Dhruval Singh, Govind Sharma, Ishan Minhas, Gurkirat Singh, P. Mahajan, P. Verma, Gitanjali Chandwani Manocha
{"title":"LoRaWAN Gateway Architecture for Aquaculture Monitoring in Rural Area","authors":"Dhruval Singh, Govind Sharma, Ishan Minhas, Gurkirat Singh, P. Mahajan, P. Verma, Gitanjali Chandwani Manocha","doi":"10.1109/ISCON57294.2023.10111936","DOIUrl":"https://doi.org/10.1109/ISCON57294.2023.10111936","url":null,"abstract":"In fish farming, it is imperative to have detailed data about water quality, dissolved oxygen and nutrients etc., not only in large scale classic farming applications but also for urban aquaculture. To ensure the survival of the fish, the water should be monitoring at regular intervals. This periodic monitoring is cumbersome and prone to human error if done manually. Live and automated monitoring will not only save human effort but also increase the productivity of the fishing farming. This automated monitoring requires robust network connectivity to ensure live data collection using sensors and storage in cloud/server. However, for rural area the network connectivity may or may not be available. LoRaWAN is very popular Internet of Things (IoT) access network technology. In this paper, we carry out experiment to extend the network range using LoRaWAN (Long Range Wide Area Network) for live and automated aquaculture monitoring. The monitoring is done with the various sensors that collect data related to quality of water at different time and sending the data to the nearest LoRaWAN Sensor Node, which further forwards the aggregated data to LoRaWAN gateway. The LoRaWAN radio module that allows long-range wireless data transmission and low-power battery operation for several months at reasonable module costs The proposed system is evaluated in terms of transmission range, battery runtime and sensor data accuracy.","PeriodicalId":280183,"journal":{"name":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126699891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amit Verma, Sushil Kumar, Inder Singh, Ashwani Kumar, R. K. Saini, Saubhagya Kumar Moharana
{"title":"Mitigation and Comparison of Chromatic Dispersion at Distinct Frequencies Using Hybrid Model at A Bit Rate of 100Gbps over 120Km Distance","authors":"Amit Verma, Sushil Kumar, Inder Singh, Ashwani Kumar, R. K. Saini, Saubhagya Kumar Moharana","doi":"10.1109/ISCON57294.2023.10112148","DOIUrl":"https://doi.org/10.1109/ISCON57294.2023.10112148","url":null,"abstract":"In this paper, a Hybrid model is proposed for compensation of chromatic dispersion which can ensure the high bit rate, a higher Q-factor and lower BER for long distance optical communication. It can be achieved by taking into consideration the major limiting factors like dispersion, attenuation, and other linear and non-linear effects of optical fiber. Chromatic dispersion is the principal deterrents in high velocity information transmission thus ought to be compensated by different methodologies all through the transmission system. This study presents the simulation results of a proposed hybrid model which is a combination of Uniform Fiber Bragg Grating (UFBG) and Electronic Dispersion Compensation (EDC) along with Erbium Doped Fiber Amplifier (EDFA). This model is designed to mitigate the effect of chromatic dispersion present in optical fiber communication system. Here, the analysis is carried out by varying the input carrier frequency range from 193.1 THz to 193.5 THz and then comparing their outcomes to get the satisfactory result. As a result, we find that the quality factor rises monotonically as the frequency is increased up to some level and then it undergoes an abrupt fall along with a rise in BER. The simulation is done with the help of Opti-System 7.0 simulator.","PeriodicalId":280183,"journal":{"name":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126595119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nugraha Kusbianto, E. Sukoharsono, Arizal Darmawan
{"title":"Exploring the Impact of Big Data Analytics Capabilities on Indonesian Firm Performance - A Mediation Analysis of Business Process Agility and Process-oriented Dynamic Capability","authors":"Nugraha Kusbianto, E. Sukoharsono, Arizal Darmawan","doi":"10.1109/ISCON57294.2023.10112001","DOIUrl":"https://doi.org/10.1109/ISCON57294.2023.10112001","url":null,"abstract":"Examining how influential Big Data Analytic Capabilities (BDAC) are in improving Firm Performance (FPER) in the Indonesian setting is the objectives of this study, which has seen a significant increase in Big Data expenditure in Asia but lacks research in this area. Additionally, the study proposes a theoretical model as a framework for developing BDAC. The IT Capability Framework and the mediation functions of both Process-oriented Dynamic Capability (PODC) and Business Process Agility (BPA serve as the foundation for this study model. A quantitative research method using purposive and snowball sampling techniques is applied to a sample of 53 Indonesian companies. The result is BPA is significant while the PODC is identified to be insignificant in mediating the BDAC and FPER relationship. This study provides a framework for understanding Big Data Analytics and empirical evidence of BDAC’s impact on the success of Indonesian firms.","PeriodicalId":280183,"journal":{"name":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125728922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Insight into Machine Learning Techniques to Detect Anomalous Users","authors":"P. Kumar, Ajay Kumar, Kakoli Banerjee, Ayush Paharia, Arushi Singh, Anushka Chaudhary","doi":"10.1109/ISCON57294.2023.10112179","DOIUrl":"https://doi.org/10.1109/ISCON57294.2023.10112179","url":null,"abstract":"Anomalous user profile detection is a challenging problem in machine learning. Fake user accounts can be used for malicious activities and can cause extensive damage. This paper reviews the existing literature on user profile detection, categorizing the methods into supervised and unsupervised approaches. It also discusses the challenges and weaknesses of existing approaches and suggests possible areas for improvement. The paper provides a comprehensive overview and proposes a model to classify profiles as real or fake. Social media has made it easier for attackers to steal information and spread malicious content, which makes it important to detect and stop malicious profiles.","PeriodicalId":280183,"journal":{"name":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120989685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Support Vector Machine Learning Technique for Detection of Phishing Websites","authors":"Saumya Jain, Chetan Gupta","doi":"10.1109/ISCON57294.2023.10111968","DOIUrl":"https://doi.org/10.1109/ISCON57294.2023.10111968","url":null,"abstract":"In the field of cyber attacks, phishing is considered to be one of the pioneers. Phishing sites are websites that look and sound like legitimate ones but are really scams. For the purpose of duping the target into thinking its real, they are manufactured. The phishing scams of today are more complex and dangerous than ever before. Phishing website detection may be achieved by using machine and deep learning approaches based on artificial intelligence. It is possible to use the ML classification algorithm for phishing website detection. This paper presents a support vector machine learning technique for the detection of phishing websites. Simulation is performed using spyder IDE. Simulation results provide better accuracy.","PeriodicalId":280183,"journal":{"name":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122795343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology Based Agriculture Data Mining using IWO and RNN","authors":"Deepak Saraswat","doi":"10.1109/ISCON57294.2023.10112187","DOIUrl":"https://doi.org/10.1109/ISCON57294.2023.10112187","url":null,"abstract":"An ontology is a machine-interpretable formal description of domain knowledge. In current years, ontologies have risen to prominence as a key tool for demonstrating domain knowledge and a key element of several knowledge management systems, decision-support systems (DSS) and other intelligent systems including in agriculture. However, a study of the current literature on agricultural ontologies suggests that the majority of research that suggest agricultural ontologies lack a clear assessment mechanism. This is unwanted because this is impossible to assess the value of ontologies in research and practise without well-structured assessment mechanisms. Furthermore, relying on such ontologies and sharing them on the Semantic Web or amongst semantic-aware apps is problematic. This paper presents a framework for selecting appropriate assessment techniques for Ontology Based Agriculture Data Mining utilizing Invasive Weed Optimization (IWO) and Re-current Neural Network (RNN) that appears to be absent from most recent agricultural ontology research. The framework facilitates the selection of relevant evaluation techniques for a particular ontology based on its intended user.","PeriodicalId":280183,"journal":{"name":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132713836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning based URL Analysis for Phishing Detection","authors":"Rashmi Jha, Gaurav Kunwar","doi":"10.1109/ISCON57294.2023.10112057","DOIUrl":"https://doi.org/10.1109/ISCON57294.2023.10112057","url":null,"abstract":"Attacks that take place online most frequently take the form of phishing scams. Attackers attempt to gather user data without the consent of any such user through emails, URLs, and any other link that sends a viewer to the a dubious page where a consumer is persuaded to start taking specific actions that can successfully complete an attack. An attacker has the opportunity to gather vital information about the victim during these attacks, which they can use to presume the victim’s identity & carry out tasks that only the victim should have been able to carry out, such as making purchases, sending messages to the other people, and simply attempting to access the victim’s info. Many studies have been done to discuss potential defenses against these assaults. This study employs three algorithms for machine learning to ascertain whether such a web page is phishing. In the experiment, software that analyzes web page URLs to distinguish between legitimate & phishing websites is used to try to prevent attacks using these models which have been trained to utilize URL-based features. The accuracy, recall, and F1 Score of the random forest classifier’s performance from the observations were 97.5%, 99.1%, and 97.3%, respectively. The proposed model is quick and effective because, unlike earlier studies, it only relies on the URL and doesn’t conduct analysis using any other sources.","PeriodicalId":280183,"journal":{"name":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134197805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Music Recommendation System through Hand Gestures and Facial Emotions","authors":"Meeta Chaudhry, Sunil Kumar, Suhail Qadir Ganie","doi":"10.1109/ISCON57294.2023.10112159","DOIUrl":"https://doi.org/10.1109/ISCON57294.2023.10112159","url":null,"abstract":"Music can be a powerful tool to describe the human mood. Hand Gestures and Facial emotions are forms of fast non-linguistic communication. The current research on Music recommendation either using a hand gesture music controller (that only controls the operations for playing music) or an emotion based music player but not both. In this work, a new and hybrid approach for playing music both using hand gestures and facial emotions is proposed that can help the user to recommend and play music. In this research facial expression recognizer(FER) algorithm is used that extract the features from the image for emotion detection and the MediaPipe framework and Tensorflow library are used for hand detection and gesture recognition respectively. The music will play based on the most recent gesture and emotion by using a pygame. First, priority is given to hand gestures and then to facial emotions. The accuracy of the proposed work is also compared with existing approaches to music recommendation.","PeriodicalId":280183,"journal":{"name":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134609880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prevention of Security Attacks in Cloud Computing","authors":"Kashish Gaur, Kaamya Gaur, M. Diwakar, Prabhishek Singh, Neeraj Kumar Pandey","doi":"10.1109/ISCON57294.2023.10112020","DOIUrl":"https://doi.org/10.1109/ISCON57294.2023.10112020","url":null,"abstract":"With rising popularity of social platforms like Google, Amazon, Microsoft, etc., there have been several incidents of cloud cyber-attacks that have been reported in the past few years. End-to-end security have become one of the biggest challenges in the field of cloud computing in recent days. Although there have been several claimed advantages that come from cloud computing models, what needs to be noticed is the loss of control in security over the cloud-based assets [9]. In this paper, we have analyzed the models to deal with cloud-related attacks and with the ways of improving cloud security. We have studied and analyzed each one of the proposals and have finalized one of them as the one model, that is comparatively better than the rest.","PeriodicalId":280183,"journal":{"name":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114400414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Retrospective: Sightseeing Excursion of Threatened Miscarriage Pertaining Ensemble Machine Learning Algorithms","authors":"Sagar Singh, Shiva Tiwari, Pareshi Goel, Dimple Tiwari","doi":"10.1109/ISCON57294.2023.10111961","DOIUrl":"https://doi.org/10.1109/ISCON57294.2023.10111961","url":null,"abstract":"The manifested invention is associated with a miscarriage/stillbirth prediction using the ensemble learning methodology. The elementary data is congregated from various rural areas of 9 different states in India with 15258 rows and 201 columns. Further, data is processed to acquire useful features such as age, intake of tobacco, alcohol, smoking, diagnosis with any disease, awareness of danger, is currently pregnant, the outcome of the pregnancy and so forth. The outcome signifies that the proposed method has the capability of extracting the chances of miscarriage with preferable accuracy and classifying them in a fruitful way. This research includes the implementation of various machine learning algorithms namely Adaboost, Random forest, bagging, and boosting which are clubbed together by using a voting classifier to obtain accuracy, precision, recall and f1-score based on ensemble methods in order to generate precise results. Raising awareness of the concern which can emerge in pregnancy, and how to spot the symptoms, can help save lives. Therefore, this invention impetus mothers to maintain their health status on the behalf of data prediction set used.","PeriodicalId":280183,"journal":{"name":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123373552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}