2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)最新文献

筛选
英文 中文
Comparative Analysis of Human Face Recognition by Traditional Methods and Deep Learning in Real-Time Environment 实时环境下传统方法与深度学习人脸识别的对比分析
Ruchi Jayaswal, Mansih Dixit
{"title":"Comparative Analysis of Human Face Recognition by Traditional Methods and Deep Learning in Real-Time Environment","authors":"Ruchi Jayaswal, Mansih Dixit","doi":"10.1109/CSNT48778.2020.9115779","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115779","url":null,"abstract":"In general, the field of face recognition has gain a lot of attention for researchers. As the crime increases day by day, the forensic surveillance is required to construct a facial attribute, a visual likeness of a victim’s face. Many researchers have contributed their work in this field by using various methods. Real time face detection is still a tedious task and achieve a good performance of the system. In this paper we will compare two models of face recognition. First is traditional method and second is deep learning method on real time dataset. After comparing these methods with different algorithms, will find the accuracy of the models on same dataset and check whether it predict a correct face or not.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125245123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Intelligent Monitoring Systems for Transportation of Perishable Products based Internet of Things (IoT) Technology 基于物联网(IoT)技术的易腐产品运输智能监控系统
M. Ahmadzadegan, M. Mohammadzadeh, Ghazaleh Eftekharnejad, H. Ghorbani
{"title":"Intelligent Monitoring Systems for Transportation of Perishable Products based Internet of Things (IoT) Technology","authors":"M. Ahmadzadegan, M. Mohammadzadeh, Ghazaleh Eftekharnejad, H. Ghorbani","doi":"10.1109/CSNT48778.2020.9115745","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115745","url":null,"abstract":"For the past decade, one of the most important challenges for human societies has been the impact of food on human health. European countries, and in particular the European Union, have established laws and standards to address this challenge by allowing them to track and monitor foodstuffs in during the production chain until consumption. By enforcing these rules, the European Union has obliged food and feed operators to set up tracking and monitoring systems for their products. One of the most important parts of these systems is the transportation chain. The transportation of food from origin of production to consumption destination is very important. And must provide traceability for food quality control and health. One of the new technologies that has enabled human societies to make food products traceable to humans is the Internet of Things (IoT). That has brought together manufacturers, transport systems, retailers and consumers of food. In this paper, we propose a cost effective way to enable real-time food tracking and monitoring.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133118418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
State of the art of Mobile Banking Services and Future Prospects in Developing Countries 发展中国家移动银行服务的现状和未来前景
Mafizur Rahman, Malika Zannat Tazim, Sumita Das, Linta Islam
{"title":"State of the art of Mobile Banking Services and Future Prospects in Developing Countries","authors":"Mafizur Rahman, Malika Zannat Tazim, Sumita Das, Linta Islam","doi":"10.1109/CSNT48778.2020.9115769","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115769","url":null,"abstract":"Mobile banking is a service that permits people to transfer money by using their smartphones. Generally, a bank or some financial institution rendered this service to their customer. Recently, there is a radical change in the ICT sector in Bangladesh. Therefore, people can easily do online banking tasks by staying at their homes by using their mobile phones. Most people use mobile banking for paying utility bill and transferring funds between accounts. However, due to poor banking infrastructure, people had to face many problems in mobile banking. For this purpose, our study was to find those problems or barriers and future prospects of mobile banking services in Bangladesh. We have discussed the perceived risk of m-banking as well as how trust and compatibility influence m-banking.If we can fix those issues then more people will be engaged in this service.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133282648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Educational Data Mining Methods: A Survey 教育数据挖掘方法综述
Abdul Aleem, M. M. Gore
{"title":"Educational Data Mining Methods: A Survey","authors":"Abdul Aleem, M. M. Gore","doi":"10.1109/CSNT48778.2020.9115734","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115734","url":null,"abstract":"Educational Data Mining (EDM) is an emerging inter-disciplinary research area that involves education and computer science. EDM employs data mining tools and techniques, on large datasets related to education, to extract meaningful and useful information. EDM works toward the improvement of educational processes by introducing better and effective learning practices. EDM methods refer to the set of methods that are used for building models/applications. This article presents an extensive literature survey of EDM methods. The article also discusses research trends and challenges in EDM. This insight into EDM attempts to provide useful and valuable information to researchers interested in furthering the field of EDM.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114232203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Comprehensive Survey on various Security Authentication Schemes for Mobile Touch Screen 各种移动触摸屏安全认证方案综述
G. Bhatt, B. Bhushan
{"title":"A Comprehensive Survey on various Security Authentication Schemes for Mobile Touch Screen","authors":"G. Bhatt, B. Bhushan","doi":"10.1109/CSNT48778.2020.9115731","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115731","url":null,"abstract":"As technology is improving day by day, it is leading to a society in which there is a necessity of security for every system. Different strategies are proposed timely to overcome the security threats & vulnerabilities caused in previous strategies to protect the privacy of different users using mobile phones across the world as most of the crucial data of a user is saved in their smartphones. In this paper, we categorized the authentication scheme into four categories, namely PIN-based authentication, Biometric-based authentication, Pattern/Gesture-based authentication, and Graphical password authentication and development done in them over time. We further explore these categories and state there propose, limitation, result, vulnerabilities, and threats. A comprehensive taxonomy is provided for multiple authentication techniques for easy understanding. In addition, it also helps the students and the novice research to get an insight into the trending security techniques.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130587037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Importunity & Evolution of IoT for 5G 5G时代物联网的重要性与演进
A. Ahmad, B. Bhushan, Nikhil Sharma, I. Kaushik, Saurabh Arora
{"title":"Importunity & Evolution of IoT for 5G","authors":"A. Ahmad, B. Bhushan, Nikhil Sharma, I. Kaushik, Saurabh Arora","doi":"10.1109/CSNT48778.2020.9115768","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115768","url":null,"abstract":"This With the ever-growing demand of high internet connectivity and ease of life Internet of Things in 5G has become the need of the hour as it has been the most sort out topic for researchers. The 4G industry has brought a revolution with it in the field of internet connectivity but is quite not enough for advanced IoT device demands and challenges. The upgrade in wireless communication is much needed for a much brighter and advanced future. The 5G will bring better Quality of Service, reliability and scalability to the IoT industry. In this paper we have discussed about the security issues and attacks that can affect working of Internet of Things. We have also explained in detail about the architecture of the 5G IoT system. That is why we have highlighted some of the major application and security aspects of 5G IoT.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127576110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Producing Energy Using Blind Man Stick 使用盲人手杖产生能量
Depender Kumar Soni, Nikhil Sharma, I. Kaushik, B. Bhushan
{"title":"Producing Energy Using Blind Man Stick","authors":"Depender Kumar Soni, Nikhil Sharma, I. Kaushik, B. Bhushan","doi":"10.1109/CSNT48778.2020.9115766","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115766","url":null,"abstract":"We all are familiar with the problems a blind person faces while performing several daily life activities. These problems are generally related to walking on roads, walking on ramps, movement in staircases, looking for path in crowded streets and market places and many other situations. Of course, many of us come ahead to help them by guiding their way, but sometimes it becomes a matter of self-respect, or say, the person is not willing to take help from others or even it is possible that nobody may be available to help. Think of a situation when a blind person is alone and an Electronic Travel Aid Stick suddenly stops working due to a completely discharged battery system. This paper aims to build a device that can generate that much amount of energy that is required to run the electronic systems efficiently so that it can prevent visually impaired people from suffering in difficult situations.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128356177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security-Centric Investigation of Social Networks and Preventative Behavioral Analysis of Online Activity by the Kuleshov effect 以安全为中心的社交网络调查和基于Kuleshov效应的在线活动预防行为分析
M. Ahmadzadegan, H. Ghorbani, anna. stahlbrost
{"title":"Security-Centric Investigation of Social Networks and Preventative Behavioral Analysis of Online Activity by the Kuleshov effect","authors":"M. Ahmadzadegan, H. Ghorbani, anna. stahlbrost","doi":"10.1109/CSNT48778.2020.9115797","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115797","url":null,"abstract":"The Internet beside providing many advantages has some disadvantages. The full unfamiliarity with cyberspace can bring harms and inconvenience to families. This study attempted to introduce the disadvantages and threats on the Internet and present some countermeasures to decrease such threats and harms. Social networks are currently so epidemic that even many companies and organizations formally supply the internal communication system among their members and employees through this social networks and the number of the users of such networks is increasing daily. The term “information security” covers a broad spectrum of activities in an organization. Information security means preventing the unauthorized access to information and products or apply some changes or delete such information using a series of processes. Such actions can be considered as a protection package against current resources in different situations (e.g., a hacker attacks which occurs a lot) by those in charge of information security. One of the most important issues which is considered as a security challenge in these networks is the security and retention of the data and information shared by users from unauthorized access and unwanted disclosure. In this article the Kuleshov effect from cinema has been deployed to explain and launch a behavioral analysis of online activities.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126817057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Issues & Seclusion in Bitcoin System 比特币系统中的安全问题与隔离
Depender Kumar Soni, Harbhajan Sharma, B. Bhushan, Nikhil Sharma, I. Kaushik
{"title":"Security Issues & Seclusion in Bitcoin System","authors":"Depender Kumar Soni, Harbhajan Sharma, B. Bhushan, Nikhil Sharma, I. Kaushik","doi":"10.1109/CSNT48778.2020.9115744","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115744","url":null,"abstract":"In the dawn of crypto-currencies the most talked currency is Bitcoin. Bitcoin is widely flourished digital currency and an exchange trading commodity implementing peer-to-peer payment network. No central athourity exists in Bitcoin. The users in network or pool of bitcoin need not to use real names, rather they use pseudo names for managing and verifying transactions. Due to the use of pseudo names bitcoin is apprehended to provide anonymity. However, the most transparent payment network is what bitcoin is. Here all the transactions are publicly open. To furnish wholeness and put a stop to double-spending, Blockchain is used, which actually works as a ledger for management of Bitcoins. Blockchain can be misused to monitor flow of bitcoins among multiple transactions. When data from external sources is amalgamated with insinuation acquired from the Blockchain, it may result to reveal user’s identity and profile. In this way the activity of user may be traced to an extent to fraud that user. Along with the popularity of Bitcoins the number of adversarial attacks has also gain pace. All these activities are meant to exploit anonymity and privacy in Bitcoin. These acivities result in loss of bitcoins and unlawful profit to attackers. Here in this paper we tried to present analysis of major attacks such as malicious attack, greater than 52% attacks and block withholding attack. Also this paper aims to present analysis and improvements in Bitcoin’s anonymity and privacy.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115022672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CSNT 2020 Proceedings
{"title":"CSNT 2020 Proceedings","authors":"","doi":"10.1109/csnt48778.2020.9115774","DOIUrl":"https://doi.org/10.1109/csnt48778.2020.9115774","url":null,"abstract":"","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125002705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信