{"title":"Analysis of Geographical Change Detection using Satellite Images","authors":"Shubhangi Yerne, U. Shrawankar","doi":"10.1109/CSNT48778.2020.9115785","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115785","url":null,"abstract":"The images for Satellite are very helpful to quickly assess changes. Detection for change represents a robust tool for monitor the appraisal of the Earth’s by natural and manmade multi-temporal satellite image. This project presents a generating model for the occasional improvement detection. Generating models for uniformly represent all relevant in a specific field according to the change detection distribution. The model employed clearly represents the method of image creation. In Deployment, detecting changes is the method of identifying differences between the positions of an object or its contributors to its development by analyze the picture’s attempt at different time in the same geographical region. It can be useful for studying landscape changes, changing agriculture, and studying the dynamics of land use or land tenure. This paper present by precisely arbitrary methods for finding the relative change between two temporarily different images for the same view. Convolution Neural Network (CNN) was applied to the partition to remove compressed image features.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115779334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pranshu Bansal, R. Panchal, Sarthak Bassi, Amit Kumar
{"title":"Blockchain for Cybersecurity: A Comprehensive Survey","authors":"Pranshu Bansal, R. Panchal, Sarthak Bassi, Amit Kumar","doi":"10.1109/CSNT48778.2020.9115738","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115738","url":null,"abstract":"Blockchain is a decentralized ledger used to securely exchange digital currency, perform deals and transactions. Each member of the network has access to the latest copy of encrypted ledger so that they can validate a new transaction. Various features such as decentralization, trustworthiness, trackability and immutability are provided by the blockchain technology. This paper provides the blockchain architecture and explains the concept, characteristics, need of Blockchain in Security, how Bitcoin works and to enhance the security in the field of IoT. It attempts to highlights the role of Blockchain in shaping the future of Cyber Security, Cryptocurrency and adoption of IoT. This paper explains the need of blockchain technology in various technical fields and shows various advantages over conventional system.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124392715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rajat Rathi, Nikhil Sharma, Chinkit Manchanda, B. Bhushan, Moksh Grover
{"title":"Security Challenges & Controls in Cyber Physical System","authors":"Rajat Rathi, Nikhil Sharma, Chinkit Manchanda, B. Bhushan, Moksh Grover","doi":"10.1109/CSNT48778.2020.9115778","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115778","url":null,"abstract":"With the exponential growth of technology within few decades the possibility of smart cities has also increased with an advanced production of fresh services for health, transport, business, education, energy distribution, social activity. As a result, Cyber Physical System (CPS) can prove itself very helpful in the adaptation of projects and applications of smart cities. But with this new security issues have been generated. In this Paper we study the CPS from three perspectives I.e. from security perspective, component perspective and CPS perspective for smart grids and smart cars. The paper then outlines the CPS, CPS models and communication in the CPS. With the increasing number of fresh services, the data is increasing at a very fast pace and this data may lead to the security issues like security attacks and protection from those attacks. The paper may also provide a research agenda for the future.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127056077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Side searching and object improving algorithms for Images","authors":"Ranbeer Tyagi, G. Tomar, L. Shrivastava","doi":"10.1109/CSNT48778.2020.9115775","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115775","url":null,"abstract":"Image improvement and edge discovery are very important in the digital globe to discover the knowledge related to an entity similar to strength, level, contrast, range, limitations, missing and hidden areas or boundaries etc. There are very less methods and calculations to exhibit the better details of a goal. In this paper primarily, an edge finding method i.e. Side Searching Algorithm (SSA) has been discussed that discovers the unseen boundaries from images and it is an extremely easy approach. The other future technique of enhancement finds its path to depiction and enhances the darkest observation of an aim. For this an Object Improving Algorithm has been developed (OIA) for enhancing the darkest area of image.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132809280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Advance Encryption Standard with a Privacy Database Structure for IoT Nodes","authors":"J. H. Anajemba, C. Iwendi, Mohit Mittal, Tang Yue","doi":"10.1109/CSNT48778.2020.9115741","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115741","url":null,"abstract":"The Internet of Things (IoT) contains huge number of devices and objects that have very low or nonexistent processing and communication resources, connected to a small number of high-powered devices as envisaged in the coming 5G Networks. In the foreseeable future, the backend systems will not be able to provide security and privacy via cryptographic primitives due to the sheer number of IoT devices. This research presents cloud approximate nearest neighbors (CANN) mechanism of a Mesh network based on an improved advanced encryption standard (I-AES) with a privacy database structure (PDS). In addition, it provides a theoretical basis considering the huge number of 5G devices and physical unclonable functions (PUF) applicable in IoT for the coming 5G Network. Comparing our proposed I-AES algorithm against the advanced encryption standard (AES) and the Data Encryption Standard (DES), it is observed that our algorithm outperforms the previously existing algorithms in terms of encryption execution time and throughput. Finally, it was discovered that the time of encryption was slower using privacy-preserving database structures and improved AES algorithms with good scaling behavior.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133780319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[CSNT 2020 copyright notice]","authors":"","doi":"10.1109/csnt48778.2020.9115730","DOIUrl":"https://doi.org/10.1109/csnt48778.2020.9115730","url":null,"abstract":"","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134114060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Path Capability Identification and Performance analysis of Mobile Ad hoc Network","authors":"M. Patsariya, A. Rajavat","doi":"10.1109/CSNT48778.2020.9115772","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115772","url":null,"abstract":"In real time communication network capability measuring are crucial tasks because every resource of network is frequently change their state. In the mobile ad hoc network, link capacity utilization computation is very challenging task due to network topology frequently change, that totally depends on their network structure. So that in the ad hoc scenario all the network capacity utilization measure at end of simulation, where include the entire sub graph that will perform communication in any time. In the preceding some author calculates energy utilization, network congestion status and enhances the routing strategies. Through those work here we take every parameter that depends on the communication and find out the utilization, such parameters are network bandwidth, mobile node processing power, buffer, energy and signal strength utilization with respect to communication path between source to receiver. In this paper some of network parameter are initialize constant manner such as node initial energy, channel, buffer size, processing power that prefix and rest of parameter i.e. bandwidth, signal strength dynamically define at the time of communication. After that while communication start than all the parameter utilize that calculate with respect to complete path from source to destination. The utilize parameter apply into the fuzzy classification and calculate class level of particular complete path in ‘low’, ‘medium’, ‘high’ level that helps to identify the network capability utilization. The result section shows identification of network path resource utilization in terms of bandwidth, energy, signal strength, buffer and processing power and impacts of these parameter based on packet delivery fraction, routing load, throughput, no. of data sends, receives and energy consumption etc.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123148604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT and BLE Beacons: Demand, Challenges, Requirements, and Research Opportunities- Planning-Strategy","authors":"S. Padiya, D. Gulhane","doi":"10.1109/CSNT48778.2020.9115765","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115765","url":null,"abstract":"The Internet of Things (IoT) has various technologies that improve the functionalities of IoT devices to make them capable to connect and communicate with each other. The IoT with various advanced technologies and devices performing a rapid transformation of current society towards easier and smarter. As the use of IoT increases, the new challenges, requirements, and research/ innovation need have arisen to fulfill the demands. Wireless devices with low power and high data security are the most viable demand for diverse IoT applications. In an IoT environment, various nodes/ sensors are used to collect the data and different wireless communication technologies like Infrared, Bluetooth, Li-Fi, WI-Fi, Zigbee, etc. are used to transceive the data. As per the survey, among all other available wireless technologies, Bluetooth Low Energy (BLE) beacons have proved as most promising short-range wireless communication technology due to the fact of appearing everywhere or of being very common of Bluetooth-compatible technology. However, for better performance and efficiency of BLE beacons in the IoT ecosystem, regular research has needed to ensure seamless integration. For such research here we have combined the literature of IoT with Beacons. This paper consolidates: an introduction of IoT with its current market demand, challenges and five essential requirements observed. We have also discussed the research planning and strategy to discover the solutions. It also consolidates an introduction of BLE Beacon with its market demand, a survey of existing/ proposed solutions are reviewed to identify the current problem statements for research opportunities in the future.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123271231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation and Extension of Bit Manipulation Instruction on RISC-V Architecture using FPGA","authors":"V. Jain, Abhishek A. Sharma, E. Bezerra","doi":"10.1109/CSNT48778.2020.9115759","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115759","url":null,"abstract":"Consumer electronic computational device requires an efficient system, having minimal Cost and Power Consumption, with high energy efficiency and security. RISCV is a widely accepted Instruction set architecture (ISA) due to its compatibility with direct native hardware implementation rather than simulations and has support for extensive ISA extensions with specialized variants. Bit Manipulation Instructions (BMIs) were introduced by ARM and Intel to improve the runtime efficiency and power dissipation of the program although RISC-V ISA is popular it currently supports only two basic BMIs.This paper presents a simplified architecture of a fully Synthesizable 32-bit processor ”bitRISC” based on the open-source RISC-V (RV32I) ISA and also introduced two new RISC-V BMI’s and implemented it on our designed processor, targeted for low-cost Embedded/IoT systems to optimize power, cost and design complexity. The ”bitRISC” is a single cycle processor designed using Verilog HDL and our simplified architecture and is further prototyped on ”ZedBoard” FPGA.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125867738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of Cost: Storage over Cloud Versus on Premises Storage","authors":"Rajesh Sen, Akrati Sharma","doi":"10.1109/CSNT48778.2020.9115736","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115736","url":null,"abstract":"In today’s world of digitalization the most important object is data. There are numerous techniques available for retrieval of the data. To store this data over a large period of time various data hardware (DHW) are used. As the data is increasing day by day the more cost is incurred in storing the data. Data proliferation is the term used to refer the large amount of data that is created by government and nongovernment institutions either in structured or unstructured format. To minimize the maintenance cost generated by data proliferation IaaS as cloud computing service can be implemented. IaaS can be considered as virtualized service, which can be used to provide ‘as a service’ to the users via cloud vendors. It provides the access of database resources on demand. One can ‘pay-as-per-use’ of resource from the pool of resources and these resources can be virtualized in cloud based environment. To access the virtualized resources there are various approaches used. Private cloud approach is commonly used to maintain the integrity of the data.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129444917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}