{"title":"Pro-active Performance Monitoring in Optical Networks using Frequency Aware Seq2Seq Model","authors":"Rishabh Jain, Umesh Sajjanar","doi":"10.54105/ijdcn.b5028.023223","DOIUrl":"https://doi.org/10.54105/ijdcn.b5028.023223","url":null,"abstract":"Performance Monitoring (PM) and Fault Detection have always been a reactionary approach in Optical Networks for most service providers. Any kind of fault (power surge, ageing issues, equipment faults and failures, natural calamities, etc.) in an optical network is detected only after the fault has occurred and mitigation is performed afterward. The resultant service outages for end-users cause huge financial and reputation losses to the vendors. Therefore, there is a strong need for proactive detection of faults to limit disruption and provide uninterrupted services to clients. We achieve this objective by doing a multi-horizon time series prediction of Bit Error Rate at the receiver end of an optical circuit using our custom designed Frequency aware Sequence to Sequence (FaS2S) Neural Network. The predicted value of BER can be used to notify users of failure scenarios before they occur. Further corrective action, such as automatic re-routing or manual intervention can then be taken by the user. With this model, we can even configure the network properties dynamically during periods of low BER to push the network efficiency to its maximum capacity. See inference Video for BER inference capabilities of FaS2S.","PeriodicalId":174376,"journal":{"name":"Indian Journal of Data Communication and Networking","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125124771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on IoT Blockchain Technology","authors":"Neenu Kuriakose, Divya Midhunchakkaravarthy","doi":"10.54105/ijdcn.f3719.123122","DOIUrl":"https://doi.org/10.54105/ijdcn.f3719.123122","url":null,"abstract":"Our lifestyles are increasingly incorporating the Internet of Things. Every year, a growing number of gadgets gain connectivity and communication capabilities via the Internet. There are currently more than 400 million IoT devices in use worldwide, and by 2025, that number is anticipated to reach 1.5 billion. Keeping track of all IoT devices and figuring out which one to connect to in order to make service requests is getting more and more challenging. The device could also end up malfunctioning or performing poorly. We must determine the most effective method of data storage in order to provide the groundwork for how to build trust amongst devices.","PeriodicalId":174376,"journal":{"name":"Indian Journal of Data Communication and Networking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125661135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel NOC Architecture for Designing and Implementing a Low Power Router using FPGA","authors":"Geethanjali N, Dr. Rekha K. R","doi":"10.54105/ijdcn.f5026.102622","DOIUrl":"https://doi.org/10.54105/ijdcn.f5026.102622","url":null,"abstract":"The NOC architecture assumes critical detail at the same time as making plans correspondence frameworks to machine on chip. A noc engineering is higher-excellent over commonplace shipping, common delivery plan then crossbar interconnection layout intended for a on chip businesses. Improve a nice of provider, Throughput, Congestion and state of being inactive in a NoC, The proposed engineering steadily set up itself concerning device modules, as an instance, package deal based, transfer and statistics parcel size with the aid of various the states of correspondence additionally it is necessity at a run time. Within a network on Chip remained making use of stretched out XY calculation to development execution of correspondence. Proposed configuration work evades a halt then information misfortune in a manner with a assistance of this plan. It is able to accomplish low idleness with excessive statistics thru put. Inside this paper we are getting a beyond strategy and a proceed toward a dynamic reconfigurable transfer in a community on Chip without affecting SoC functionality. Reconfigurable VLSI engineering designed for a switch is a number one answer for a correspondence interface nature of management go adaptability of enterprise, value of chip. 2 The plan is created utilizing verilog HDL language and tried on modelsim to the useful rightness. An layout is created has to conquer a portion of the crucial systems administration issues like prevent and stay bolts. It is moreover executed and attempted on maximum latest Xilinx FPGA for the real execution. This paper affords the particular. Analysis and selection inside the dynamic reconfigurable router in a network on Chip.","PeriodicalId":174376,"journal":{"name":"Indian Journal of Data Communication and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131587199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Faceium–Face Tracking","authors":"Jufin P A, Amrutha N","doi":"10.54105/ijdcn.b3923.082522","DOIUrl":"https://doi.org/10.54105/ijdcn.b3923.082522","url":null,"abstract":"Human faces are identified and localized via facial detection, which ignores any backdrop objects like curtains, windows, trees, etc. Each frame of the video is run through multiple stages of classifiers in OpenCV's Harr cascade, and if the frame passes through each level, the face is considered to be present; otherwise, the frame is dismissed from the classifier, which means that the face is not detected. When an image is detected, OpenCV also returns the height and breadth of the picture along with its cartesian coordinates. The center coordinates of the image can be determined from these coordinates. When the face is detected, these coordinates are sent via the pyserial library to the Arduino UNO. The camera is attached to one of the servos that are connected to the Arduino to create a pan/tilt mechanism. The servo will align to move the face toward the center of the screen when its coordinates are off-center.","PeriodicalId":174376,"journal":{"name":"Indian Journal of Data Communication and Networking","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130126986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges in Sinkhole Attack Detection in Wireless Sensor Network","authors":"Dr. Akhilesh A. Waoo, V. Tiwari","doi":"10.35940/ijdcn.c5016.081421","DOIUrl":"https://doi.org/10.35940/ijdcn.c5016.081421","url":null,"abstract":"Wireless sensor networks (WSN’s) comprise limited energy small sensor nodes having the ability to monitor the physical conditions and communicate information among the various nodes without requiring any physical medium. Over the last few years, with the rapid advancements in information technology, there has been an increasing interest of various organizations in making the use of wireless sensor networks (WSN’s). The sensor nodes in WSN having limited energy detects an event, collect data and forward this collected data to the base node, called sink node, for further processing and assessment. Few attributes of WSN’s like the energy consumption and lifetime can be impacted by the design and placement of the Sink node. Despite various useful characteristics WSN’s is being considered vulnerable and unprotected. There is a large class of various security attacks that may affect the performance of the system among which sinkhole an adversary attack puts dreadful threats to the security of such networks. Out of various attacks, a sinkhole attack is one of the detrimental types of attacks that brings a compromised node or fabricated node in the network which keeps trying to lures network traffic by advertising its wrong and fake routing update. Sinkhole attacks may have some other serious harmful impacts to exploit the network by launching few other attacks. Some of these attacks are forwarding attacks, selective acknowledge spoofing attacks, and they may drop or modify routing information too. It can also be used to send fake or false information to the base station. This study is analyzing the challenges with sinkhole attacks and exploring the existing available solutions by surveying comparatively which used to detect and mitigate sinkhole attacks in the wireless sensor network.","PeriodicalId":174376,"journal":{"name":"Indian Journal of Data Communication and Networking","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122501184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of a Efficient Router using X Y Algorithm","authors":"Geethanjali N, Dr. Rekha K.R","doi":"10.54105/ijdcn.b5009.061321","DOIUrl":"https://doi.org/10.54105/ijdcn.b5009.061321","url":null,"abstract":"The engineering for on chip network configuration utilizing dynamic reconfiguration is an answer for Communication Interfaces, Chip cost, Quality of Service, ensure adaptability of the organization. The proposed engineering powerfully arrange itself concerning Hardware Modules like switches, Switch based packet , information to a packet size with changing the correspondence situation and its prerequisites on run time. The NOC Architecture assumes urgent part while planning correspondence frameworks intended for SOC. The NOC engineering be better over traditional transport, mutual transport plan , cross bar interconnection design intended for on chip organizations. In a greater part of the NO C engineering contains lattice, torus or different geographies to plan solid switch. In any case, the greater part of the plans are neglects to advance a Quality of Service, blocking issues, cost, Chip as well as mostly plan throughput, region transparency with inactivity. Proposed plan we are planning a reconfigurable switch for network on chip plan that improve the correspondence performance. The proposed configuration dodges the restrictions of transport based interconnection plans which are frequently applied in part progressively reconfigurable FPGA plans. . With the assistance of this switch plan we can accomplish low inactivity and high information throughput.","PeriodicalId":174376,"journal":{"name":"Indian Journal of Data Communication and Networking","volume":"133 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127431746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Marketing and Campaign Management via Social Networks and the Effects of Electronic Advertising","authors":"F. Sabbagh","doi":"10.35940/IJDCN.B5004.061321","DOIUrl":"https://doi.org/10.35940/IJDCN.B5004.061321","url":null,"abstract":"This paper aims to show that the marketing and management of advertising campaigns have contributed in a positive and growing way since the nineties until now bring in targeted customers and increase sales of electronic products. Social communication networks are transformed into the promoting and marketing advertising forum in order to automatically attract customers without the need for traditional sales methods. In this sense, electronic marketing represents the space of commercial transactions of the future. Therefore, this type of marketing and the management of campaigns promoting social media via social networks have a direct impact on internet users by the effect of electronic advertising.","PeriodicalId":174376,"journal":{"name":"Indian Journal of Data Communication and Networking","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132318021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhanced Data Storage Technique on Cloud Computing","authors":"Kamlesh Sharma, Nidhi Garg","doi":"10.35940/IJDCN.B5007.061321","DOIUrl":"https://doi.org/10.35940/IJDCN.B5007.061321","url":null,"abstract":"Exercising a collection of similar numerous easy to get sources and resources over the internet is termed as Cloud Computing A Cloud storage system is basically a storage system over a large scale that consist of many independent storage servers. During recent years a huge changes and adoption is seen in cloud computing so security has become one of the major concerns in it. As Cloud computing works on third party system so security concern is there not only for customers but also for service providers. In this paper we have discussed about Cryptography i.e., encrypting messages into certain forms, it’s algorithms including symmetric and asymmetric algorithm and hashing, its architecture, and advantages of cryptography.","PeriodicalId":174376,"journal":{"name":"Indian Journal of Data Communication and Networking","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117242967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of a Efficient Router using X Y Algorithm","authors":".N Geethanjali, K. Rekha","doi":"10.35940/IJDCN.B5009.061321","DOIUrl":"https://doi.org/10.35940/IJDCN.B5009.061321","url":null,"abstract":"The engineering for on chip network configuration utilizing dynamic reconfiguration is an answer for Communication Interfaces, Chip cost, Quality of Service, ensure adaptability of the organization. The proposed engineering powerfully arrange itself concerning Hardware Modules like switches, Switch based packet , information to a packet size with changing the correspondence situation and its prerequisites on run time. The NOC Architecture assumes urgent part while planning correspondence frameworks intended for SOC. The NOC engineering be better over traditional transport, mutual transport plan , cross bar interconnection design intended for on chip organizations. In a greater part of the NO C engineering contains lattice, torus or different geographies to plan solid switch. In any case, the greater part of the plans are neglects to advance a Quality of Service, blocking issues, cost, Chip as well as mostly plan throughput, region transparency with inactivity. Proposed plan we are planning a reconfigurable switch for network on chip plan that improve the correspondence performance. The proposed configuration dodges the restrictions of transport based interconnection plans which are frequently applied in part progressively reconfigurable FPGA plans. . With the assistance of this switch plan we can accomplish low inactivity and high information throughput.","PeriodicalId":174376,"journal":{"name":"Indian Journal of Data Communication and Networking","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131367818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android Security Analysis using Mobile Sandbox","authors":"Munishka Vijayvergiya, Abhignya Tayi, Sanyam Jain, Sanjana Reddy","doi":"10.35940/IJDCN.C5015.061321","DOIUrl":"https://doi.org/10.35940/IJDCN.C5015.061321","url":null,"abstract":"Today, smartphones and Android devices are effectively in development like never before and have become the easiest cybercrime forum. It is necessary for security experts to investigate the vengeful programming composed for these frameworks if we closely observe the danger to security and defence. The main objective of this paper was to describe Mobile Sandbox, which is said to be a platform intended to periodically examine Android applications in new ways. First of all in the essence of the after-effects of static analysis that is used to handle the dynamic investigation, it incorporates static and dynamic examination and attempts to justify the introduction of executed code. On the other hand, to log calls to native APIs, it uses those techniques, and in the end, it combines the end results with machine learning techniques to collect the samples analysed into dangerous ones. We reviewed the platform for more than 69, 000 applications from multi-talented Asian international businesses sectors and found that about 21% of them officially use the local calls in their code.","PeriodicalId":174376,"journal":{"name":"Indian Journal of Data Communication and Networking","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128081444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}