{"title":"Effects of Microstrip Array Failures in a Smart Antenna System for 5G Mobile Communication","authors":"Iffath Fawad, H. Kumaraswamy","doi":"10.1109/CSITSS54238.2021.9682895","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9682895","url":null,"abstract":"The main objective of this research is to investigate the effects of element failures in an Antenna Array. The proposed Uniform Linear Array (ULA) of Microstrip Patch Antennas is designed to operate at 3.5 GHz for the upcoming 5G applications. The proposed model is designed and optimised using HFSS. Experimental study is conducted to analyse the effects of failure in terms of Gain, Mutual Coupling and Side Lobe Ratio (SLR). It was found that Gain reduced by 1.3 dB, decrease in SLR by 50% and decrease in Mutual Coupling by 3.42 dB is observed.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"65 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130907269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain Based Health Care Management System","authors":"Bindu Koravatti, M. Indiramma","doi":"10.1109/CSITSS54238.2021.9683252","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9683252","url":null,"abstract":"Electronic health records (EHRs) are only handled by hospitals and not patients, rendering medical advice in several hospitals more difficult. Patients ought to rely on their own healthcare information and restore their own patient records control. The exponential advancement of blockchain technologies facilitates wellness for the General population, medical records and patient knowledge included. This technology provides treatment professionals and patients with detailed and unchanging details and access to EHRs free of charge. In this article, we introduce an attribute-based signature scheme with several authorities to ensure that the blockchain-encapsulated EHRs are legitimate, where a patient endorses an attribute message and does not share details other than the proof he has attested to them. By swapping the hidden pseudorandom feature seeds between the authorities, the protocol resists N-1 deceptive authorities to attack conspiracies. We also formally show that this multiple authority attribute-based signature approach(MAABS) is protected in a random oracle paradigm by imperfection and absolute privacy in the presumptions of bilinear Diffie-Hellman. Using SHA-256 as Hashing algorithm to provide perfect privacy.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134076572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TCP Attack Detection Using Dynamic Threshold","authors":"K. Kavyashree, C. Sowmyarani","doi":"10.1109/CSITSS54238.2021.9683302","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9683302","url":null,"abstract":"In Communication networks, the information obtained by critical vulnerabilities lead to dangerous attacks called TCP (Transmission Control Protocol) Side Channel attacks. If the guess of these tuples of TCP is correct, an attacker can spoof the packet which changes the server’s state. Due to these attacks, it is possible to obtain the details of four tuples of TCP such as Sequence number, Acknowledgement number, Global IPID (Internet Protocol Identification) Counter and port numbers. After obtaining these tuples, this may further help for an attacker to target the required client. These attacks help an off-path attacker to port scans to get round trip time and also to detect how many packets are exchanged. Hence obtaining these tuples plays an important role in network security. This paper provides the detail discussion about various TCP attacks. This paper also provides various approaches for detection of TCP Attacks using Dynamic Threshold.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"85 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134130189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video Based Transcript Summarizer for Online Courses using Natural Language Processing","authors":"Krishna R. Kulkarni, Rushikesh Padaki","doi":"10.1109/CSITSS54238.2021.9683609","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9683609","url":null,"abstract":"Online education has become an effective way to deliver quality education to students. They have become more popular because of their high graphical and pictorial content, delivered by experts in the subjects and convenient for learning at anytime and anywhere. But sometimes, students may not be able to go through the course content due to shortage of time. Video transcript summarizer has got a lot scope in this situation. It highlights the important topics from the video. The idea of summarizing the videos can be extended to online courses videos. This will help students save a lot of time as they can understand the gist of the class within less time without actually watching the video and by just going through the summary. Our system focuses on the development of a module using Natural Language Processing with python to summarize an online class video. The methodology adopted in this project uses Natural Language Processing (NLP) algorithms such as Term Frequency-Inverse Document Frequency (TF-IDF) and Gensim to obtain the summary of video of online course. The model takes URL of a video from user as input. We have implemented summarization process with the help of two algorithms. TF-IDF is an information retrieval algorithm which uses frequency of a term and its inverse document frequency. Gensim is a NLP package that deals with topic modeling. The model also gives the flexibility to the user to decide on as to what percentage of summary is needed compared to the original lecture. The summarization technique is a subjective process. We have incorporated two prominent methods. One is cosine similarity and the other one is ROUGE score. The former does not require human generated summary for reference, whereas latter requires it. The efficiency obtained using Cosine similarity is greater than 90% in both the cases: TF-IDF and Gensim. The efficiency obtained in case of ROUGE score is in between 40-50%.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"1097 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aqua-Custodian Robot","authors":"D. Shubhangi, Baswaraj Gadgay, Shivani Patil","doi":"10.1109/CSITSS54238.2021.9683059","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9683059","url":null,"abstract":"This undertaking emphasis on arrangement and assessment of the stream water surface cleaning robot. The work has done looking at the energy condition of our public streams which are dump with crore litters of sewage and stacked with hurtful materials, rubbish, etc., the public authority of India has accepted accountability to clean streams and put huge capital in various stream cleaning projects like “Namami Gange”, “Narmada Bachao” and many major and medium endeavors. By pondering this, this robot has expected to clean the stream or a water surface. Nowadays basically all the amassing cooperation is being atomized, Automation expects to be a huge part in progress. The principal point of the assignment is to reduce the work, time usage. Segments used for our arrangement is such a way that it accumulates the waste which skims on water bodies and the assembled waste can be easily orchestrated, our thing cleans wastes found like plastic wastes, trees, bottles and distinctive wastes found skimming on water. We separate the misfortune in the water with a help of sensors and our thing is controlled using a convenient application, this can be done in two modes, one is manual mode using the Bluetooth and the other automatic mode using IoT. This paper moreover goes with the advantage of showing the person when the waste collecting canister is completely filled so the individual adequately turns out to be more familiar with when to deplete the waste get-together compartment. pH sensor will screen the water quality alongside TDS meter showing the degree of minerals present in water.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114787303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remote child health monitoring system and personal safety","authors":"Baswaraj Gadgay, D. Shubhangi, Company Maheshwari","doi":"10.1109/CSITSS54238.2021.9683548","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9683548","url":null,"abstract":"With the coming of new economically accessible purchaser grade health and well-being gadgets, it is currently conceivable and extremely normal for consumer to acquire, store, share and find out about a portion of their significant measurements, for example, steps taken, pulse, nature of rest and skin temperature. For gadgets with this wearable innovation, it is normal to discover these sensors inserted in a savvy, or committed wearable wrist groups to such an extent that among different functionalities of a wearable gadget, it is able to do shrewdly helping the parents about their child action levels by utilizing the way that these gadgets can be, what’s more, are ordinarily, worn by individuals for delayed time frames. this system consist of Arduino nano, RFID,GPS and WiFi module(ESP-01)) and a temperature sensor(LM35).The untouch band will be started with the RFID or password here the temperature sensor used to measure the body temperature and through RFID reader The notice will be delivered to the guardian’s mobile phone, and it will include the bus’s location through GPS, indicating that the youngster has been safely entered into the bus and school.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131785371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A detailed Analysis of Lightweight Cryptographic techniques on Internet-of-Things","authors":"S. Srinath, G. Nagaraja, Ramesh Shahabadkar","doi":"10.1109/CSITSS54238.2021.9683091","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9683091","url":null,"abstract":"The use of internet-of-things technology has risen due to the many advantages it offers. The IoT devices network collects and transmits data for processing and performs necessary actions after processing the data. The IoT devices do not have many security mechanisms due to limited functionalities, which can cause the data to be hacked while transmitting it to the server. To provide security to the data, cryptographic techniques can be used. The IoT devices cannot support traditional cryptographic algorithms as they cannot be implemented with the limited resources they possess. Therefore, lightweight cryptographic algorithms have been introduced that are designed to adhere to the restrictions of IoT devices. This paper conducts a study of various works of literature which implement lightweight cryptographic algorithms for heterogeneous IoT devices to provide security to the data being transmitted by constrained IoT devices.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121155013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicle Number Validation System Using Convolution Neural Networks","authors":"R. Amith, S. Kavitha","doi":"10.1109/CSITSS54238.2021.9682900","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9682900","url":null,"abstract":"Recording and maintaining registration number of vehicles at public parking lots, and organizations, hospitals and educational institutions are important for the security of the organization to keep a track of incoming and outgoing vehicles. Manual entry of the registration numbers are tedious, generally not accurate and moreover the records are not tamper proof, which raises serious concerns about security and accuracy.The proposed system aims to solve the above problem by using an optical character recognition system based on a convolution neural network that is trained to interpret characters present on a vehicle’s license plate. The system can be programmed to allow only vehicles that have their license numbers registered with the organization. The system is programmed to instantly send out SMS to the registered user’s mobiles number upon successful access into and exit out of the organization. This enhances the security further and helps in preventing unauthorized access into the organization.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121525669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VTU campus surveillance and student smart accessibility system using IOT","authors":"Baswaraj Gadgay, D. Shubhangi, R. Abhijeet","doi":"10.1109/CSITSS54238.2021.9683672","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9683672","url":null,"abstract":"The Visveswaraya Technological University is one of the most reputed and leading university in India, which is in existence since 1996 and headquartered in Belagavi. The most challenging for any institutions is about student data management, related to their academics, safety and security, accessibility to libraries, laboratories, etc. This project focuses on the safety and security aspect of the student management. The safety of the students within the VTU campus begins with the surveillance of the campus that requires All-time monitoring of the vast area. A four wheeled automated movement-based robot with a path tracking capability provides us the freedom of monitoring the robot, The surveillance aspect is derived through the use of ESP cam 32 that gives continuous monitoring of the campus. The security aspect is dealt with the restricted accessibility and admissibility to various building blocks using RFID technology and connecting all these buildings through internet and store all these data in a freely accessible Google spreadsheet which provide precisive time-based monitoring of entry and exit to and from the respective blocks. The advancement of technology allows us to apply Internet of Things based applications for the surveillance and security of the campus by supervising from any remote location to identify any intruders into the campus or any fraudulent activities within the campus. The application of IOT is used to create a web of integrated accessibility systems that manages the student data by allowing the rightful students and avoiding entry of an outsider to any building blocks of the university. This creates a spreadsheet of entrants which could be used as evidence-based insight about the student’s movement. It acts as a shield of security for the insiders as this reduces the human supervision error by around 60% and also improves an evidence-based suspicion detection.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122532279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Behavioral Study of Advanced Security Attacks in Enterprise Networks","authors":"M. Ashwini Kumari, K. Nandini Prasad","doi":"10.1109/CSITSS54238.2021.9682903","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9682903","url":null,"abstract":"Securing enterprise networks from cyber attacks has become one of the most paramount and daunting tasks for any organization or industry in recent times. Traditional cyber-attacks that use spam, adware or ransomware mostly target individual users with the purpose of making profit. On the other hand, advanced security attacks, also known as Advanced Persistent threats (APTs) are highly customized and sophisticated attacks which are carefully designed to target a specific company or organization. These attacks are more difficult to prevent, detect and mitigate since they are designed to evade the security measures available in the targeted organization. Such attacks not only involve a variety of tools but also employ a variety of tactics and techniques. This paper is an effort to study the various characteristics of APTs and categorize attack indicators into relevant groups for the purpose of comparison and evaluation. Finally, we summarize the effectiveness of employing these behavioral indicators in the detection of an on-going APT attack in an enterprise network.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128749027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}