private data to the attacker. This research provides a new and improved design of the Mix-zone approach by employing fog nodes for smart management and exchange of pseudonyms between users, and avoiding the automatic generation of them, which can be easily traced and discovered by the service provider. The proposed approach will significantly improve the level of privacy and contribute to misleading malicious parties who always intend to violate the user's privacy. These scrupulous people may even include the service providers. The simulation which we conducted, have demonstrated the ability of the proposed model to protect privacy and its superiority over the traditional approach in terms of the level of privacy and level of performance.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127017593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Technique for Managing Reputation of Peers in the Cooperation Approach for Privacy Protection 隐私保护合作方法中同伴声誉管理的新技术
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00072
A. A. Sen, Shamim Kamal Abdul Nazar, Nazik Ahmed Osman, N. Bahbouh, Hazim Faisal Aloufi, Ibrahim Moeed M. Alawfi
Protecting privacy of the user location in Internet of Things (IoT) applications is a complex problem. Peer-to-peer (P2P) approach is one of the most popular techniques used to protect privacy in IoT applications, especially that use the location service. The P2P approach requires trust among peers in addition to serious cooperation. These requirements are still an open problem for this approach and its methods. In this paper, we propose an effective solution to this issue by creating a manager for the peers' reputation called R-TTP. Each peer has a new query. He has to evaluate the cooperated peer. Depending on the received result of that evaluation, the main peer will send multiple copies of the same query to multiple peers and then compare results. Moreover, we proposed another scenario to the manager of reputation by depending on Fog computing to enhance both performance and privacy. Relying on this work, a user can determine the most suitable of many available cooperating peers, while avoiding the problems of putting up with an inappropriate cooperating or uncommitted peer. The proposed method would significantly contribute to developing most of the privacy techniques in the location-based services. We implemented the main functions of the proposed method to confirm its effectiveness, applicability, and ease of application.
在物联网(IoT)应用中保护用户位置隐私是一个复杂的问题。点对点(P2P)方法是用于保护物联网应用程序中隐私的最流行技术之一,特别是使用位置服务的技术。P2P方法除了需要认真的合作外,还需要彼此之间的信任。对于这种方法及其方法来说,这些要求仍然是一个悬而未决的问题。在本文中,我们提出了一个有效的解决方案,通过创建一个名为R-TTP的对等声誉管理器来解决这个问题。每个对等节点都有一个新的查询。他必须评估合作的同伴。根据收到的评估结果,主对等体将向多个对等体发送相同查询的多个副本,然后比较结果。此外,我们还向信誉管理器提出了另一种方案,即依靠雾计算来增强性能和隐私。依靠这项工作,用户可以从许多可用的协作对等体中确定最合适的,同时避免忍受不适当的协作或未提交的对等体的问题。所提出的方法将对基于位置的服务中大多数隐私技术的开发做出重要贡献。通过实现该方法的主要功能,验证了该方法的有效性、适用性和易用性。
{"title":"A New Technique for Managing Reputation of Peers in the Cooperation Approach for Privacy Protection","authors":"A. A. Sen, Shamim Kamal Abdul Nazar, Nazik Ahmed Osman, N. Bahbouh, Hazim Faisal Aloufi, Ibrahim Moeed M. Alawfi","doi":"10.1109/INDIACom51348.2021.00072","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00072","url":null,"abstract":"Protecting privacy of the user location in Internet of Things (IoT) applications is a complex problem. Peer-to-peer (P2P) approach is one of the most popular techniques used to protect privacy in IoT applications, especially that use the location service. The P2P approach requires trust among peers in addition to serious cooperation. These requirements are still an open problem for this approach and its methods. In this paper, we propose an effective solution to this issue by creating a manager for the peers' reputation called R-TTP. Each peer has a new query. He has to evaluate the cooperated peer. Depending on the received result of that evaluation, the main peer will send multiple copies of the same query to multiple peers and then compare results. Moreover, we proposed another scenario to the manager of reputation by depending on Fog computing to enhance both performance and privacy. Relying on this work, a user can determine the most suitable of many available cooperating peers, while avoiding the problems of putting up with an inappropriate cooperating or uncommitted peer. The proposed method would significantly contribute to developing most of the privacy techniques in the location-based services. We implemented the main functions of the proposed method to confirm its effectiveness, applicability, and ease of application.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116951316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensitivity Analysis of 2D Photonic Crystal based Hexoganal Ring Resonator for Cervical Cancer Detection 二维光子晶体环谐振器检测宫颈癌的灵敏度分析
Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00128
S. Vishalatchi, R. Nagaraj
In this effort, we propose a two dimensional hexagonal ring resonator sensor (2DHRR) for the detection of cervical cancer cell in the women's cervix. Hexagonal ring structure is widely used among research community. This device is based on silicon rods surrounded by air. The detection process is to be done by means of refractive index involved in simulation which creates different position in transmission peaks. It creates a shift which is used to calculate sensitivity. Two sensor design structures are created, analyzed and compared by having analyte in it. The OptiFDTD algorithm plays a role to simulate the transmission of light. The 2DHRR sensor has the sensitivity of 790nm/RIU and the quality factor as 344. The second one which is Inverse 2DHRR sensor has its sensitivity as 570nm/RIU and the quality factor to be 310. The high sensitivity is noticed in 2DHRR sensor. It also retains the high quality factor. The effects of results are promising by means of providing compact size, low power consumption and less weight. Also, this research has got comparatively high sensitivity with which we can even go for with fabrication process.
在这项工作中,我们提出了一种二维六角形环形谐振器传感器(2DHRR)用于检测女性子宫颈中的宫颈癌细胞。六角形环结构在研究界应用广泛。这种装置是基于被空气包围的硅棒。探测过程是通过模拟中涉及的折射率来完成的,折射率在透射峰中产生不同的位置。它产生一个位移,用来计算灵敏度。创建了两种传感器设计结构,并对其进行了分析和比较。OptiFDTD算法起到了模拟光传输的作用。2DHRR传感器的灵敏度为790nm/RIU,品质因子为344。第二种是逆2DHRR传感器,其灵敏度为570nm/RIU,质量因子为310。2DHRR传感器具有很高的灵敏度。它还保留了高品质的因素。通过提供紧凑的尺寸,低功耗和轻重量的方法,结果是有希望的。此外,该研究具有较高的灵敏度,甚至可以达到制造工艺的要求。
{"title":"Sensitivity Analysis of 2D Photonic Crystal based Hexoganal Ring Resonator for Cervical Cancer Detection","authors":"S. Vishalatchi, R. Nagaraj","doi":"10.1109/INDIACom51348.2021.00128","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00128","url":null,"abstract":"In this effort, we propose a two dimensional hexagonal ring resonator sensor (2DHRR) for the detection of cervical cancer cell in the women's cervix. Hexagonal ring structure is widely used among research community. This device is based on silicon rods surrounded by air. The detection process is to be done by means of refractive index involved in simulation which creates different position in transmission peaks. It creates a shift which is used to calculate sensitivity. Two sensor design structures are created, analyzed and compared by having analyte in it. The OptiFDTD algorithm plays a role to simulate the transmission of light. The 2DHRR sensor has the sensitivity of 790nm/RIU and the quality factor as 344. The second one which is Inverse 2DHRR sensor has its sensitivity as 570nm/RIU and the quality factor to be 310. The high sensitivity is noticed in 2DHRR sensor. It also retains the high quality factor. The effects of results are promising by means of providing compact size, low power consumption and less weight. Also, this research has got comparatively high sensitivity with which we can even go for with fabrication process.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"53 64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124283356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1