{"title":"Rectangular Ring Monopole Antenna using Defected Ground Structure for Television White Space Application","authors":"Sonali J. Shedge, Vijaya Kamble","doi":"10.1109/CSNT48778.2020.9115781","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115781","url":null,"abstract":"The television white space is the unused frequency spectrum in the UHF band used for television transmission. The paper presents the design of wide band antenna to utilize the range of frequencies in the television white space (TVWS) and to avoid the spectrum crunch. A rectangular ring monopole antenna with symmetrical rectangular defected ground structure is projected having a generous bandwidth of 677 MHz. The use of DGS is for enhancement of bandwidth also the ring patch improves the bandwidth and the reflection coefficient. The total dimension of the antenna is 150 mm X 200 mm. FR4 epoxy is used to reduce the cost and its height is 1.6 mm. The application of this unused TVWS spectrum is in Wi-Fi services.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126348496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Based CNC Machine Condition Monitoring System Using Machine Learning Techniques","authors":"M. K, Prashanth Kannadaguli","doi":"10.1109/CSNT48778.2020.9115762","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115762","url":null,"abstract":"We developed a CNC machine’s condition monitoring system based on Artificial Neural Network (ANN) and correlate the same with the real-time CNC machine data. The classification of the condition of a CNC machine was done by deciding whether it is a fresh machine or worn machine using machine learning techniques. In consideration of real time data loaded from a CNC machine we built a database and then modelled an ANN. Based on this approach of machine learning which implements pattern recognition and probabilistic modelling of the CNC machine data, classification of the condition of a CNC machine was done successfully. Finally, performance analysis of this machine model prevail in terms of Machine Error Rate (MER) upholds the impressive fact that modeling using the ANN yields better results over another alternative modeling techniques and can be used for developing Automatic CNC machine condition monitoring and recognition system.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127966836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Parashar, Yogesh Bhomia, Devendra Soni, R. Saraswat
{"title":"A Multiband Antenna for WLAN and WiMAX Wireless Applications","authors":"R. Parashar, Yogesh Bhomia, Devendra Soni, R. Saraswat","doi":"10.1109/CSNT48778.2020.9115790","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115790","url":null,"abstract":"This article shows the designing of slotted multiband antenna with metamaterial loading. Such design is using for wireless communication applications. Antenna is cover the wireless communication modes such as WLAN, WiMAX, X and KU Band. Proposed antenna is fabricated on low cost (FR-4) substrate with compact size of 35 × 34 × 0.8 mm3. It is consist microstrip feedline and slotted ground plane. The SRR, CSRR and parallel stubs are introduced with patch to achieve the wireless communication bands. Antenna design has appropriate gain and efficiency, and stable E and H radiation patterns. In such compact size by introducing SRR and CSRR structure, proposed antenna achieved seven bands which covers WLAN, WiMAX, X and KU wireless communication bands. In proposed antenna by introducing two parallel stubs it achieve three bands and after introducing with CSRR and SRR and defected ground structure, seven bands with improved reflection coefficient achieved.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115920381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerated Computer Vision Inference with AI on the Edge","authors":"Varnit Mittal, B. Bhushan","doi":"10.1109/CSNT48778.2020.9115770","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115770","url":null,"abstract":"Computer vision is not just about breaking down images or videos into constituent pixels, but also about making sense of those pixels and comprehending what they represent. Researchers have developed some brilliant neural networks and algorithms for modern computer vision. Tremendous developments have been observed in deep learning as computational power is getting cheaper. But data-driven deep learning and cloud computing based systems face some serious limitations at edge devices in real-world scenarios. Since we cannot bring edge devices to the data-centers, so we bring AI to the edge devices with AI on the Edge. OpenVINO toolkit is a powerful tool that facilitates deployment of high-performance computer vision applications to the edge devices. It converts existing applications into hardwarefriendly and inference-optimized deployable runtime packages that operate seamlessly at the edge. The goals of this paper are to describe an in-depth survey of problems faced in existing computer vision applications and to present AI on the Edge along with OpenVINO toolkit as the solution to those problems. We redefine the workflow for deploying computer vision systems and provide an efficient approach for development and deployment of edge applications. Furthermore, we summarize the possible works and applications of AI on the Edge in future in regard to security and privacy.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122999871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phishing Detection Using Significant Feature Selection","authors":"D. Goswami, Manali Shukla, A. Chaturvedi","doi":"10.1109/CSNT48778.2020.9115782","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115782","url":null,"abstract":"Growth of cyber attacks is rapidly increasing in the entire world. To provide prevention from these attacks is a great challenge for the experts. Intruders are keep on adapting new methods and techniques to carry out their malicious goals. Phishing plays a dominant role in the field of web attacks and it has been used as a weapon by the attackers. In this paper we have given two algorithmic approaches to the problem of Phishing identification with reduced number of attributes. It makes this approach simple yet efficient. The first algorithm assigns weight to all attributes with respect to uniform resource locators. We have employed various analysis mechanism to identify significant role of selected attributes for the purpose of Phishing identification. The second approach takes former’s output as input and classifies the uniform resource locators labeling as phishing or non phishing. The experimental work verifies that the approach for phishing detection proposed in this paper can attain a high accuracy in comparison to existing algorithms.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125006933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PWM Techniques to Power Converters of the Wind Energy Conversion System","authors":"M. Kumar, K. Latha Shenoy, G. B. Praveen","doi":"10.1109/CSNT48778.2020.9115754","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115754","url":null,"abstract":"the modern type-3 wind energy conversion system consists of wind turbine, doubly fed induction generator and advanced AC/DC/AC power converters connected to the grid. To study the dynamic issues of the wind energy conversion system the dynamic model is necessary. To perform the stability analysis of the grid connected with the use of back to back converter, the various power converter topologies used in grid integration of are to be known. This paper presents the detailed study on sinusoidal pulse width modulation and space vector modulation techniques, its basic operation, circuit design, configurations and overview of control structure of the back to back converter applicable for wind power conversion systems.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128372108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT based Smart home: Security Aspects and security architecture","authors":"A. K. Ray, A. Bagwari","doi":"10.1109/CSNT48778.2020.9115737","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115737","url":null,"abstract":"Internet of Things (IoT) in general sense refers as the world of connected devices and physical objects which contains sensors, microcontrollers, software components to connect, store, actuate and shared his own date on different machines. IoT enabled home appliances plays an important role in day-to-day life and when these devices become connected and controlled remotely or with single click thorough web enabled application along with other services they form a smart home network. This kind of networking of physical objects or non-electronic home’s objects can interconnect through IoT. In Smart home communication security is major concern while device communication or stored sensitive data to maintain the privacy of the data. A hacker or intruder can easily attack on smart home Router, gateway or IoT enabled nodes to get access of data because IoT devices contain a little or no built in security mechanism available on board. There several attacks reported through in year 2016 and 2018 base on Mirai dubbed botnet and VPNFilter malware respectively to get access of smart home data. This paper proposed a secure smart home architecture with cloud, secure fog with firewall, security analysis engine. The firewall system is in between of internet and fog layer to protect the unauthorized data access and internet threats. The security analysis engine monitor the device communication and transmission of data and keeping log the same and also generate alerts for any kind of misuse or suspected communication between nodes. This security system will enhance the consumer trust to implement smart homes technology.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126162255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IOT Based Wireless Sensor Network for Air Pollution Monitoring","authors":"A. Chaturvedi, L. Shrivastava","doi":"10.1109/CSNT48778.2020.9115733","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115733","url":null,"abstract":"Wireless sensor network is one of the important areas where a lot of work is being done. The work is not limited to fire detection and propagation of fire, air pollution, water or gas leakage detection but many more. If WSN is used in conjunction with Internet of Things (IOT), the shared information will be more useful. Internet of things is nothing but a combination of sensor and software with the embedded electronics. The data collected in a local area can be sent at any distance where it can be seen and further controlling action may be initiated if required. The WSN based air monitoring system collects the data from the area where the sensors are deployed and the data can be displayed on the computer screen. The computer data can be sent to any terminal which is connected to Internet. Hence by using IOT, the long distance transmission of the data can be done. The monitoring is limited to area but the information can be forwarded to any control station. Hence by using IOT, the air pollution level of the campus even cities can be monitored and necessary advisory can be issued if required.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125234388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Contract Definition for Land Registry in Blockchain","authors":"Archana Sahai, R. Pandey","doi":"10.1109/CSNT48778.2020.9115752","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115752","url":null,"abstract":"Land Registry System in India is a very time-consuming process involving many middlemen, thus increasing the fraudulent cases. These problems can be eliminated by the usage of Blockchain Technology for Land Registry Management in India. This paper highlights issues, such as minimal transparency, accountability, incoherent data sets with different Government Departments relating to the same portion of land and delays in the current Land registry management process. The paper describes the current process of land records maintenance and land registration in the country. It emphasizes on the importance of smart contract for land registry applying the Blockchain.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130468378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video Transmission Over Next Generation Emergency Services","authors":"Abubkr Elmnsi, Fahad Mira","doi":"10.1109/CSNT48778.2020.9115787","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115787","url":null,"abstract":"The delivery of multimedia services such as video streaming over 4G/LTE is becoming ever more realistic due to the High Efficiency Video Coding (HEVC) standard. However, streaming of video is bandwidth expensive. The quality of encoded video is hugely influenced by initial codec setting and dependent on the varying network quality of service. Understanding the impact that the encoding process of any codec has on video quality and the impact that network impairment has on delivered quality is paramount. This paper presents experimental results of the investigation of the impact of HEVC encoding and codec settings has on video quality and of the impact of LTE network quality degradation has on video quality. Results show that both the encoding and streaming are highly sensitive to codec setting as well as to the video content and suggest that the impact should be jointly considered.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131994695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}