H. Vidhya, Abinaya Inbamani, S. Lingeswaran, R. Abishek, R. Harish, K. Kishor
{"title":"Internet of Medical Things Applications for Healthcare Industry","authors":"H. Vidhya, Abinaya Inbamani, S. Lingeswaran, R. Abishek, R. Harish, K. Kishor","doi":"10.1109/ICMNWC52512.2021.9688401","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688401","url":null,"abstract":"Health of the human beings is really need to be taken care at the most. At present, the medical field is progressing well and facilitating the people to consult doctor even online which we normally term as telemedicine. Such a system should be automated to make it even more effective. Healthcare automation ensures physical and moral support to the patient and reduces the need of a caretaker near the patient. In order to make automation possible in health care, Internet of Things (IoT) contributes a lot. The proposed work is based on Internet of Things being connected to electronic devices via a public or private cloud to catch or screen information and empowers them to naturally trigger certain occasions or events. It also includes various monitoring system in healthcare such as heart beat rate monitor, pill bottle and drips bottle remainder, electronic paralysis patient caretaker. These monitoring systems are used to monitor patient health remotely using sensors and mobile communication devices. The heart beat sensor is used which monitors the heart rate of a person and transmits the heart rate readings over Internet and during abnormality, an alert message will be sent to the doctor’s mobile. As it very evident that the paralyzed people will not be able to communicate properly to explain what they need, the proposed system helps the disabled person to show hand gestures which in turn will display the need of the patient on an LCD screen. It is very common that due to human nature, quite good number of people skips their medication. In order to ensure proper medication, the proposed system also involves a technique to remind the people to take pill on time. The collection of pills is made possible by using a mechanical set up which consists of motor and a wheel. One more issue has been addressed by proposed system to indicate the level of glucose in drips bottle and provides information to the care taker or medical assistant to replace the drips bottle before it is completed.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126313045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defending Multiple Attack Via Multiple Algorithms With Fault Tolerance","authors":"M. Grace, M. Sughasiny","doi":"10.1109/ICMNWC52512.2021.9688377","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688377","url":null,"abstract":"Smart devices are prone to numerous attacks these days. Many number of malwares attacks with many ways. Increasing attacks with many attacking ways evades standard prediction methods. The most dangerous attacks among them is colluding attacks. This collusion method make prediction more complex. Data privacy and system integrity will be fragile. Information leakage will be high through this collusion attacks. The android malware detection methods use static, dynamic and hybrid method. From Code control flow graphs patterns will be extracted through this method. both the direct and indirect communication channels will be tracked by these methods.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129763102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Cloud Optimization Model for CSP, Tenant and User Through Container","authors":"Muthakshi. S, M. K","doi":"10.1109/ICMNWC52512.2021.9688531","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688531","url":null,"abstract":"The system leverages an optimization scheme for the tenant, client and CSP. This guided optimization model design acts as a intermediate SP (service provider) that guides the user for effective data streaming and resource allocation. A proper resource allocation strategy by checking the availability, size, security, and cost-effective service providers are deliberated. A deep neural learning is emphasized to produce a complete analysis on cloud. An optimization technique used to systemize the information in cloud. A new systematic Enhanced profit/loss (EPF) calculator implemented to calculate the profit or loss that are established during resource allocation. In case the loss rate is more then it gets controlled during the transaction itself. By analyzing the ratings, comments and the report a feedback record produced that helps in choosing a trustworthy container to the tenant. The tenant suggestthe particular trustworthy container to the user likewise the cyclic recommendation process is proceeded. From the proposed optimization model the experimental results are deliberated. The results demonstrates a profit for several users and CSP bu eduring a organized allocation scheme.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129901758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brain Tumor Detection Using Convolutional Neural Network","authors":"G. Kumar, Puneet Kumar, D. Kumar","doi":"10.1109/ICMNWC52512.2021.9688460","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688460","url":null,"abstract":"A brain tumor (BTR) is the development of aberrant and uncontrolled cells in the brain. The detection of a BTR in its early stages is essential in the treatment of its sufferers. There are various ways to diagnose a BTR but Imaging is one of the accurate ways to find the critical one. There are various imaging tests available like Magnetic Resonance Imaging (MRI), Computerised Tomography (CT) scan, and Positron Emission Tomography (PET). MRI is preferable among all because it is highly adept at capturing images that help doctors determine if there are abnormal tissues within the body. Detecting BTR by just looking into MRI images is prone to human errors and the patient may reach the end stage of the disease. Therefore, the main objective of this research is to create a Convolutional Neural Network (CNN) that can detect and classify whether a patient has a BTR or not. In the proposed method, ‘Leaky ReLU’ activation function with convolution 2D layer (Conv2D + Leaky ReLU) combine and compares the model accuracy with a pre-implemented CNN model i.e., (Conv2D + ReLU) layers combinations. The proposed model achieved 78.57% validation accuracy, which is higher than the normal pre-implemented CNN model. However, the training accuracy score of both the model is 99.20%.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127799425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GNU Radio and USRP B210 based Software Defined Radio for OFDM Data Transmission","authors":"Mayur Shivaji Gawade, R. Joshi","doi":"10.1109/ICMNWC52512.2021.9688506","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688506","url":null,"abstract":"Wireless communication technology has seen outstanding developments. In the future, several problems like coverage, data rates, and an increase in the number of users have to be faced. Software-defined radios will play a major role in the efficient usage of the available spectrum. To improve the performance, many wireless communication techniques have been proposed but, implementation of proposed techniques in actual hardware is very challenging. Due to advances in technology, developers need to reduce development time and design cycle. The hardware implementation of a system takes a long time, a lot of effort, and requires a high cost. This paper shows the methodology to design digital communication using the GNU Radio platform to accelerate the verification and lessen the time required for validation. It also reduces the implementation cost of the communication system. OFDM has good performance in terms of bit error rate (BER) and high spectrum efficiency. It is used in the next generations like 4G and 5G. This paper presents a practical approach through the GNU Radio platform which is useful in real applications. We implemented OFDM with universal software radio peripheral. An experimental setup is built using two USRP B210. The implementation of OFDM is tested without obstruction and with obstruction.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"77 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132407400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Balakrishna, B. R. Ganesh Prasad, N. Dhanyashree, V. Balaji, N. Krishna
{"title":"IoT based Class Attendance Monitoring System using RFID and GSM","authors":"K. Balakrishna, B. R. Ganesh Prasad, N. Dhanyashree, V. Balaji, N. Krishna","doi":"10.1109/ICMNWC52512.2021.9688482","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688482","url":null,"abstract":"Nowadays most institutions follow a cumbersome method to monitor the attendance of the students manually. The manual method of calling the students and marking the status of it on the book is prolonged and insecure. This paper, designed a new paradigm of monitoring student’s attendance using Radio Frequency Identification (RFID) and Global System for Mobile (GSM) communication technology based on the Internet of Things (IoT). The proposed model consists of both hardware and software parts based on IoT technology. The hardware part consists of components like EM-19 RFID reader, RFID tags, and GSM module. The software part consists of Application Programming Interface (API) to send information instantly to the registered mobile phone. The proposed system works effectively decimating the information of student status to their respective parents/guardian and even authenticated person with valid credentials can access the database from the server from any place and time.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. K, Akkash. C, Sagaya Selvaraj. A, Arockiya Rayal Ruffus. M, Cesario De Cruz. E
{"title":"Sign Language to Voice Translator Using Tensorflow and TTS Algorithm","authors":"G. K, Akkash. C, Sagaya Selvaraj. A, Arockiya Rayal Ruffus. M, Cesario De Cruz. E","doi":"10.1109/ICMNWC52512.2021.9688545","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688545","url":null,"abstract":"In this system, it helps to convert the sign language to voice with hand gestures understanding and capture the motion of hands. Many sign languages are natural languages, but they are differing in construction from oral languages used in proximity to them, and are employed mainly by deaf people in order to communicate. It is based on a Raspberry Pi with a camera module and is programmed in Python with the Open-Source Computer Vision (Open CV) library as a backend. A built-in image processing algorithm on the Raspberry Pi is named gesture that tracks an object (a finger) with features pulled out. The main purpose of a gesture recognition system is to establish a connection between a human and a computer control system. Camera is used in this system and it captures the various gestures of hands. Various algorithms are taking place in processing of image. First preprocessing of the image takes place. Finally, the sign is identified by using Tensor flow algorithm and the outcome result as a voice using TTS algorithm. Open CV Python is implemented in this system. Various libraries are used in this system.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132517323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things (IoT) Based Automated Hydroponics Farming System","authors":"A. P, Manoj Challa","doi":"10.1109/ICMNWC52512.2021.9688452","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688452","url":null,"abstract":"The hydroponic farming technology is highly essential in conventional farming, and it is also characterized as growing plants without soil. It is, in particular, farming that is based on the environment. The hydroponics farming system is a new technology that allows farmers to develop their land without the need for soil and get better results. Particularly in inappropriate locations and environments. Its major goal is to preserve water, increase agricultural yields, minimize the impacts of pesticides and other factors that degrade soil quality, and save the land. It is the cost-effective deployment of hydroponics for small farms.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132590393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RPL over Internet of Things: Challenges, Solutions, and Recommendations","authors":"Khalid A. Darabkh, Muna Al-Akhras","doi":"10.1109/ICMNWC52512.2021.9688375","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688375","url":null,"abstract":"Internet of Things (IoT) has recently attracted significant research interest. Routing protocols have a vital task in meeting the needs of IoT devices with the necessary ability to interwork seamlessly. The major target of this work is to help the IoT research community in understanding all aspects of the most popular IoT routing protocol, which refers to the IPv6 routing protocol for Low-Power and Lossy Networks (RPL). In this work, after investigating the major challenges of RPL and studying a body of the proposed RPL solutions, which are fragmented based on these challenges, we get ultimately capable of shedding the light on all challenges encountered by IoT researchers along with their role in enhancing the RPL and providing what is expected to be dealt with them in a professional manner bearing in mind the limitations of IoT nodes. Not only that, but the research history of RPL is professionally analyzed based on RPL challenges over the years 2010 and 2020 using Google Scholar, Scopus, and IEEE Xplore. Interestingly, the conclusions and recommendations of this study are presented along with effective directions of the future of RPL, to be followed, and its applicability. As a result, the authors anticipate that this study will be useful to all RPL researchers and designers.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133035030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Steganography using RSA Algorithm for Secure Communication","authors":"P. B, Rishika Harish, S. B, Vasanthalakshmi M","doi":"10.1109/ICMNWC52512.2021.9688352","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688352","url":null,"abstract":"Steganography is a method of transmitting a secret message from a sender to a recipient in such a way that a potential intruder is unaware of its presence. The basic goal of image steganography is to make the message invisible to the viewers' sight, removing any suspicion of a hidden message. Whereas cryptography's goal is to convert readable data into unreadable data, this is done to make decryption more difficult rather than invisible. We present information on security enhanced image steganography in this paper. To improve security, the message is encrypted into cipher text and vice versa using the cryptographic technique RSA in its asymmetric version. The sender will encrypt the message with a key, embed the cipher text in an image, and send this image object along with the key to the receiver via any transmission medium, such as the internet, so that the receiver can extract the cipher text from the image and decrypt using the key that the sender has sent. The result was satisfactory and fulfilled the purpose but was limited to grayscale images only.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133833261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}