F. Azam, Arun Biradar, Neeraj Priyadarshi, Sneha Kumari, D. Almakhles, Shrikant S. Tangade
{"title":"A Framework For Secured Dissemination of Messages in Internet of Vehicle (IoV) Using Blockchain Approach","authors":"F. Azam, Arun Biradar, Neeraj Priyadarshi, Sneha Kumari, D. Almakhles, Shrikant S. Tangade","doi":"10.1109/ICMNWC52512.2021.9688397","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688397","url":null,"abstract":"Growth of automated vehicle and emergence of Vehicular Social Network (VSN) gave rise to the various services such as traffic recommendation system, alert messages in case of danger and bad weather condition etc. All these communications are susceptible to various security and privacy attacks. Need of a robust infrastructure that is capable of guaranteeing communication with low storage cost for safety message and also thwart basic security attacks on the communicating vehicle. Vehicular Adhoc Network (VANET) provides a promising solution. PKI based infrastructure normally relies on a central trusted authority (TA) take decision and hence a collapse of TA leads the complete communication system down which may results in a catastrophe. Hence, a Blockchain based framework has been proposed to mitigate the security and privacy attacks. Theoretical analysis proves its effectiveness in storing a safety message as 2.33 MB per year.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132968498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secured Framework for Offline File Synchronization using ANN and Storage Optimization Schemes","authors":"Jagadish R M, A. D","doi":"10.1109/ICMNWC52512.2021.9688485","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688485","url":null,"abstract":"Advancement in the area of computing and mobile technology have led to the occurrence of a new computing atmosphere by utilizing the different categories of small sized mobile devices such as smart phones PDA, Handheld PCs (HPC) and Pocket PCs. Synchronization between a server and an android device helps the users to use applications more effectively. Synchronization is possible if the user is connected to the internet, if user is not connected to the internet the user task is down till connection regains. To overcome such difficulties in task completion, offline data synchronization scheme is adopted and can save data locally and remotely this can be managed by ANN using classification technique. Offline data synchronization is one of the techniques that helps user to design an application that works without an internet connection and protection of confidential and secure information is a concern for all dealing with such information, Breach in security state for those data result in data loss this can be overcome by validating the user through speech recognition while at login and encrypting the data before uploading to the cloud server. While at the server side before storing the encrypted data into cloud data is optimized by removing the duplicate and unnecessary space bits then stored into the cloud server.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133439706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cross-Layer based Hidden Marko(C-HMM) Model for Detection and Prevention of Malicious Attacks in Wireless Ad-hoc Networks","authors":"J. S, Manjula R, Johnpeter T","doi":"10.1109/ICMNWC52512.2021.9688414","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688414","url":null,"abstract":"Wireless mobile ad-hoc network is a self-configuring network which is used several mobile nodes. Mobile nodes are hop to hop communication between the nodes. In recent years' malicious attacks (blackhole and wormhole attack) have a serious thread in wireless communication. Blackhole attack and wormhole attack consume more energy, computing resource, network behaviour. In this paper a novel Cross-layer based Hidden Marko model(C-HMM) is proposed to detect and isolating a blackhole and wormhole attacks with high performance and less communication cost in wireless ad-hoc networks. The proposed algorithm C-HMM beats HMM in terms of packet loss ratio, delay, packet received and PDR. Experimental results are comparing with various parameters with help of ns2.34 simulation software.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116208011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Resource Scaling for Dynamic Workload in Cloud Computing","authors":"Megersa Daraje, Javed Shaikh","doi":"10.1109/ICMNWC52512.2021.9688556","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688556","url":null,"abstract":"In the Cloud, there are enough amount of various resources to be provided for the users according to their request. To provide services the cloud resources need to be scaled up and out. Cloud resource provisioning uses two approaches. They are horizontal and vertical scaling approaches. Horizontal scaling approaches take some minutes to configure additional machines and less utilization of resources. But this approach is available. In the vertical approach, requests are not handled by adding additional virtual machines like Horizontal, resources are added on the already executing devices within a second. The objective of this work is to develop a hybrid approach by hybridizing both scaling approaches to increase utilization of resources and provide flexible resources that can satisfy user’s requests by performing in such order Vertical, horizontal approaches. The results of the study demonstrate that the proposed approach is more efficient in comparison with the existing approach. CloudSim has been used for the implementation of the developed approach. Scaling is performed by following the capacity of the machine and resources threshold value.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114664341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing and Implementation of 32-bit 5 stage Pipelined MIPS based RISC Processor Capable of Resolving Data Hazards","authors":"K. K, Vijaya Prakash A. M","doi":"10.1109/ICMNWC52512.2021.9688435","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688435","url":null,"abstract":"The main objective is to design and implement a 5-stage pipelined 32-bit High performance RISC Processor with MIPS architecture which is also capable in detecting and resolving Data Hazards. The Processor is designed as an instantiation of submodules using Verilog HDL. Pipelining is incorporated between each block thus boosting the processor speed. The other various modules being used are Memories for Instruction and as well as Data, Control Unit, Arithmetic and Logical Unit, Controller, Buffers etc. The processor also incorporates the design that detects Hazards and Data forwarding unit which detects and resolves all kind of data hazards and provides effective operation of the pipeline. The proposed designed model has better performance in terms of Delay, Power and Area when compared with other state of the art designs. The power consumption of 0.023W was achieved by incorporating above techniques. The design synthesis and critical factors like power, frequency, area, and propagation delay is analyzed using Cadence Genus tool and simulated using Model Sim.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":" 27","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132158379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seema Magadum, N. Archana, Santoshkumar Hampannavar
{"title":"Dynamic Average Consensus Based Control Scheme in Community Microgrid","authors":"Seema Magadum, N. Archana, Santoshkumar Hampannavar","doi":"10.1109/ICMNWC52512.2021.9688421","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688421","url":null,"abstract":"Microgrid addresses the solution for many real time complications of centralized grid operation. The gap between the centralized and smart grid paradigm can be filled with the help of smartly operating microgrid systems. The challenges faced in centralized control can be addressed by distributed control techniques. The hierarchical control strategies are widely adopted for reliable operation of microgrid systems. The three control layers adopt different techniques to meet the voltage and frequency regulation along with power sharing concerns. The secondary layer can adopt dynamic average consensus algorithm for exchanging the data to immediate neighbor unit with limited communication requirement. The algorithm achieves the aim of centralized controller in a distributed manner. This paper provides review on the dynamic average consensus based distributed control in microgrid operation.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"329 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133286912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sagar Dev Achar, C. Shankar Singh, CS Sumanth Rao, K. Pavana Narayana, Ashwini Dasare
{"title":"Indian Currency Recognition System Using CNN And Comparison With YOLOv5","authors":"Sagar Dev Achar, C. Shankar Singh, CS Sumanth Rao, K. Pavana Narayana, Ashwini Dasare","doi":"10.1109/ICMNWC52512.2021.9688513","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688513","url":null,"abstract":"Computer vision is the most anticipated technology of the 21st century. Object detection is the basic functional block in Convolution Neutral Network. The objective of the proposed methodology is to design a system to detect Indian currencies which can help visually impaired people to recognize and read out the value of all possible Indian paper currencies with more than 79.83% accuracy. In this approach, the features of the notes are extracted in separate Red Green Blue (RGB) layers, normalized and quantized into machine readable data that is later trained with Adam optimizer which gives Probabilistic Prediction of each type of currency with a loud audio output. The Convolution Neural Network model is further compared with Yolov5 model which is considered to be the fastest algorithm for object detection. After comparison the accuracy of Convolution Neural Network model was found to be just 1% lesser than that of the YOLOv5 model.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133962341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conglomerate Enhanced Algorithm for Asset Awarding in SDN Enabled Virtual Nexus for Cloud Habitat","authors":"A. Patil, Bharati Harsoor","doi":"10.1109/ICMNWC52512.2021.9688510","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688510","url":null,"abstract":"Although nexus and server assets are collocated and well maintained by a solitary executive entity, the popular Software-Defined Nexus (SDN) hypothesis to sensibly integrate the nexus control plane and automate the layout of creature nexus aspects in Cloud Data Centers employs disjoint control mechanisms for their respective administration (DCs). This paper presents a new hybrid optimization technique for resource allocation (HOA-RA) in an SDN enabled essential nexus in an IaaS cloud surroundings to address these problems. The improved pattern search (IPS) method which is introduced to the SDN structure in the HOA-RA approach method, which allows the control layer to be transferred from the information broadcast layer to the manage level surface. The ideas of nexus virtualization were then integrated with the Enhanced swallow search (ESS) algorithm to split bodily communications in order to accommodate many help providers in finding the nexus. To optimize nexus resources, the biddable retrieve requires an optimal rule- based fusion (ORBF) method; the control plane SDN can be leveraged for systematic virtual network, The HOA-RA concept is employed in the CloudSim habitat. The analysis of the performance shows that the proposed HOA-RA design outshine existing state-of-the-art solution management in terms of organization.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"15 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116772710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IOT Based Industrial Fault Diagnosing System Using Android","authors":"K. Swetha, Namitha A R","doi":"10.1109/ICMNWC52512.2021.9687828","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9687828","url":null,"abstract":"Due to late mechanical progress, development equipment for low-stress sensors has proven financially feasible. Although industrialization increases the level of robotization at the same time that it blames modern territories. So it was assumed that there would be a framework for filtering and accessing modern blame. Special attention is paid to factors which may influence human well-being. Mechanical verification is the accumulation of data in various business sectors and at consistent time intervals with the ultimate aim of providing the information that could be used to characterize current conditions. Due to the multiform nature of the parameters of large varieties are found between different enterprises. Here we recommend a comparative computerization framework which will be utilized as a part of industry for observing different parameters, for example, temperature, dampness gas and fire. We utilize distinctive sensor to screen furthermore, distinguish the blame. These are associated with the microcontroller and microcontroller is interfaced to android application. We utilize a Bluetooth module to impart microcontroller with android application.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"389 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123528361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Lung Cancer Classification using Multiple Feature Extraction with SVM and KNN Classifiers","authors":"A. S., M. Z. Kurain, M. Nagaraja","doi":"10.1109/ICMNWC52512.2021.9688404","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688404","url":null,"abstract":"All over the world for individual’s death lung malignancy is considered as typical reason. Image processing utilization has increased stage by stage. With tremendous images volume in general radiologist predictions to discover lung malignancy may not be perfect. This paper concentrates at texture feature extraction and classification of lung CT image as normal or affected. Different phases involved are preprocessing, segmentation, feature extraction and classifier. Preprocessing is done using median filter followed by Watershed segmentation. Watershed segmentation is culled for choosing the required region of interest, and then the performance analysis of lung cancer classification is done using multiple features such as GLCM, LBP and HOG and various classifier to choose the best suitable combination of features and classifier for improved classification results. The results and methodology represents further improvements in precision in lung malignancy identification and with enhanced exactness in classification outcomes.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124733450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}