{"title":"Women's Safety Device Based On Internet Of Things","authors":"Prachi Gupta, Yashika Goyal, Divit Gulati, Palak Rastogi, Shagun Saboo","doi":"10.1109/ICMNWC52512.2021.9688529","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688529","url":null,"abstract":"The arising concern of Women's Safety is not a question of special interests but a national problem of severe symmetries. Women all across the world are confronting many precarious situations like molestation, sexual harassment, acid attacks, and, most serious of all is rape. The World Health Organization calculates that around 30% of women worldwide are constrained to physical and sexual intimate assault at a certain point in their lives. Atrocities held against women can now be brought to an end by bringing an intelligent portable device called SURAKSHA KAWACH into the real world. Suraksha Kawach is an aesthetically designed device that is tiny and easy to hide. Whenever any woman senses insecurity from a stranger or an assaulter is about to attack her, she can activate the device either by a pattern-based tapping or calling out an activation code once with a minimum required frequency. Instantly, the device and its recorder will initiate, and a standard SMS with the victim's location goes to the police and their family members. They would be able to access all the recording data. We will apply GPS and GSM to trace the location to trigger alerts to the pre-programmed contacts stored in the microprocessor.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128619309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. A, Rakshith N V, Samarth Agasthya M S, Sammanay Majumder, R. Rohan
{"title":"A Kiosk to Provide Information on Government Schemes to Rural Population and Other Services","authors":"R. A, Rakshith N V, Samarth Agasthya M S, Sammanay Majumder, R. Rohan","doi":"10.1109/ICMNWC52512.2021.9688455","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688455","url":null,"abstract":"This paper proposes the implementation of a multi-lingual smart kiosk in rural areas of the nation to serve as endpoints for delivery of government schemes and scholarships for children. Kiosk enables the users to view the government schemes announced and particularly to which they are eligible in terms of profession, reservations etc. It also provides a job portal in the localized area for daily wage labourers and agricultural crop demands. The user views the schemes available can proceed to apply, the Aadhaar data would be fetched from the server and necessary documents can be soft scanned and uploaded as an image to relevant department servers. The User details are transmitted to the server, where an approver is allotted to that particular application and he manually approves or rejects the documents based on the documents and data available. A very intuitive interface and visual aid has been developed.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130003534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerability Management using Machine Learning Techniques","authors":"T. Shivani, Hegde Ramakrishna, Nagraj Nagashree","doi":"10.1109/ICMNWC52512.2021.9688490","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688490","url":null,"abstract":"This paper presents some technologies and methods for Machine learning. It then highlights security concerns, attack vectors, and logical vulnerabilities. To address these security concerns and shortcomings, we present an areas way to deal with intelligent weaknesses. Programming vulnerability are an essential worry in the IT security industry, as malicious programmers who find these vulnerabilities can regularly miss use them for revolting purposes. Web applications will continue to be presented to events that fail to capitalize on their drawbacks until the end of time. In this research, we examine how AI methods may be used to improve the visibility of Web Application Firewalls (WAFs) that are structures used to identify and prevent assaults. We provide the Cybersecurity Vulnerability Ontology (CVO), a decided model for formal data depiction of the board region's weakness, and we use it to construct a Cyber Intelligence Alert (CIA) structure that sends out advanced alerts concerning faults and security measures. There thoroughly assessed the CVO just as the exactness, execution, and helpfulness of the CIA framework.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121560720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Performance of Metamaterials Loaded Substrate Integrated Waveguide Antenna For Multiband Application","authors":"Akash Rawat, Arpit Tiwari, Sonam Gour, Ravi Joshi","doi":"10.1109/ICMNWC52512.2021.9688519","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688519","url":null,"abstract":"The investigation of the design and analysis of a Metamaterials loaded Substrate Integrated Waveguide (SIW) antenna for Multiband Applications. A ground arrangement through a radiating rectangular patch conflicting the feed line as well as a mixture of Substrate Integrated Waveguide and Metamaterials is presented for the proposed antenna. These are utilized to improve the antenna's bandwidth and Radiation pattern while also reducing its size. To improve directivity, gain, and bandwidth, a complementary square split ring resonator and Substrate Integrated Waveguide are utilized. The proposed antenna structure is made of FR-4 epoxy with a εr=4.4. The antenna functions over the frequency range of 6-18 GHz, with a resonant frequency for Wireless LAN and WIMAX.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116242789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Masked & Unmasked Face Recognition Using Support Vector Machine Classifier","authors":"Poornima P D, Paras Nath Singh","doi":"10.1109/ICMNWC52512.2021.9688542","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688542","url":null,"abstract":"Face masks become a need in epidemic scenarios such as the Corona virus pandemic of 2020-21. Most companies prefer face authentication instead of fingerprint, signature, and card verification. Face mask gives protection against Corona virus than other traditional methods used for identification. In the case of facial recognition, a machine must detect and recognise the face in a picture. In this paper used methods are supported by machine learning that permits a machine to evolve through a learning process and to perform recognition tasks. Caffe model of deep learning is used for face detection. The training dataset contains both masked and non-masked faces. This project and outcome has developed an approach to recognize faces in a real-time video stream that can also be used in the existing recognition systems to identify masked faces. Facial recognition has been done with a Support Vector Machine classifier. All are implemented in Python with OpenCv with tools modules and sub-modules.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126280418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. C. Chinvar, M. Rajat, Ravi L Bellubbi, Sanjay Sampath, Kavita Guddad
{"title":"Ambulance Siren Detection using an MFCC based Support Vector Machine","authors":"D. C. Chinvar, M. Rajat, Ravi L Bellubbi, Sanjay Sampath, Kavita Guddad","doi":"10.1109/ICMNWC52512.2021.9688340","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688340","url":null,"abstract":"This paper proposes a mechanism to accurately identify ambulance sirens using an audio signal processing technique and an ML algorithm to provide consistent predictions. The improvement in the accuracy of the machine learning model can be attributed to the improved training dataset. Further, since the training dataset can cause a higher computational overhead, this paper proposes a method to achieve a reduction in the dimensionality of the training dataset. The dataset obtained from the Kaggle platform has been compared with the dataset that is created specifically for this study. This comparative study is used to demonstrate the type of dataset that produces the most efficient prediction of ambulance sirens.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126178675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges Identified for the Efficient Implementation of the Hybrid E- Learning Model During COVID-19","authors":"Rafath Zahra, Ananthi Sheshasaayee","doi":"10.1109/ICMNWC52512.2021.9688533","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688533","url":null,"abstract":"Many educational institutions invest in technology to make the learning space more learner friendly. Research innovations has contributed to re-shape the education system to be more technology-driven and to be more efficient in terms of learner satisfaction. Hybrid E-Learning Model provides such technology-enhanced learning which is most suitable as a solution to enhance education during the COVID-19 pandemic. This paper produces the proof to give a clear analysis of the current research status on the effectiveness of Hybrid Learning Model during this pandemic. The benefits and challenges of implementing Hybrid Learning Model and possible solutions to overcome the given challenges are recorded. The challenges of this learning model were observed by collecting data from learners and facilitators who underwent teaching-learning experience in the Hybrid Learning Environment.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126858801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. G, E. Uma, B. Senthilnayaki, A. Devi, C. Rajeswary, P. Dharanyadevi
{"title":"Trust Score Evaluation Scheme for Secure Routing in VANET","authors":"M. G, E. Uma, B. Senthilnayaki, A. Devi, C. Rajeswary, P. Dharanyadevi","doi":"10.1109/ICMNWC52512.2021.9688475","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688475","url":null,"abstract":"An Intelligent Transportation System has given a new dimension for Vehicular Communication so called VANET. This Vehicular network is the subcategory of Mobile Adhoc Network. The Vehicular technology enables the communication between the transporting system and with infrastructure through a wireless medium. The purpose of communication is to share environmental related information other messages in order to alert the vehicles that are coming behind. This will make the user know the information well in prior which avoids unnecessary accidents and uncomforted situations. The messages are gathered by the vehicles which on in front will pass that to other transports or infrastructure. The message dissemination happens between the transports and the infrastructure which are connected in the network. For this, it is necessary to check the genuineness of the transport, where there can be a possibility for disseminating bogus messages for their own benefits. These vehicles are believed to be untrusted transport that needs to be identified and has to be eliminated from the network topology to guarantee a secure network. In this proposed work, a trust evaluation scheme for effective trust calculation in identifying the bogus transport. The primary focus of this proposed method is to detect anonymous transport and find the optimal path for the message to reach the destination. The parameters that are mainly considered are Packet Delivery Ratio, Delay. This proposed scheme achieves better accuracy compared to the existing system.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127010301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. K, Sagar Rudagi, N. M, Ranispoorti Patil, Rohini Wadi
{"title":"Comparative Study: Stock Prediction Using Fundamental and Technical Analysis","authors":"P. K, Sagar Rudagi, N. M, Ranispoorti Patil, Rohini Wadi","doi":"10.1109/ICMNWC52512.2021.9688449","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688449","url":null,"abstract":"The stock market, which is also called the equity or the share market, is a place where the shares of publicly listed companies are traded. The price of a particular stock can be approximated using two types of analysis, technical and fundamental analysis. The growing applications of machine learning have made it possible to be applied to the task of prediction using historical stock data, namely OHLC (open, high, low, and close) data and publicly listed companies’ annual and quarterly financial reports. In this survey paper, we explore the current advancements in this field using different Artificial Neural Network architectures such as Long Short Term Memory Networks, Recurrent Neural Networks, Support Vector Machines, Deep Learning, and Machine Learning techniques. These different methodologies and architectures are compared on how effective the existing systems are for the task of stock price prediction in the view of long-term investing. This paper also discusses how these techniques could be used to develop a system that would help investors decide to invest.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134395290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Routing Protocols for MANET-enabled IoT","authors":"Aruna Gupta, T. Sasikala","doi":"10.1109/ICMNWC52512.2021.9688553","DOIUrl":"https://doi.org/10.1109/ICMNWC52512.2021.9688553","url":null,"abstract":"Mobile Ad-hoc Networks (MANET) is an autonomous network consisting of movable devices that can form a network using wireless media. MANET routing protocols can be used for selecting an efficient and shortest path for data transmission between nodes in a smart environment formed by the Internet of Things (IoT). Networking in such MANET-enabled IoT system is based on the routing protocols of MANET, data sensing from things, and data handling and processing using IoT. This paper studies proactive approach-based secure routing protocols for MANET-enabled IoT and analyses these protocols to identify security issues in it. Since this fusion network is resource-constrained in nature, each of the studied protocol is evaluated to check if it is lightweight or not. Also, the solution to defend against active attacks in this network is discussed.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132449511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}