{"title":"Routing Techniques in Body Sensor Network System for Healthcare: Applications, Challenges, and Research Trends","authors":"Chetan Pandey, Sachin Sharma, Priya Matta","doi":"10.1109/WCONF58270.2023.10235256","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235256","url":null,"abstract":"Pre-analysis of health using sensor technologies will become quite popular during this decade and will be used by the common citizen as well. Transmission of body parameters is crucial in the Body Sensor Network (BSN) system because erroneous transmission can result in a number of problems, including energy waste, transmission delays, data loss, decreased stability, and poor data transfer efficiency. In the last ten years, many research were done to address these problems, particularly in light of the development of biosensors. This paper will discuss many research projects based on various BSN routing techniques. The author described innovative work completed for effective information transmission in a BSN and demonstrated a comparison study based on six crucial parameters: stability, network lifetime, energy efficient, reliable, network delay, and throughput. The author also discusses various challenges and research trends that have been reported by various authors throughout their research.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132879770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating the Performance of Bluetooth Technology by Sensor Monitoring in Industrial WSN","authors":"Romil Jain","doi":"10.1109/WCONF58270.2023.10235061","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235061","url":null,"abstract":"The use of Bluetooth technology in industrial Wireless Sensor Networks (WSN) offers performance benefits, such as high network throughput, scalability, and extended range. As such, it has become a popular choice for performing critical industrial monitoring operations that require constant monitoring of multiple sensors distributed throughout a factory or warehouse. This paper examines the performance of a Bluetooth WSN in an industrial setting, and evaluates the advantages of using Bluetooth for sensor monitoring. Results from real-world deployments are presented as well as simulations, making up a comprehensive picture of the benefits of using Bluetooth for industrial monitoring. The findings of this research indicate that Bluetooth is a viable choice for future industrial WSN deployments, providing reliable and robust coverage even in difficult industrial environments.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133646906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification Method and System of Abnormal Electricity Transaction Price Based on Alpha Convex Hull","authors":"Zhongkang Wei, Tianbo Zhu","doi":"10.1109/WCONF58270.2023.10235017","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235017","url":null,"abstract":"This article presents a method and system for identifying abnormal electricity trading prices based on alpha convex hull, which includes the following steps: inputting declared trading instructions into the trading system; The trading system extracts the price/electricity information from the declared trading instructions; Evaluate the risk level of transaction prices through the alpha convex hull algorithm behavior model library in the rule calculation engine; The risk level prompt information is sent to the database of the monitoring system and the user end of the trading system through the web end; Preprocess the price/electricity data and transfer it to the log system and Hadoop data warehouse; Regularly or quantitatively extract data from the database through specific commands, and update it to a behavioral model; end-of-job. The present invention solves the technical problems of high credit risk, high information authenticity risk, and low control power of transaction default risk in the trading process of existing power retail e-commerce platforms.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"243 2‐8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132442993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Gunavathie, P. D. Sneha, K. Yuvarani, P. Swathyshree
{"title":"An Exploration of Real-Time Intrusion Detection and Prevention Systems for Next Generation Networks","authors":"M. A. Gunavathie, P. D. Sneha, K. Yuvarani, P. Swathyshree","doi":"10.1109/WCONF58270.2023.10235147","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235147","url":null,"abstract":"Network security is facing new difficulties as a result of the development of 5G and other networks as well as software-defined networking (SDN). As the volume and complexity of network traffic increase, so does the risk of cyber threats and attacks. Designing and implementing a real-time Intrusion Detection and Prevention System (IDPS) for 5G and beyond SDNs requires addressing several challenges. These challenges include the high data rate and volume of traffic, the distributed and dynamic nature of 5G and beyond networks, and the complexity of the SDN architecture. A global IDPS architecture should be created to address these issues, using methods based on machine learning to quickly identify and categorize intrusions. To allow actual time monitoring and avoidance, the IDPS should also work across all the SDN design layers and interact with the SDN router. The implementation of a real-time IDPS for 5G and beyond SDNs would enhance network security by enabling real-time detection and prevention of intrusions. This would reduce the risk of data breaches, network downtime, and other Cyber Security threats. Moreover, a real-time IDPS would allow network administrators to respond to intrusions quickly and effectively, minimizing the impact of cyber threats on network operations. The actual time detection and avoidance of intrusions system for 5G technology along with SDN is thoroughly reviewed in this paper.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132750424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of Accelerating Genetic Algorithms in System Engineering","authors":"Shaochi Li, Naiqi Wu, Kaizhou Gao","doi":"10.1109/WCONF58270.2023.10235117","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235117","url":null,"abstract":"Groundwater system engineering is a complex field that involves the management and optimization of water resources. The use of genetic algorithms has been proposed to improve the efficiency and accuracy of groundwater system engineering. Genetic algorithm is a computational tool simulating natural selection and evolution, which is used to find the best solution to complex problems. An accelerated genetic algorithm has been developed to accelerate the optimization process by reducing the required number of iterations. These algorithms use advanced technologies such as parallel processing, adaptive mutation rate, and elite selection strategies to quickly converge to the optimal solution. The application of accelerated genetic algorithm in groundwater system engineering has shown good results. They have been used to optimize oil well layout, pump scheduling, and pollutant remediation strategies. These optimization measures have significantly improved water resource management, including increased efficiency, reduced costs, and improved environmental effects. Overall, accelerated genetic algorithms are a powerful tool for improving groundwater system engineering. With the continuous development and improvement of these technologies, they will undoubtedly play an increasingly important role in managing our precious water resources. Based on FORTRAN90 computer language, this paper studies the application of accelerated genetic algorithm in engineering calculation of groundwater system..","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115647114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Smartphone Permissioned Security Breaches using Machine Learning Techniques","authors":"Atul Kumar, Ishu Sharma","doi":"10.1109/WCONF58270.2023.10234970","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10234970","url":null,"abstract":"Attackers may target cell phones by taking advantage of the rights given to installed applications. Users frequently have to provide application permission when they download and install it on their smartphones. This experimental study concentrates on the identification of permissioned malware assaults in smartphone security breaches using machine learning approaches. In order to uncover security flaws in smartphones, the study compares the effectiveness of three widely used machine learning algorithms: Naive Bayes, K-nearest neighbor, and Decision Tree. Each method was trained and evaluated using the pre-processed data and then divided into training, and testing sets. The study evaluated trained and tested algorithm’s accuracy, precision, recall, and F1 score so that machine learning techniques can be deployed for detecting permissioned malware attack. The results prove that the technique Decision Tree Classifier is performing overall better in comparison with other chosen techniques for spotting security flaws in cellphones. Performance indicators for Naive Bayes were lower than those for the other two algorithms. This study offers insightful information about how well machine learning algorithms can execute early detection of permissioned malware attacks on smartphones, and it can be utilized as a model for creating secure smartphone defenses.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124219963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Devesh Parmar, Harsh Katariya, Arpit Dobariya, R. K. Gupta, S. Bharti
{"title":"Drug Quality Classification Using Sentiment Analysis of Drug Reviews","authors":"Devesh Parmar, Harsh Katariya, Arpit Dobariya, R. K. Gupta, S. Bharti","doi":"10.1109/WCONF58270.2023.10235160","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235160","url":null,"abstract":"Since the pandemic emerged, there has been a shortage in remote access to medical resources, a lack of medical experts and healthcare professionals, an absence of adequate instruments and medicines etc. As a result, many people have passed away. As there is absence of resources, people started off following medical recommendations without sufficient consultation, giving rise to their wellbeing to decline should have been. In recent years, machine learning has found several useful uses. The main objective for the study was to give a drug review prediction which would help to decrease the number of health care specialists and authority needed. In this investigation, we are developing a drug review system that analyses sick persons feedback to forecast patient’s comments using various vectorization algorithms, such as the Count Vectorizer, TF-IDF, Bag of Words, and handy analysis of characteristics that can aid in identifying the most effective course of treatment for a condition using several classification methods. The predicted results were assessed using the precision, accuracy, AUC, and F1 scores. The results demonstrate that the Random Forest Classifier surpasses every other model with an accuracy rate of 94%.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"57 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124337198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unstructured Big Data Quality Measurements and Failed Data Re-Processing Approach","authors":"Prasad Pande, Nikhil Rao","doi":"10.1109/WCONF58270.2023.10235088","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235088","url":null,"abstract":"This paper discusses role of data quality checks, in identifying message loss during large volume semi structured and unstructured data processing. We discuss data quality dimensions, applicable to semi structured and unstructured data in the form of email data. Email data confirms to RFC822 format and can have unstructured data like images, documents as attachments. Along with discussion of applicable data quality dimensions, we also discuss the formulae to evaluate data quality for each of these dimensions. The paper, focuses on big-data reprocessing, starting with need for data re-processing and identifying generic re-processing scenarios. This scenario identification step is important to ensure that the solution caters to all the re-processing requirements. It further discusses about types of data re-processing, core concepts on which re-processing solution is based and approach for handling different type of re-processing. The paper subsequently discusses principles of backlog processing for streaming data. The streaming data like email data, keeps flowing continuously at a very high rate. Any downtime in processing system, results in accumulation of data backlog. This accumulated data must be processed fully without creating a domino of backlogs. This document discusses statistical approach for forecasting time required to clear piled-up backlog of streaming data.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122152392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Similar Images Finder Using Machine Learning","authors":"Sanidhya Nagar, Subhayan Das, Sangeeta","doi":"10.1109/WCONF58270.2023.10235161","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10235161","url":null,"abstract":"Finding similar images using machine learning has become an important technique for image retrieval and organization in a numerous applications. This method involves training deep learning models to recognize visual patterns in images and extract features that can be used to identify similarities and differences between images. These features can then be used to create high-dimensional vectors that represent each image, which can be compared to find similar images. Various similarity metrics and clustering algorithms can be used to group similar images together, enabling efficient searching of large image datasets. This paper provides an outline of the methodology for finding similar images using machine learning, including data collection, preprocessing, deep learning model training, feature extraction, similarity calculation, and clustering. The paper also discusses the practical applications of this technique, such as image retrieval, image organization, and image analysis in fields such as medical research, computer vision, and machine learning. The proposed system can be a valuable tool for content creators, online platforms, and law enforcement agencies to ensure the protection of intellectual property rights and prevent unauthorized use of copyrighted images.","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"60 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120854399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agricultural Management System Based on GPS and GIS","authors":"Yuping Hu","doi":"10.1109/WCONF58270.2023.10234990","DOIUrl":"https://doi.org/10.1109/WCONF58270.2023.10234990","url":null,"abstract":"This article introduces an intelligent agricultural management system based on Global Positioning System (GPS) and Geographic Information System (GIS). This system uses GPS technology for geographic positioning and precise positioning of farmland, collects high-precision geographic information data, and combines GIS technology for analysis, processing, and visualization presentation. This system can intelligently manage farmland, including crop planting, fertilization, irrigation, harvesting, and other processes. At the same time, it can monitor and predict environmental factors such as soil moisture, temperature, and light, and make timely adjustments to ensure the healthy growth, high yield, and stability of crops. The advantages of this system include improving production efficiency, reducing losses, saving resource costs, and increasing profits. The experimental results indicate that the system can effectively improve agricultural production efficiency, promote sustainable development of agriculture, and is of great significance for achieving precision agriculture, agricultural intelligence, and other directions..","PeriodicalId":202864,"journal":{"name":"2023 World Conference on Communication & Computing (WCONF)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124002057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}